咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 168 篇 电气工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,007 篇 理学
    • 550 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 117 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,861 篇 英文
  • 59 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1962 条 记 录,以下是411-420 订阅
排序:
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
A Survey of Internet of Things in Healthcare  29th
A Survey of Internet of Things in Healthcare
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Chen, Shuwen Wang, Jiaji Song, Zhijun School of Physics and Information Engineering Jiangsu Second Normal University Nanjing211200 China School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom Jiangsu Province Engineering Research Center of Basic Education Big Data Application Nanjing211200 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China
With the rapid development of computers, Internet of Things (IoT) technology is becoming more and more closely integrated with the healthcare sector. This article introduces two major applications of IoT in healthcare... 详细信息
来源: 评论
Network Topology Overlapping Group Detection Based on h-Core Pruning  6
Network Topology Overlapping Group Detection Based on h-Core...
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Zhang, Qi Liu, Yan Cai, Yuheng Zhong Yuan Network Security Research Institute Zhengzhou University Zhengzhou China Pla Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The network group detection has a large number of application researches and has achieved certain results in network security, IP entity location and load balancing. However, due to the large scale of the network topo... 详细信息
来源: 评论
A Survey on Neural Machine Translation Applied to Sign Language Generation  3
A Survey on Neural Machine Translation Applied to Sign Langu...
收藏 引用
3rd International Conference on Applied Machine Learning, ICAML 2021
作者: Zhang, Yue Cao, Lihong State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China Neuroscience and Intelligent Media Institute Communication University of China Beijing100024 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is increasing at a rapid rate. There is a signifîcant com... 详细信息
来源: 评论
Research on Security Protocol Analysis Tool SmartVerif
Research on Security Protocol Analysis Tool SmartVerif
收藏 引用
2021 International Conference on Computer Technology, Information engineering and Electron Materials, CTIEEM 2021
作者: Lu, Siqi Han, Qingdi Miao, Xuyang Liu, Yubo State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450000 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450000 China Department of Information Science and Engineering Ocean University of China Shandong Qingdao266100 China
Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol... 详细信息
来源: 评论
Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 273-295页
作者: Yan Liu Wenyuan Fang Qiang Wei Yuan Zhao Liang Wang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China The School of Computing Newcastle UniversityNewcastle upon TyneNE45TGUK
Code defects can lead to software vulnerability and even produce vulnerability *** research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to som... 详细信息
来源: 评论
A Multi-DOF Robot System Based on LightGBM-Driven EEG Decoding Model for BCI Human-Machine Interaction  42
A Multi-DOF Robot System Based on LightGBM-Driven EEG Decodi...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Yan, Weidong Xu, Zhaoliang Li, Yang Beihang University The Department of Automation Science and Electrical Engineering Beijing100191 China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing100191 China Beihang University State Key Laboratory of Virtual Reality Technology and Systems Beijing100191 China Advanced Institute of Information Technology Peking University Hangzhou310000 China
In this study, a multi-degree-of-freedom (Multi-DOF) robot (MDR) system based on a LightGBM-driven electroencephalogram (EEG) decoding model is designed and developed to assist subjects with hand motor dysfunction in ... 详细信息
来源: 评论
Super-Resolution of Diffusion-Weighted Images via TDI-Conditioned Diffusion Model  15th
Super-Resolution of Diffusion-Weighted Images via TDI-Cond...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Ma, Jiquan Teng, Yujun Chen, Geng Jiang, Haotian Zhang, Kai Liu, Feihong Rekik, Islem Shen, Dinggang School of Computer Science and Technology Heilongjiang University Harbin China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an China School of Biomedical Engineering and State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China School of Information Science and Technology Northwest University Xi’an China BASIRA Lab Imperial-X and Department of Computing Imperial College London London United Kingdom
Diffusion-Weighted Imaging (DWI) is a significant technique for studying white matter. However, it suffers from low-resolution obstacles in clinical settings. Post-acquisition Super-Resolution (SR) can enhance the res... 详细信息
来源: 评论
Network security assessment based on full host-based attack graph  2020
Network security assessment based on full host-based attack ...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of advanced Technologies
作者: Xiao-fan Wang Tian-yang Zhou Jun-hu Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to... 详细信息
来源: 评论
Cross-Network User Matching Based on Association Strength
Cross-Network User Matching Based on Association Strength
收藏 引用
作者: Qiuyan Jiang Daofu Gong Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Qingdao Agricultural University
Cross-network user matching is the one of the fundamental problems in social network fusion and analysis. This paper proposes an unsupervised algorithm based on association strength to address this problem. Specifical... 详细信息
来源: 评论