咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1989 条 记 录,以下是411-420 订阅
排序:
Research on security assessment based on big data and multi-entity profile
Research on security assessment based on big data and multi-...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Wenfu Liu Jianmin Pang Shudan Yang Nan Li Qiming Du Daozhu Sun Fudong Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have intern... 详细信息
来源: 评论
A Partial-Lifting-Based Compiling Concolic Execution Approach
A Partial-Lifting-Based Compiling Concolic Execution Approac...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Haotian Zhang Weiyu Dong Jian Lin State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
It has been a common phenomenon that embedded devices are used ubiquitously while the security of proprietary software running on devices has become more and more significant. These softwares are often presented to re... 详细信息
来源: 评论
Molecular Dynamics Study of the Effect of Substrate Temperature on the Barrier Behavior in Aluminum Oxide Josephson Junctions
SSRN
收藏 引用
SSRN 2022年
作者: Han, Chuanbing Sun, Huihui Hou, Chaofeng Qiu, Junling Wang, Weilong Liu, Fudong Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Institute of Process Engineering Chinese Academy of Sciences Beijing100190 China
Although the quality and reliability of Josephson junctions have improved considerably, the effect of preparation parameters on the structure and nanochemical properties of the barrier layer remains elusive. Here, we ... 详细信息
来源: 评论
Integrating KNN and Gradient Boosting Decision Tree for Recommendation
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Qiming Du Nan Li Shudan Yang Daozhu Sun Wenfu Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论
Expert with Outlier Exposure for Continual Learning of New Diseases
Expert with Outlier Exposure for Continual Learning of New D...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Xu, Zhengjing Chen, Kanghao Zheng, Wei-Shi Tan, Zhijun Yang, Xiaobo Wang, Ruixuan Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE China State Key Laboratory of Dampness Syndrome of Chinese Medicine Guangzhou China Peng Cheng Laboratory Department of Network Intelligence Shenzhen China
Current intelligent diagnosis systems struggle to continually learn to diagnose more and more diseases due to catastrophic forgetting of old knowledge when learning new knowledge. Although storing small old data for s... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
A Survey of Internet of Things in Healthcare  29th
A Survey of Internet of Things in Healthcare
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Chen, Shuwen Wang, Jiaji Song, Zhijun School of Physics and Information Engineering Jiangsu Second Normal University Nanjing211200 China School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom Jiangsu Province Engineering Research Center of Basic Education Big Data Application Nanjing211200 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China
With the rapid development of computers, Internet of Things (IoT) technology is becoming more and more closely integrated with the healthcare sector. This article introduces two major applications of IoT in healthcare... 详细信息
来源: 评论
Network Topology Overlapping Group Detection Based on h-Core Pruning  6
Network Topology Overlapping Group Detection Based on h-Core...
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Zhang, Qi Liu, Yan Cai, Yuheng Zhong Yuan Network Security Research Institute Zhengzhou University Zhengzhou China Pla Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The network group detection has a large number of application researches and has achieved certain results in network security, IP entity location and load balancing. However, due to the large scale of the network topo... 详细信息
来源: 评论
A Survey on Neural Machine Translation Applied to Sign Language Generation  3
A Survey on Neural Machine Translation Applied to Sign Langu...
收藏 引用
3rd International Conference on Applied Machine Learning, ICAML 2021
作者: Zhang, Yue Cao, Lihong State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China Neuroscience and Intelligent Media Institute Communication University of China Beijing100024 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is increasing at a rapid rate. There is a signifîcant com... 详细信息
来源: 评论
Research on Security Protocol Analysis Tool SmartVerif
Research on Security Protocol Analysis Tool SmartVerif
收藏 引用
2021 International Conference on Computer Technology, Information engineering and Electron Materials, CTIEEM 2021
作者: Lu, Siqi Han, Qingdi Miao, Xuyang Liu, Yubo State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450000 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450000 China Department of Information Science and Engineering Ocean University of China Shandong Qingdao266100 China
Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol... 详细信息
来源: 评论