咨询与建议

限定检索结果

文献类型

  • 1,107 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,288 篇 工学
    • 701 篇 计算机科学与技术...
    • 571 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 172 篇 电气工程
    • 124 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 112 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 86 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,018 篇 理学
    • 553 篇 物理学
    • 386 篇 数学
    • 124 篇 统计学(可授理学、...
    • 120 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 220 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 622 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,800 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1993 条 记 录,以下是801-810 订阅
排序:
Stabilization of Continuous-Time Markov/Semi-Markov Jump Linear Systems Via Finite Data-Rate Feedback
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Jingyi Feng, Jianwen Xu, Chen Wu, Xiaoqun Lü, Jinhu College of Mathematics and Statistics Shenzhen University Shenzhen518060 China School of Mathematics and Statistics Hubei Key Laboratory of Computational Science Wuhan University Wuhan China State Key Laboratory of Software Development Environment School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China
This letter investigates almost sure exponential stabilization of continuous-time Markov jump linear systems (MJLSs) under communication data-rate constraints by introducing sampling and quantization into the feedback... 详细信息
来源: 评论
A survey of coverage-guided greybox fuzzing with deep neural models
收藏 引用
Information and Software Technology 2025年 186卷
作者: Qiu, Junyang Jiang, Yupeng Miao, Yuantian Luo, Wei Pan, Lei Zheng, Xi State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214123 China School of Computing Macquarie University Sydney 2109 NSW Australia School of Information and Physical Sciences University of Newcastle Newcastle 2308 NSW Australia School of Information Technology Deakin University Melbourne 3125 VIC Australia
Coverage-guided greybox fuzzing (CGF) has emerged as a powerful technique for software vulnerability detection, yet traditional techniques often struggle with the increasing complexity of modern software systems and t... 详细信息
来源: 评论
Multi-Variant Execution Research of Software Diversity
Multi-Variant Execution Research of Software Diversity
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Liu, Zhenwu Zhang, Zheng Zhang, Jiexin Liu, Hao State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University ZhengZhou HeNan450001 China
As more and more software products are threatened by malicious reverse analysis, along with software products are pirated, tampered with and so on, it is of great significance to study software security protection tec... 详细信息
来源: 评论
Uncovering the Isothermal Transformation Dynamics Behavior and Mechanism of Reversed Austenite in Ph13-8mo Steel
SSRN
收藏 引用
SSRN 2023年
作者: Cui, Puchang Wang, Yuqi Jia, Changhao Wang, Hongli Bai, Qingqing Zhang, Zhihong Zheng, Huaibei Lai, Zhonghong Liu, Yong Zhu, Jingchuan School of Materials Science and Engineering Harbin Institute of Technology Harbin150001 China Chengdu Advanced Metal Materials Industrial Technology Institute Co. Ltd. Chengdu610300 China National Key Laboratory for Precision Hot Processing of Metals Harbin Institute of Technology Harbin150001 China Center for Analysis Measurement and Computing Harbin Institute of Technology Harbin150001 China State Key Laboratory of Metal Material for Marine Equipment and Application Anshan114009 China
The isothermal transformation kinetics and microstructural evolution of the reversed austenite have a significant influence on the properties of PH13-8Mo steel. However, the microscopic phase transformation mechanism ... 详细信息
来源: 评论
GNN-Geo: A Graph Neural Network-based Fine-grained IP geolocation Framework
arXiv
收藏 引用
arXiv 2021年
作者: Ding, Shichang Luo, Xiangyang Wang, Jinwei Fu, Xiaoming State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou276800 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Institute of Computer Science University of Göttingen Göttingen37077 Germany
Rule-based fine-grained IP geolocation methods are hard to generalize in computer networks which do not follow hypothetical rules. Recently, deep learning methods, like multi-layer perceptron (MLP), are tried to incre... 详细信息
来源: 评论
Discovery of High-Temperature Superconducting Ternary Hydrides via Deep Learning
