咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1989 条 记 录,以下是451-460 订阅
排序:
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks  34
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
34th General Assembly and Scientific Symposium of the International Union of Radio Science, URSI GASS 2021
作者: Gao, Yuan Cao, Jiang Guo, Yang Wang, Ping Yang, Siming Wang, Jing Lu, Weidang Si, Peiyuan Zhao, Ming Wu, Xiao Academy of Military Science of the PLA 100091 China College of Information Engineering Zhejiang University of Technology Hangzhou China Tsinghua University Beijing100084 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
swRodinia: A Benchmark Suite for Exploiting Architecture Properties of Sunway Processor  3rd
swRodinia: A Benchmark Suite for Exploiting Architecture Pr...
收藏 引用
3rd BenchCouncil International Symposium on Benchmarking, Measuring, and Optimizing, Bench 2020
作者: Chen, Bangduo Li, Mingzhen Yang, Hailong Luan, Zhongzhi Gan, Lin Yang, Guangwen Qian, Depei School of Computer Science and Engineering Beihang University Beijing100191 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu214125 China Department of Computer Science and Technology Tsinghua University Beijing100084 China
The Sunway processor has been demonstrated with superior performance by various scientific applications, domain specific frameworks and numerical algorithms. However, the optimization techniques that can fully exploit... 详细信息
来源: 评论
A Hybrid Loss Network for Localization of Image Manipulation  19th
A Hybrid Loss Network for Localization of Image Manipulation
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Yin, Qilin Wang, Jinwei Luo, Xiangyang Nanjing University of Information Science and Technology and Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China
With the development of information security, localization of image manipulations havs become a hot topic. In this paper, a hybrid loss network is proposed for the manipulated image forensics. First, the patch predict... 详细信息
来源: 评论
Collision attack framework on RIPEMD-128  2
Collision attack framework on RIPEMD-128
收藏 引用
2nd International Conference on Artificial Intelligence and advanced Manufacture, AIAM 2020
作者: Li, Jingyu Zeng, Guang Yang, Yang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Force Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In th... 详细信息
来源: 评论
Interaction-Aware Cut-In Trajectory Prediction and Risk Assessment in Mixed Traffic
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1752-1762页
作者: Xianglei Zhu Wen Hu Zejian Deng Jinwei Zhang Fengqing Hu Rui Zhou Keqiu Li Fei-Yue Wang the College of Intelligence and Computing Tianjin UniversityTianjin 300350 the China Automotive Technology and Research Center Co.Ltd. Tianjin 300300China the State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body College of Mechanical and Vehicle EngineeringHunan UniversityChangsha 410082China the Department of Mechanical and Mechatronics Engineering University of WaterlooWaterlooON N2L3G1Canada the School of Mechanical Engineering Beijing Institute of TechnologyBeijing 100081China the Macao University of Science and Technology MacaoChina the Waytous Inc. Qingdao 266000China IEEE the State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China
Accurately predicting the trajectories of surrounding vehicles and assessing the collision risks are essential to avoid side and rear-end collisions caused by *** improve the safety of autonomous vehicles in the mixed... 详细信息
来源: 评论
CRNet:3D Face Reconstruction with Contour Map Regression Network  6
CRNet:3D Face Reconstruction with Contour Map Regression Net...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Wei, Tongxin Li, Qingbao Liu, Jinjin School of Software Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing China
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D... 详细信息
来源: 评论
Numerical Solution for Nonlinear 4D Variational Data Assimilation (4D-Var) via ADMM
arXiv
收藏 引用
arXiv 2024年
作者: Li, Bowen Shi, Bin State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
The four-dimensional variational data assimilation (4D-Var) has emerged as an important methodology, widely used in numerical weather prediction, oceanographic modeling, and climate forecasting. Classical unconstraine... 详细信息
来源: 评论
Revocable Broadcast Encryption with Constant Ciphertext and Private key Size
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 690-697页
作者: JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei Zhengzhou University State Key Laboratory of Mathematical Engineering and Advanced Computing Nanjing University of Post and Communications
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo... 详细信息
来源: 评论
A Selection Strategy for Network Security Defense Based on a Time Game Model
A Selection Strategy for Network Security Defense Based on a...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Pengyu Sun Hengwei Zhang Junqiang Ma Chenwei Li Yan Mi Jindong Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net... 详细信息
来源: 评论
A Dual-Watermarking Scheme Robust to Affine Transformation
A Dual-Watermarking Scheme Robust to Affine Transformation
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Liu, Feng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou City Henan Province450000 China College of Software Engineering Zhengzhou University of Light Industry Zhengzhou City Henan Province450000 China
This paper proposes a robust watermarking algorithm based on dual watermarking and robust affine transformation. First, the color image is divided into three channels, feature point extraction, watermark embedding, an... 详细信息
来源: 评论