咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1989 条 记 录,以下是381-390 订阅
排序:
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering  16
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit  4
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Wang, Jinzhu Cai, Ruijie Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ... 详细信息
来源: 评论
An evaluation algorithm of the importance of network node based on community influence  1
收藏 引用
5th International Conference on Data Mining and Big Data, DMBD 2020
作者: He, Gongzhen Luo, Junyong Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Identifying nodes in social networks that have great influence on information dissemination is of great significance for monitoring and guiding information dissemination. There are few methods to study the influence o... 详细信息
来源: 评论
Defense method of ruby code injection attack based on instruction set randomization  20
Defense method of ruby code injection attack based on instru...
收藏 引用
8th International Conference on Computer and Communications Management, ICCCM 2020
作者: Wang, Jiang Yao, Yuan Zhang, Gaofei Li, Fangyun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Code injection attack is a major security threat to applications, especially web applications. This type of attack stems from the attacker's ability to use the vulnerability/backdoor of the application to inject a... 详细信息
来源: 评论
Network representation learning based extended matrix factorization for recommendation  6th
Network representation learning based extended matrix factor...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Xu, Jinmao Gong, Daofu Liu, Fenlin Tan, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in... 详细信息
来源: 评论
Network security assessment based on full host-based attack graph
Network security assessment based on full host-based attack ...
收藏 引用
2020 International Conference on Cyberspace Innovation of advanced Technologies, CIAT 2020
作者: Wang, Xiao-Fan Zhou, Tian-Yang Zhu, Jun-Hu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to... 详细信息
来源: 评论
Dynamic Network Change Detection via Dynamic Network Representation Learning  14th
Dynamic Network Change Detection via Dynamic Network Represe...
收藏 引用
14th EAI International Conference on Communications and Networking in China, ChinaCom 2019
作者: Feng, Hao Liu, Yan Zhou, Ziqiao Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The structure of the network in the real world is very complex, as the dynamic network structure evolves in time dimension, how to detect network changes accurately and further locate abnormal nodes is a research hots... 详细信息
来源: 评论
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks  16
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
Research on 3D Human Body Reconstruction Algorithm of Monocular Image  5
Research on 3D Human Body Reconstruction Algorithm of Monocu...
收藏 引用
5th Asian Conference on Artificial Intelligence Technology, ACAIT 2021
作者: Liang, Zijian Liang, Huan Fu, Wenlong Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The three-dimensional human body feature parameters extracted by the neural network method are coupled in the high-dimensional feature space. The fully connected network processes the three-dimensional human pose and ... 详细信息
来源: 评论
RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Xinquan Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China State Key Laboratory of Internet of Things for Smart City The Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 China
Multimodal fake news detection aims to automatically identify real or fake news, thereby mitigating the adverse effects caused by such misinformation. Although prevailing approaches have demonstrated their effectivene... 详细信息
来源: 评论