咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1989 条 记 录,以下是521-530 订阅
排序:
Rotation Transformation: A Method to Improve the Transferability of Adversarial Examples
Rotation Transformation: A Method to Improve the Transferabi...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Zheming Li Hengwei Zhang Junqiang Ma Bo Yang Chenwei Li Jingwen Li State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China PLA Army Beijing China
Convolutional neural network models are fragile to adversarial examples. Adding disturbances that humans cannot observe in clean images can make the model classification error. Among the adversarial attack methods, wh... 详细信息
来源: 评论
Low dose PET image reconstruction using diffusion sampling with posterior iterative correction
Low dose PET image reconstruction using diffusion sampling w...
收藏 引用
IEEE Symposium on Nuclear Science (NSS/MIC)
作者: B. Qi R. Hu D. Wu N. Guo Q. Li H. Liu Department of Optical Engineering the State Key Laboratory of Modern Optical Instrumentation Zhejiang University Hangzhou China Massachusetts General Hospital/Harvard Medical School The Center for Advanced Medical Computing and Analysis Boston Massachusetts United States of America
Low dose PET image reconstruction is a crucial technique in functional imaging, addressing both patient safety and diagnostic needs by minimizing radioactive exposure. However, as dosage is reduced, the increasing noi... 详细信息
来源: 评论
NGDcrm:a numeric graph dependency-based conflict resolution method for knowledge graph
收藏 引用
High Technology Letters 2021年 第2期27卷 153-162页
作者: Ma Jiangtao Wang Yanjun Chen Xueting Qiao Yaqiong College of Computer and Communication Engineering Zhengzhou Universily of Lighl IndustryZhengzhou 450002P.R.China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002P.R.China School of Computer&Communication Engineering University of Science and Technology BeijingBeijing 100083P.R.China School of Information Engineering North China University of W ater Resources and Electric PowerZhengzhou 450046P.R.China
Knowledge graph(KG)conflict resolution is to solve knowledge conflicts problem in the construction of *** at the problem of KG conflict resolution,a KG conflict resolution algorithm NGDcrm is proposed,which is a numer... 详细信息
来源: 评论
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Bowen Wu, Chenggang Yew, Pen-Chung Zhang, Yinqian Xie, Mengyao Lai, Yuanming Kang, Yan Wang, Wei Wei, Qiang Wang, Zhe SKLP Institute of Computing Technology CAS Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Zhongguancun Laboratory Beijing China Computer Science & Engineering Department The University of Minnesota-Twin Cities MN55455 United States Department of Computer Science and Engineering The Southern University of Science and Technology Shenzhen518055 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Transient Execution Attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution to illegally access private data, and tra...
来源: 评论
Similarity Measure for Smart Contract Bytecode Based on CFG Feature Extraction
Similarity Measure for Smart Contract Bytecode Based on CFG ...
收藏 引用
Computer Information Science and Artificial Intelligence (CISAI), International Conference on
作者: Di Zhu Jianmin Pang Xin Zhou Wenjie Han Zhengzhou University Zhengzhou China Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As the mainstream of smart contract research, most Ethereum smart contracts do not open their source code, and the bytecode of smart contracts has attracted the attention of researchers. Based on the similarity measur... 详细信息
来源: 评论
Implementing a modified Smith predictor using chemical reaction networks and its application to protein translation  4
Implementing a modified Smith predictor using chemical react...
收藏 引用
4th International Conference on Industrial Artificial Intelligence, IAI 2022
作者: Xiao, Yijun Lv, Hui Wang, Xing'an School of Software Engineering Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Liaoning Dalian116622 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Liaoning Shenyang110004 China College of Environmental and Chemical Engineering Dalian University Liaoning Dalian116622 China Dalian Chivy Biotechnology Co. Ltd Liaoning Dalian116622 China
In this article, a special attention is paid to the biochemical controller synthesis for time delay systems and try to implement the well-established Smith predictor approach in the context of biochemical systems. The... 详细信息
来源: 评论
The Lattice Sieve Field Selection of Cado-NFS  2
The Lattice Sieve Field Selection of Cado-NFS
收藏 引用
2019 2nd International Conference on Computer Information Science and Artificial Intelligence, CISAI 2019
作者: Xue, Ping Chen, Shaozhen Fu, Zhixin Institute of Cyberspace Security PLA Information Engineering University Hennan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Hennan450001 China
The software application of the discrete logarithms on the "large" finite field is studied. The most effective algorithm for the problem is the general number field sieve (GNFS). Focusing on the theory of GN... 详细信息
来源: 评论
A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures
收藏 引用
Security and Communication Networks 2021年 第1期2021卷
作者: Ba, Yang Hu, Xuexian Chen, Yue Hao, Zenghang Li, Xuewei Yan, Xincheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Kunming Audit Center Kunming650001 China State Key Laboratory of Space Medicine Fundamentals and Application Beijing100094 China
Data sharing has become a key technology to break down data silos in the big data era. Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in secure data-sharing schemes to realize flexible and fine-g... 详细信息
来源: 评论
Auto-MatRegressor材料性能自动预测器:解放材料机器学习"调参师"
收藏 引用
Science Bulletin 2023年 第12期68卷 1259-1270,M0004页
作者: 刘悦 王双燕 杨正伟 Maxim Avdeev 施思齐 School of Computer Engineering and Science Shanghai UniversityShanghai 200444China Shanghai Engineering Research Center of Intelligent Computing System Shanghai 200444China State Key Laboratory of Advanced Special Steel School of Materials Science and EngineeringShanghai UniversityShanghai 200444China Materials Genome Institute Shanghai UniversityShanghai 200444China Zhejiang Laboratory Hangzhou 311100China Australian Nuclear Science and Technology Organisation Sydney 2232Australia School of Chemistry The University of SydneySydney 2006Australia
机器学习因其能够快速、精准拟合数据的潜在模式而被广泛应用于材料构效关系研究。然而,材料科学家往往需要进行繁琐的模型选择及参数寻优才能构建出高精度预测模型,为了解放材料机器学习"调参师",本文研发了基于元学习的材... 详细信息
来源: 评论
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
Telecommunications, Optics and Computer Science (TOCS), IEEE Conference on
作者: Zhuolun Li Fei Kang Pu Yu Hui Shu School of Software Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing MEAC Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论