咨询与建议

限定检索结果

文献类型

  • 2,058 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,203 篇 工学
    • 1,189 篇 计算机科学与技术...
    • 980 篇 软件工程
    • 321 篇 信息与通信工程
    • 297 篇 电子科学与技术(可...
    • 296 篇 电气工程
    • 257 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 187 篇 材料科学与工程(可...
    • 166 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 74 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,741 篇 理学
    • 843 篇 物理学
    • 769 篇 数学
    • 243 篇 生物学
    • 235 篇 统计学(可授理学、...
    • 222 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 387 篇 管理学
    • 240 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 619 篇 state key labora...
  • 174 篇 school of comput...
  • 128 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 school of physic...
  • 74 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,916 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and advanced computing"
3352 条 记 录,以下是71-80 订阅
排序:
Recommender system based on adaptive threshold filtering GCN
Recommender system based on adaptive threshold filtering GCN
收藏 引用
2022 International Conference on Neural Networks, Information, and Communication engineering, NNICE 2022
作者: Qiao, Meng Gui, Hairen Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio... 详细信息
来源: 评论
Binary vulnerability mining technology based on neural network feature fusion  5
Binary vulnerability mining technology based on neural netwo...
收藏 引用
5th International Conference on advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Han, Wenjie Pang, Jianmin Zhou, Xin Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien... 详细信息
来源: 评论
Analysis of security capability of MVX based on probabilistic attack and defense models  3
Analysis of security capability of MVX based on probabilisti...
收藏 引用
3rd International Conference on Computer Science and Communication Technology, ICCSCT 2022
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition... 详细信息
来源: 评论
A Bidirectional Data Packet Tampering Method for Linux System
A Bidirectional Data Packet Tampering Method for Linux Syste...
收藏 引用
2022 International Conference on Network Communication and Information Security, ICNCIS 2022
作者: Lv, Siou Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method... 详细信息
来源: 评论
A Binary Function Name Prediction Method Based on Variable Alignment and Translation Model  4
A Binary Function Name Prediction Method Based on Variable A...
收藏 引用
4th International Conference on Machine Learning and Computer Application, ICMLCA 2023
作者: Xia, Bing Yin, Jiabin Ge, Yunxiang Yang, Ruinan ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China ZhongYuan University of Technology Zhengzhou China
Binary function naming is a code analysis task that generates functional descriptions of functions, and its results can be applied in the fields of malicious code analysis, vulnerability causation analysis, and algori... 详细信息
来源: 评论
Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge computing Environments
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 93-104页
作者: Huanhuan Xu Jingya Zhou Wenqi Wei Baolei Cheng School of Computer Science and Technology Soochow UniversitySuzhou 215006China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China School of Computer Science Georgia Institute of TechnologyAtlantaGA 30332USA
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n... 详细信息
来源: 评论
An Improved Authenticated key Agreement Protocol for IoT and Cloud Server  5th
An Improved Authenticated Key Agreement Protocol for IoT an...
收藏 引用
5th International Conference on Security and Privacy in New computing Environments, SPNCE 2022
作者: Ma, Yongliu Ma, Yuqian Cheng, Qingfeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou450001 China
The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of information transmission between IoT devices and servers. Recently, r... 详细信息
来源: 评论
Haica: A High Performance computing & Artificial Intelligence Fused computing Architecture  1
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Chen, Zhengbo Zheng, Fang Guo, Feng Yu, Qi Chen, Zuoning Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Chinese Academy of Engineering Beijing China
In recent years, HPC and AI fusion, which refers to applying AI technology to traditional HPC applications, has become a new trend. HPC and AI fusion requires supports for multiple precisions used in both domains. Whi... 详细信息
来源: 评论
Optimal weight support vector regression ensemble with cluster-based subsampling for electricity price forecasting
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第1期1卷 1-16页
作者: Li, Yuerong Zhang, Yuhua Che, Jinxing School of Science Nanchang Institute of Technology Jiangxi Nanchang China Key Laboratory of Engineering Mathematics and Advanced Computing Nanchang Institute of Technology Jiangxi Nanchang China
Accurate prediction of short-term electricity price is the key to obtain economic benefit and also an important index of power system planning and management. Support vector regression (SVR) based ensemble works have ... 详细信息
来源: 评论
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 249-251页
作者: Ting CHEN Xinghua LI Qingfeng CHENG School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist... 详细信息
来源: 评论