咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 384 篇 期刊文献

馆藏范围

  • 1,056 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 521 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 23 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,020 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1056 条 记 录,以下是641-650 订阅
排序:
A review-driven neural model for sequential recommendation
arXiv
收藏 引用
arXiv 2019年
作者: Li, Chenliang Niu, Xichuan Luo, Xiangyang Chen, Zhenzhong Quan, Cong School of Cyber Science and Engineering Wuhan University School of Remote Sensing and Information Engineering Wuhan University State Key Lab of Mathematical Engineering and Advanced Computing Zhengzhou School of Computer Science Wuhan University
Writing review for a purchased item is a unique channel to express a user's opinion in ECommerce. Recently, many deep learning based solutions have been proposed by exploiting user reviews for rating prediction. I... 详细信息
来源: 评论
Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks
收藏 引用
Computers, Materials & Continua 2018年 第11期57卷 243-260页
作者: Daofu Gong Yan Chen Haoyu Lu Zhenyu Li Yibing Han Zhengzhou Science and Technology Institute Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer Science University of YorkYork YO105GHUK
To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed *** this scheme,the image is first partitioned into 2×2 size ***,the high 5 bits of a block’s... 详细信息
来源: 评论
Dipole-matter interactions governed by the asymmetry of Maxwell equations
arXiv
收藏 引用
arXiv 2023年
作者: Zhong, Yuhan Wang, Chan Bian, Chenxu Chen, Xuhuinan Chen, Jialin Zhu, Xingjian Hu, Hao Low, Tony Chen, Hongsheng Zhang, Baile Lin, Xiao Interdisciplinary Center for Quantum Information State Key Laboratory of Extreme Photonics and Instrumentation ZJU-Hangzhou Global Scientific and Technological Innovation Center College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China International Joint Innovation Center Key Lab. of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang The Electromagnetics Academy at Zhejiang University Zhejiang University Haining314400 China Jinhua Institute of Zhejiang University Zhejiang University Jinhua321099 China Department of Electrical and Computer Engineering Technion-Israel Institute of Technology Haifa32000 Israel School of Physics Zhejiang University Hangzhou310027 China School of Electrical and Electronic Engineering Nanyang Technological University Singapore639798 Singapore Department of Electrical and Computer Engineering University of Minnesota MinneapolisMN55455 United States Department of Physics University of Minnesota MinneapolisMN55455 United States Shaoxing Institute of Zhejiang University Zhejiang University Shaoxing312000 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University Singapore637371 Singapore Centre for Disruptive Photonic Technologies Nanyang Technological University Singapore637371 Singapore
Directionally molding the near-field and far-field radiation lies at the heart of nanophotonics and is crucial for applications such as on-chip information processing and chiral quantum networks. The most fundamental ... 详细信息
来源: 评论
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection
收藏 引用
Computers, Materials & Continua 2018年 第7期56卷 151-167页
作者: Yue Zhang Dengpan Ye Junjun Gan Zhenyu Li Qingfeng Cheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Computer School of Wuhan University Wuhan 430072China Department of Computer Science University of YorkYork YO105GHUK
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this pape... 详细信息
来源: 评论
Research on Security Protocol Analysis Tool SmartVerif
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2132卷
作者: Siqi Lu Qingdi Han Xuyang Miao Yubo Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan 450000 China Department of Information Science and Engineering Ocean University of China Qingdao Shandong 266100 China
Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol...
来源: 评论
Delay-distance correlation study for IP geolocation
arXiv
收藏 引用
arXiv 2019年
作者: Ding, Shichang Luo, Xiangyang Ye, Dengpan Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China School of Computer Wuhan University Wuhan Hubei430072 China
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to... 详细信息
来源: 评论
Coarse-grained automatic parallelization approach for branch nested loop
收藏 引用
International Journal of Performability engineering 2019年 第11期15卷 2871-2881页
作者: Liu, Hui Xu, Jinlong Ding, Lili College of Computer and Information Engineering Henan Normal University Xinxiang453007 China Engineering Technology Research Center for Computing Intelligence and Data Mining in Henan Province Xinxiang453007 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
GCC compiler is a retargetable compiler program that was developed to increase the efficiency of programs in the GNU system. In recent years, compiler optimization based on data dependency analysis has become an impor... 详细信息
来源: 评论
A Pipelining Loop Optimization Method for Dataflow Architecture
收藏 引用
Journal of Computer Science & Technology 2018年 第1期33卷 116-130页
作者: Xu Tan Xiao-Chun Ye Xiao-Wei Shen Yuan-Chao Xu Da Wang Lunkai Zhang Wen-Ming Li Dong-Rui Fan Zhi-Min Tang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing 1000J9 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China College of Information Engineering Capital Normal University Beijing 100048 China Department of Computer Science The University of Chicago Chicago IL 60637 U.S.A.
With the coming of exascale supercomputing era, power efficiency has become the most important obstacle to build an exascale system. Dataflow architecture has native advantage in achieving high power efficiency for sc... 详细信息
来源: 评论
Factorization of odd integers as lattice search procedure  1
收藏 引用
9th International Symposium on Intelligence Computation and Applications, ISICA 2017
作者: Wang, Xingbo Foshan University Foshan CityGuangdong Province528000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The article puts forward a 3-dimensional searching approach that can factorize odd composite integers. The article first proves that, an odd composite number can be expressed by a trivariate function, then demonstrate... 详细信息
来源: 评论
Directer: A parallel and directed fuzzing based on concolic execution  18
Directer: A parallel and directed fuzzing based on concolic ...
收藏 引用
7th International Conference on Software and Information engineering, ICSIE 2018
作者: Song, Xiaobin Wu, Zehui Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Malaysia China National Digital Switching System Engineering and Technological Research Center Zhengzhou China
Fuzzing is a widely used technology to find vulnerabilities, but the current technology is mostly based on coverage and there are relatively few research in the field of directed fuzzing. In this paper, a parallelized... 详细信息
来源: 评论