咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1989 条 记 录,以下是471-480 订阅
排序:
Virtual Sample Generation for Retraining the Malicious PDF Detection Model  4
Virtual Sample Generation for Retraining the Malicious PDF D...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: He, Kang Liu, Long Lu, Dong-Zhe Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative vulnerabilities. Machine learning algorithms are developed to detect the maliciousness of PDF files. A... 详细信息
来源: 评论
A Novel Deep Learning Approach Featuring Graph-Based Algorithm for Cell Segmentation and Tracking
A Novel Deep Learning Approach Featuring Graph-Based Algorit...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhao, Keliang Niyogisubizo, Jovial Xiao, Linxia Pan, Yi Wei, Dongqing Rosiyadi, Didi Wei, Yanjie Chinese Academy of Sciences Shenzhen Key Laboratory of Intelligent Bioinformatics and Center for High Performance Computing Shenzhen Institute of Advanced Technology Shenzhen518055 China Chinese Academy of Sciences College of Computer Science and Control Engineering Shenzhen Institutes of Advanced Technology Shenzhen518055 China Shanghai Jiao Tong University State Key Laboratory of Microbial Metabolism School of Life Sciences and Biotechnology Shanghai200240 China National Research and Innovation Agency Research Center for Artificial Intelligence and Cybersecurity Bandung Indonesia
The precise segmentation and tracking of cells in microscopy image sequences play a pivotal role in biomedical research, facilitating the study of tissue, organ, and organism development. However, manual segmentation ... 详细信息
来源: 评论
An overview on the designs of distributed observers in LTI multi-agent systems
收藏 引用
Science China(Technological Sciences) 2021年 第11期64卷 2337-2346页
作者: PEI YingQing GU HaiBo LIU KeXin LU JinHu Key Laboratory of Systems and Control Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain ComputingBeihang UniversityBeijing 100191China
With the rapid development of information technologies and cloud computing, sensor networks play an increasingly important role in our society. Over the past few decades, distributed observer theory has attracted unpr... 详细信息
来源: 评论
Unconditionally optimal convergence of an energy-conserving and linearly implicit scheme for nonlinear wave equations
收藏 引用
Science China Mathematics 2022年 第8期65卷 1731-1748页
作者: Waixiang Cao Dongfang Li Zhimin Zhang School of Mathematical Sciences Beijing Normal UniversityBeijing 100875China School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China Beijing Computational Science Research Center Beijing 100193China Department of Mathematics Wayne State UniversityDetroitMI 48202USA
In this paper,we present and analyze an energy-conserving and linearly implicit scheme for solving the nonlinear wave *** error estimates in time and superconvergent error estimates in space are established without ce... 详细信息
来源: 评论
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study
arXiv
收藏 引用
arXiv 2022年
作者: Ma, Rongkuan Wei, Qiang Wang, Jingyi Zhu, Shunkai Ji, Shouling Cheng, Peng Jia, Yan Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou310000 China College of Cyber Science Nankai University Tianjin China
Programmable Logic Controllers (PLCs) are the core control devices in Industrial Control Systems (ICSs), which control and monitor the underlying physical plants such as power grids. PLCs were initially designed to wo... 详细信息
来源: 评论
Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node  4
Anti-reconnaissance Model of Host Fingerprint Based on Virtu...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Zhang, Tao Lu, Bin Li, Ding He, Kang Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable vir... 详细信息
来源: 评论
Dynamic Nonreciprocity with a Kerr Nonlinear Resonator
收藏 引用
Chinese Physics Letters 2022年 第12期39卷 28-34页
作者: Rui-Kai Pan Lei Tang keyu Xia Franco Nori College of Engineering and Applied Sciences National Laboratory of Solid State Microstructuresand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210093China College of Physics and Electronic Engineering Sichuan Normal UniversityChengdu 610101China Jiangsu Key Laboratory of Artificial Functional Materials Nanjing UniversityNanjing 210023China Shishan Laboratory Suzhou Campus of Nanjing UniversitySuzhou 215000China RIKEN Quantum Computing Center RIKEN Cluster for Pioneering ResearchWako-shiSaitama 351-0198Japan Physics Department The University of MichiganAnn ArborMichigan 48109-1040USA
On-chip optical nonreciprocal devices are vital components for integrated photonic systems and scalable quantum information *** optical isolators and circulators have attracted considerable attention because of their ... 详细信息
来源: 评论
A secure spectrum auction scheme without the trusted party based on the smart contract
收藏 引用
Digital Communications and Networks 2021年 第2期7卷 223-234页
作者: Jiaqi Wang Ning Lu Qingfeng Cheng Lu Zhou Wenbo Shi School of Computer Science and Engineerings Northeastern University Shenyang 110004China School of Computer Science and Technology Xidian UniversityXi'anChina Strategic Support Force Information Engineering University Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Division of Computer Science University ofAizuAizu-WakamatsuJapan School of Computer and Communication Engineering Nordieastem UniversityQinhuangdao066004China
With the development of communication 5G networks and technologies,spectrum resources are increasingly *** scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum a... 详细信息
来源: 评论
Replace2Self: Self-Supervised Denoising based on Voxel Replacing and Image Mixing for Diffusion MRI
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Wu, Linhai Wang, Lihui Deng, Zeyu Zhu, Yuemin Wei, Hongjiang Guizhou University Key Laboratory of Advanced Medical Imaging and Intelligent Computing of Guizhou Province Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education State Key Laboratory of Public Big Data College of Computer Science and Technology 550025 China Univ Lyon INSA Lyon CNRS Inserm CREATIS UMR 5220 LyonF-69621 France Shanghai Jiao Tong University School of Biomedical Engineering Shanghai200030 China
Low signal to noise ratio (SNR) remains one of the limitations of diffusion weighted (DW) imaging. How to suppress the influence of noise on the subsequent analysis about the tissue microstructure is still challenging... 详细信息
来源: 评论
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Junyan Lu, Wei Luo, Xiangyang Yang, Rui Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen China
MSC Codes 68T07, 68T10Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. Howeve... 详细信息
来源: 评论