咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 168 篇 电气工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,007 篇 理学
    • 550 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 117 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,861 篇 英文
  • 59 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1962 条 记 录,以下是361-370 订阅
排序:
Self-Dual Hadamard Bent Sequences
收藏 引用
Journal of Systems Science & Complexity 2023年 第2期36卷 894-908页
作者: SHI Minjia LI Yaya CHENG Wei CRNKOVIC Dean KROTOV Denis SOLéPatrick Key Laboratory of Intelligent Computing Signal Processing Ministry of EducationSchool of Mathematical SciencesAnhui UniversityHefei 230601China State Key Laboratory of Information Security(Institute of Information Engineering) Chinese Academy of SciencesBeijing 100093China. LTCI Télécom ParisParis91120 PalaiseauFrance Secure-IC S.A.S. 104 Bd du Montparnasse75014 Paris Faculty of Mathematics University of RijekaNovosibirsk 630090Russia Sobolev Institute of Mathematics Novosibirsk 630090Russia Aix Marseille Univ CNRSCentrale MarseilleI2MMarseilleFrance
A new notion of bent sequence related to Hadamard matrices was introduced recently,motivated by a security application(Solé,et al.,2021).The authors study the self-dual class in length at most *** authors use thr... 详细信息
来源: 评论
Simulation detection based on single photon quantum key distribution protocol
Simulation detection based on single photon quantum key dist...
收藏 引用
2020 International Conference on Electronics, Communications and Information Technology, CECIT 2020
作者: Liu, X.N. Hu, C.C. Yin, M.J. Jin, L. School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论
Dual-axial self-attention network for text classification
收藏 引用
Science China(Information Sciences) 2021年 第12期64卷 80-90页
作者: Xiaochuan ZHANG Xipeng QIU Jianmin PANG Fudong LIU Xingwei LI State Key Laboratory of Mathematical Engineering and Advanced Computing Shanghai Key Laboratory of Intelligent Information Processing Fudan University School of Computer Science Fudan University
Text classification is an important task in natural language processing and numerous studies aim to improve the accuracy and efficiency of text classification models. In this study, we propose an effective and efficie... 详细信息
来源: 评论
A Software Diversity-Based Lab in Operating System for Cyber Security Students  3
A Software Diversity-Based Lab in Operating System for Cyber...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Wang, Junchao Pang, Jianmin Shan, Zheng Wei, Jin Yao, Jinyang Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zheng Zhou China School of Computer Science Data Arena Institute Fudan University Zheng Zhou China
The course of operating system's labs usually fall behind the state of art technology. In this paper, we propose a Software Diversity-Assisted Defense (SDAD) lab based on software diversity, mainly targeting for s... 详细信息
来源: 评论
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed Signals on Coprime Array
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed ...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Heng Jiang Lichun Li Hailong Zhang Hongyi Pan Xue Li College of Information System Engineering Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The coprime array constructs virtual array to obtain higher degrees of freedom (DOF), but the premise of doing so is that the signals are independent of each other. Once there are coherent signals, the signal model of... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model  7th
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Zhang, Wenning Zhou, Qinglei Jiao, Chongyang Xu, Ting State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China Zhongyuan University of Technology Zhengzhou450000 China Zhengzhou University Zhengzhou450000 China
To solve the emerging complex optimization problems, multi objective optimization algorithms are needed. By introducing the surrogate model for approximate fitness calculation, the multi objective firefly algorithm wi... 详细信息
来源: 评论
Mechanistic investigation of highly bendable magnesium alloy sheet fabricated by short-process manufacturing
收藏 引用
Journal of Magnesium and Alloys 2024年 第10期12卷 4289-4310页
作者: Shiwei Xu Peijie Xiao Xiaofan Wu John Holmes Frédéric Mompiou Zhenyu Xiao Chen Jin Tianjiao Li Kuaishe Wang Zhuoran Zeng College of Mechanical and Vehicle Engineering Hunan UniversityChangsha 410082China State Key Laboratory of Advanced Design and Manufacturing Technology for Vehicle Hunan UniversityChangsha 410082China Suzhou Research Institute of Hunan University Suzhou 215131China College of Engineering Computing and CyberneticAustralian National UniversityACT 2601Australia CEMES-CNRS Universitéde Toulouse29 rue J.MarvigToulouse 31055France Qinghai Salt Lake Teli Magnesium Co. Ltd.Xining 810000China International Joint Laboratory for Light Alloys(Ministry of Education) College of Materials Science and EngineeringChongqing UniversityChongqing 400044China School of Metallurgical Engineering Xi’an University of Architecture&TechnologyXi’an 710055China College of Materials Science and Engineering Hunan UniversityChangsha 410082China
In this study,a commercial magnesium alloy AZ31(Mg-3Al-1Zn-0.3Mn)sheet through a short manufacturing process was found to be ductile and highly formable in *** possessing a strong basal texture,the short-processed she... 详细信息
来源: 评论
Adversarial Example Attacks Against Intelligent Malware Detection: A Survey
Adversarial Example Attacks Against Intelligent Malware Dete...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xuyan Qi Yonghe Tang Huanwei Wang Tieming Liu Jing Jing State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin... 详细信息
来源: 评论
A software upgrade security analysis method on network traffic classification using deep learning
A software upgrade security analysis method on network traff...
收藏 引用
2020 International Conference on Urban engineering and Management Science, ICUEMS 2020
作者: Zhang, Bing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论