咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1989 条 记 录,以下是361-370 订阅
排序:
Street-Level IP Geolocation Algorithm Based on Landmarks Clustering
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 3345-3361页
作者: Fan Zhang Fenlin Liu Rui Xu Xiangyang Luo Shichang Ding Hechan Tian PLA Strategic Support Force Information Engineering University Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Cyberspace Security Key Laboratory of Sichuan Province Chengdu610000China China Electronic Technology Cyber Security Co. Ltd.Chengdu610000China University of Goettingen Goettingen37075Germany
Existing IP geolocation algorithms based on delay similarity often rely on the principle that geographically adjacent IPs have similar ***,this principle is often invalid in real Internet environment,which leads to un... 详细信息
来源: 评论
Analysis of Instantaneous Angular Speed Accuracy Considering Encoder Errors
Analysis of Instantaneous Angular Speed Accuracy Considering...
收藏 引用
International Conference on Automation and computing (ICAC)
作者: Yuanhao Liu Fengshou Gu Qiang Zeng State Key Laboratory of Mechanical Transmissions for Advanced Equipment Chongqing University Chongqing China School of Computing and Engineering University of Huddersfield Huddersfield UK
Instantaneous Angular Speed (IAS) is closely related to the dynamic behavior of rotating machinery and plays a crucial role in diagnosing faults. However, the measurement of the IAS is subject to various errors inevit... 详细信息
来源: 评论
Self-Dual Hadamard Bent Sequences
收藏 引用
Journal of Systems Science & Complexity 2023年 第2期36卷 894-908页
作者: SHI Minjia LI Yaya CHENG Wei CRNKOVIC Dean KROTOV Denis SOLéPatrick Key Laboratory of Intelligent Computing Signal Processing Ministry of EducationSchool of Mathematical SciencesAnhui UniversityHefei 230601China State Key Laboratory of Information Security(Institute of Information Engineering) Chinese Academy of SciencesBeijing 100093China. LTCI Télécom ParisParis91120 PalaiseauFrance Secure-IC S.A.S. 104 Bd du Montparnasse75014 Paris Faculty of Mathematics University of RijekaNovosibirsk 630090Russia Sobolev Institute of Mathematics Novosibirsk 630090Russia Aix Marseille Univ CNRSCentrale MarseilleI2MMarseilleFrance
A new notion of bent sequence related to Hadamard matrices was introduced recently,motivated by a security application(Solé,et al.,2021).The authors study the self-dual class in length at most *** authors use thr... 详细信息
来源: 评论
Simulation detection based on single photon quantum key distribution protocol
Simulation detection based on single photon quantum key dist...
收藏 引用
2020 International Conference on Electronics, Communications and Information Technology, CECIT 2020
作者: Liu, X.N. Hu, C.C. Yin, M.J. Jin, L. School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论
Dual-axial self-attention network for text classification
收藏 引用
Science China(Information Sciences) 2021年 第12期64卷 80-90页
作者: Xiaochuan ZHANG Xipeng QIU Jianmin PANG Fudong LIU Xingwei LI State Key Laboratory of Mathematical Engineering and Advanced Computing Shanghai Key Laboratory of Intelligent Information Processing Fudan University School of Computer Science Fudan University
Text classification is an important task in natural language processing and numerous studies aim to improve the accuracy and efficiency of text classification models. In this study, we propose an effective and efficie... 详细信息
来源: 评论
A Software Diversity-Based Lab in Operating System for Cyber Security Students  3
A Software Diversity-Based Lab in Operating System for Cyber...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Wang, Junchao Pang, Jianmin Shan, Zheng Wei, Jin Yao, Jinyang Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zheng Zhou China School of Computer Science Data Arena Institute Fudan University Zheng Zhou China
The course of operating system's labs usually fall behind the state of art technology. In this paper, we propose a Software Diversity-Assisted Defense (SDAD) lab based on software diversity, mainly targeting for s... 详细信息
来源: 评论
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed Signals on Coprime Array
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed ...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Heng Jiang Lichun Li Hailong Zhang Hongyi Pan Xue Li College of Information System Engineering Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The coprime array constructs virtual array to obtain higher degrees of freedom (DOF), but the premise of doing so is that the signals are independent of each other. Once there are coherent signals, the signal model of... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model  7th
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Zhang, Wenning Zhou, Qinglei Jiao, Chongyang Xu, Ting State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China Zhongyuan University of Technology Zhengzhou450000 China Zhengzhou University Zhengzhou450000 China
To solve the emerging complex optimization problems, multi objective optimization algorithms are needed. By introducing the surrogate model for approximate fitness calculation, the multi objective firefly algorithm wi... 详细信息
来源: 评论
SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints  39
SUMI-IFL: An Information-Theoretic Framework for Image Forge...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau Macao School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论