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoyang Zhang, Chengqian Wang, Zhenyu Liu, Hanyu Lv, Jian Wang, Han Weinan, E. Ma, Yanming National Key Laboratory of Computational Physics Institute of Applied Physics and Computational Mathematics Fenghao East Road 2 Beijing100094 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China Key Laboratory of Material Simulation Methods & Software of Ministry of Education State Key Laboratory of Superhard Materials College of Physics Jilin University Changchun130012 China International Center of Future Science Jilin University Changchun130012 China HEDPS CAPT College of Engineering Peking University Beijing100871 China AI for Science Institute Beijing100080 China Center for Machine Learning Research Peking University Beijing100871 China School of Mathematical Sciences Peking University Beijing100871 China
The discovery of novel high-temperature superconductor materials holds transformative potential for a wide array of technological applications. However, the combinatorially vast chemical and configurational search spa... 详细信息
来源: 评论
6G Enabled advanced Transportation Systems
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Ruiqi Hua, Meng Guan, Ke Wang, Xiping Zhang, Leyi Mao, Tianqi Zhang, Di Wu, Qingqing Jamalipour, Abbas The State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen518055 China The Wireless and Computing Research Institute ZTE Corporation Beijing100029 China The Department of Electrical Engineering City University of Hong Kong 999077 Hong Kong The State Key Laboratory of Advanced Rail Autonomous Operation The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China The Advanced Research Institute of Multidisciplinary Science Beijing Institute of Technology Beijing100081 China The School of Electrical and Information Engineering Zhengzhou University Zhengzhou450001 China The School of Electrical Engineering Korea University Seoul02841 Korea Republic of Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China School of Electrical and Information Engineering University of Sydney CamperdownNSW2006 Australia
With the emergence of communication services with stringent requirements such as autonomous driving or on-flight Internet, the sixth-generation (6G) wireless network is envisaged to become an enabling technology for f... 详细信息
来源: 评论
Semantic segmentation of track image based on deep neural network
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第5期27卷 23-33页
作者: Wang Zhaoying Zhou Junhua Liao Zhonghua Zhai Xiang Zhang Lianping School of Electronic Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Complex Product Advanced Manufacturing Kngineering Research Center Beijing Simulation CenterBeijing 100854China State Key Laboratory of Intelligent Manufacturing System Technology Beijing Institute of Electronic System EngineeringBeijing 100854China Alibaba Cloud Computing Beijing 100020China
In this paper,deep learning technology was utilited to solve the railway track recognition in intrusion detection *** railway track recognition can be viewed as semantic segmentation task which extends image processin... 详细信息
来源: 评论
Efficient stego key recovery based on distribution differences of extracting message bits
Efficient stego key recovery based on distribution differenc...
收藏 引用
作者: Liu, Jiufen Gan, Junjun Wang, Junchao Xu, Che Luo, Xiangyang Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The extraction of embedded messages, i.e., extraction attacks are the ultimate purpose of steganalysis, with great practical significance to obtain covert communication content and covert communication forensics. For ... 详细信息
来源: 评论
Two-dimensional ferromagnetic superlattices
收藏 引用
National Science Review 2020年 第4期7卷 745-754页
作者: Shanshan Liu Ke Yang Wenqing Liu Enze Zhang Zihan Li Xiaoqian Zhang Zhiming Liao Wen Zhang Jiabao Sun Yunkun Yang Han Gao Ce Huang Linfeng Ai Ping Kwan Johnny Wong ANDrew Thye Shen Wee Alpha T.N'Diaye Simon A.Morton Xufeng Kou Jin Zou Yongbing Xu Hua Wu Faxian Xiu State Key Laboratory of Surface Physics and Department of Physics Fudan University Institute for Nanoelectronic Devices and Quantum Computing Fudan University Laboratory for Computational Physical Sciences (MOE) Fudan University Department of Electronic Engineering Royal Holloway University of London School of Electronic Science and Engineering Nanjing University Materials Engineering The University of Queensland Department of Physics National University of Singapore Centre for Advanced 2D Materials and Graphene Research Centre National University of Singapore Lawrence Berkeley National Laboratory School of Information Science and Technology Shanghai Tech University Centre for Microscopy and Microanalysis The University of Queensland Collaborative Innovation Center of Advanced Microstructures
Mechanically exfoliated two-dimensional ferromagnetic materials(2 D FMs) possess long-range ferromagnetic order and topologically nontrivial skyrmions in few layers. However, because of the dimensionality effect, such... 详细信息
来源: 评论