咨询与建议

限定检索结果

文献类型

  • 1,107 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,288 篇 工学
    • 701 篇 计算机科学与技术...
    • 571 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 172 篇 电气工程
    • 124 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 112 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 86 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,018 篇 理学
    • 553 篇 物理学
    • 386 篇 数学
    • 124 篇 统计学(可授理学、...
    • 120 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 220 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 622 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,800 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1993 条 记 录,以下是811-820 订阅
排序:
Arbitrary coherent distributions in a programmable quantum walk
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Rong Yang, Ran Guo, Jian Sun, Chang-Wei Liu, Yi-Chen Zhou, Heng Xu, Ping Xie, Zhenda Gong, Yan-Xiao Zhu, Shi-Ning National Laboratory of Solid State Microstructure School of Physics School of Electronic Science and Engineering Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing210093 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunication Nanjing210023 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computing National University of Defense Technology Changsha410073 China
The coherent superposition of position states in a quantum walk (QW) can be precisely engineered towards the desired distributions to meet the need of quantum information applications. The coherent distribution can ma... 详细信息
来源: 评论
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion  19
Feature selection method for image steganalysis based on wei...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Ma, Yuanyuan Luo, Xiangyang Li, Zhenyu Zhang, Yi Bors, Adrian G. State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Department of Computer Science University of York York United Kingdom
In order to improve the detection of hidden information in signals, additional features are considered as inputs for steganalysers. This research study proposes a feature selection method based on Weighted Inner-Inter... 详细信息
来源: 评论
Butson Hadamard matrices, bent sequences, and spherical codes
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Minjia Lu, Danni Armario, Andrés Egan, Ronan Ozbudak, Ferruh Solé, Patrick The Key Laboratory of Intelligent Computing Signal Processing Ministry of Education School of Mathematical Sciences Anhui University Hefei230601 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China Departamento de Matemática Aplicada I Universidad de Sevilla Avda. Reina Mercedes s/n Seville41012 Spain School of Mathematical Sciences Dublin City University Ireland Faculty of Engineering and Natural Sciences Sabancı University Istanbul34956 Turkey I2M Aix Marseille Univ CNRS Centrale Marseille Marseilles France
We explore a notion of bent sequence attached to the data consisting of an Hadamard matrix of order n defined over the complex qth roots of unity, an eigenvalue of that matrix, and a Galois automorphism from the cyclo... 详细信息
来源: 评论
Maximal coin-walker entanglement in a ballistic quantum walk
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Rong Yang, Ran Guo, Jian Sun, Chang-Wei Duan, Jia-Chen Zhou, Heng Xie, Zhenda Xu, Ping Gong, Yan-Xiao Zhu, Shi-Ning National Laboratory of Solid State Microstructure School of Physics School of Electronic Science and Engineering Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing210093 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunication Nanjing210023 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computing National University of Defense Technology Changsha410073 China
We report the position-inhomogeneous quantum walk (IQW) can be utilized to produce the maximal high dimensional entanglement while maintaining the quadratic speedup spread of the wave-function. Our calculations show t... 详细信息
来源: 评论
SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts
SmartGift: Learning to Generate Practical Inputs for Testing...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Teng Zhou Kui Liu Li Li Zhe Liu Jacques Klein Tegawendé F. Bissyandé Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Monash University Melbourne Australia Interdisciplinary Centre for Security Reliability and Trust (SnT) University of Luxembourg Luxembourg
With the boom of Initial Coin Offerings (ICO) in the financial markets, smart contracts have gained rapid popularity among consumers. Smart contract vulnerabilities however made them a prime target to malicious attack...
来源: 评论
Binary semantic Similarity Comparison based on software gene
Binary semantic Similarity Comparison based on software gene
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Sun, Wenjie Chen, Yihang Shan, Zheng Liu, Fudong Wang, Qiuna State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Materials Branch of State Grid Henan Electric Power Company Zhengzhou China
The similarity of binary code is widely used in code copyright protection, vulnerability mining, malicious code analysis and etc. In this paper, we proposed a method for measuring/evaluating the similarity of two bina... 详细信息
来源: 评论
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
General Assembly and Scientific Symposium, URSI
作者: Yuan Gao Jiang Cao Yang Guo Ping Wang Siming Yang Jing Wang Weidang Lu Peiyuan Si Ming Zhao Xiao Wu Academy of Military Science of the PLA China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China College of Information Engineering Zhejiang University of Technology Hangzhou China Beijing National Research Center for Information Science and Technology (BNRist) Tsinghua University Beijing China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
Asynchronous Functional Brain Network Construction with Spatiotemporal Transformer for MCI Classification
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Tang, Xiang Zhang, Jianjia Wu, Xiaotong Zhou, Luping Wang, Lei Wu, Weiwen Shen, Dinggang The School of Biomedical Engineering Sun Yat-sen University China School of Electrical and Information Engineering University of Sydney Australia School of Computing and Information Technology University of Wollongong Australia The School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai201210 China Shanghai United Imaging Intelligence Company Ltd. Shanghai200230 China Shanghai Clinical Research and Trial Center Shanghai201210 China
Construction and analysis of functional brain networks (FBNs) with rs-fMRI is a promising method to diagnose functional brain diseases. Nevertheless, the existing methods suffer from several limitations. First, the fu... 详细信息
来源: 评论
High?Index?Faceted Ni_3S_2 Branch Arrays as Bifunctional Electrocatalysts for Efficient Water Splitting
收藏 引用
Nano-Micro Letters 2019年 第1期11卷 205-216页
作者: Shengjue Deng Kaili Zhang Dong Xie Yan Zhang Yongqi Zhang Yadong Wang Jianbo Wu Xiuli Wang Hong Jin Fan Xinhui Xia Jiangping Tu State Key Laboratory of Silicon Materials Key Laboratory of Advanced Materials and Applications for Batteries of Zhejiang Province and Department of Materials Science and Engineering Zhejiang University Guangdong Engineering and Technology Research Center for Advanced Nanomaterials School of Environment and Civil Engineering Dongguan University of Technology School of Physical and Mathematical Sciences Nanyang Technological University School of Engineering Nanyang Polytechnic Zhejiang Provincial Key Laboratory for Cutting Tools Taizhou University
For efficient electrolysis of water for hydrogen generation or other valueadded chemicals, it is highly relevant to develop low-temperature synthesis of low-cost and high-e ciency metal sulfide electrocatalysts on a l... 详细信息
来源: 评论
Semantic-based malware behavior description: Past and future  9
Semantic-based malware behavior description: Past and future
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Yang, Ping Shu, Hui Xiong, Xiaobing Kang, Fei State Key Laboratory of Mathematical Engineering Advanced University of Information and Engineering Zhengzhou450001 China
Traditional malware detection is faced with problems of low efficiency and high cost. In recent years, in order to improve the efficiency and accuracy of malware detection, a method based on semantic malware behavior ... 详细信息
来源: 评论