咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1989 条 记 录,以下是791-800 订阅
排序:
A CGAN-LSTM-Based Framework for Time-Varying Non-Stationary Channel Modeling
arXiv
收藏 引用
arXiv 2025年
作者: Guo, keying He, Ruisi Yang, Mi Zhang, Yuxin Ai, Bo Zhang, Haoxiang Han, Jiahui Chen, Ruifeng School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China State Key Laboratory of Advanced Rail Autonomous Operation Frontiers Science Center for Smart High-speed Railway System Beijing Jiaotong University Beijing100044 China China Academy of Industrial Internet Ministry of Industry and Information Technology Beijing China Institute of Computing Technology China Academy of Railway Sciences Corporation Limited Beijing100081 China
Time-varying non-stationary channels, with complex dynamic variations and temporal evolution characteristics, have significant challenges in channel modeling and communication system performance evaluation. Most exist... 详细信息
来源: 评论
A new static vulnerabilities analysis algorithm for PHP codes  3
A new static vulnerabilities analysis algorithm for PHP code...
收藏 引用
3rd Annual International Conference on Network and Information Systems for Computers, ICNISC 2017
作者: Yan, Xue-Xiong Ma, Heng-Tai Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Beijing China
as for detecting taint-style vulnerabilities in PHP codes, this paper introduces function calling control vulnerability, which is a new kind of taint-style vulnerabilities in PHP codes without sensitive function, and ... 详细信息
来源: 评论
Ultraclean Surface of Garnet-Type Electrolyte Enables Low Interfacial Resistance in Solid-state Lithium Batteries
SSRN
收藏 引用
SSRN 2022年
作者: Qin, Zhiwei Xie, Yuming Meng, Xiangchen Qian, Delai Shan, Cheng Mao, Dongxin He, Gang Zheng, Zhen Wan, Long Huang, Yongxian X. State Key Laboratory of Advanced Welding and Joining Harbin Institute of Technology Harbin150001 China School of Materials Science and Engineering Harbin Institute of Technology Harbin150001 China Center for Analysis Measurement and Computing Harbin Institute of Technology Harbin150001 China
Solid-state lithium batteries (SSLBs) with garnet-type Li6.5La3Zr1.5Ta 0.5O12 (LLZTO) are one of the most promising candidates for next-generation energy storage system due to their high safety and high stability agai... 详细信息
来源: 评论
Retraction Note: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2024年 第1期15卷 245-245页
作者: Bao, Zhenkun Guo, Yanqing Li, Xiaolong Zhang, Yi Xu, Meng Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou Science and Technology Institute Zhengzhou China School of Information and Communication Engineering Dalian University of Technology Dalian China Institute of Information Science Beijing Jiaotong University Beijing China
来源: 评论
Neural Manifold Learning Based on 40 nm Dual-Mode PCM Compute-in-Memory Chip with Hardware Adaptive Drift Compensation
Neural Manifold Learning Based on 40 nm Dual-Mode PCM Comput...
收藏 引用
International Electron Devices Meeting (IEDM)
作者: Longhao Yan Yuqi Li Xi Li Zelun Pan Zeyu Wang Xile Wang Bowen Wang Zhe Zhan Xiyuan Tang Yaoyu Tao Woo-Ping Ge Zhitang Song Ru Huang Yuchao Yang Beijing Advanced Innovation Center for Integrated Circuits School of Integrate Circuits Peking University Beijing China State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Center for Brain Inspired Intelligence Chinese Institute for Brain Research (CIBR) Beijing China Center for Brain Inspired Chips Institute for Artificial Intelligence Peking University Beijing China Guangdong Provincial Key Laboratory of In-Memory Computing Chips School of Electronic and Computer Engineering Peking University Shenzhen China
Neural manifold learning (NML), as a significant research topic in the field of neuroscience, plays a vital role in the realization of intelligent brain-computer interface (BCI) at the edge. However, traditional edge ... 详细信息
来源: 评论
Interface engineering for Garnet-Type Electrolyte Enables Low Interfacial Resistance in Solid-state Lithium Batteries
SSRN
收藏 引用
SSRN 2022年
作者: Qin, Zhiwei Xie, Yuming Meng, Xiangchen Qian, Delai Shan, Cheng Mao, Dongxin He, Gang Zheng, Zhen Wan, Long Huang, Yongxian State Key Laboratory of Advanced Welding and Joining Harbin Institute of Technology Harbin150001 China School of Materials Science and Engineering Harbin Institute of Technology Harbin150001 China Center for Analysis Measurement and Computing Harbin Institute of Technology Harbin150001 China
Solid-state lithium batteries (SSLBs) with garnet-type Li6.5La3Zr1.5Ta0.5O12 (LLZTO) are one of the most promising candidates for next-generation energy storage system due to their high safety and high stability again... 详细信息
来源: 评论
High-capacity and Robust Image Watermarking Algorithm
Research Square
收藏 引用
Research Square 2021年
作者: Liu, Zheng Li, Xi-Yan Zhou, Qing-Lei Sun, Hanqing Lian, Weimin Wang, Guizhi School of Information Engineering Henan University of Animal Husbandry and Economy Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Information Science and Technology HaiNan Normal University Haikou China School of Information Engineering Zhengzhou University Zhengzhou China
With the development of internet, digital media can be manipulated, reproduced, and distributed conveniently over networks. However, illegal copy, transmission and distribution of digital media become an important sec... 详细信息
来源: 评论
Stabilization of Continuous-Time Markov/Semi-Markov Jump Linear Systems Via Finite Data-Rate Feedback
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Jingyi Feng, Jianwen Xu, Chen Wu, Xiaoqun Lü, Jinhu College of Mathematics and Statistics Shenzhen University Shenzhen518060 China School of Mathematics and Statistics Hubei Key Laboratory of Computational Science Wuhan University Wuhan China State Key Laboratory of Software Development Environment School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China
This letter investigates almost sure exponential stabilization of continuous-time Markov jump linear systems (MJLSs) under communication data-rate constraints by introducing sampling and quantization into the feedback... 详细信息
来源: 评论
A survey of coverage-guided greybox fuzzing with deep neural models
收藏 引用
Information and Software Technology 2025年 186卷
作者: Junyang Qiu Yupeng Jiang Yuantian Miao Wei Luo Lei Pan Xi Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214123 China School of Computing Macquarie University Sydney 2109 NSW Australia School of Information and Physical Sciences University of Newcastle Newcastle 2308 NSW Australia School of Information Technology Deakin University Melbourne 3125 VIC Australia
Coverage-guided greybox fuzzing (CGF) has emerged as a powerful technique for software vulnerability detection, yet traditional techniques often struggle with the increasing complexity of modern software systems and t... 详细信息
来源: 评论
Multi-Variant Execution Research of Software Diversity
Multi-Variant Execution Research of Software Diversity
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Liu, Zhenwu Zhang, Zheng Zhang, Jiexin Liu, Hao State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University ZhengZhou HeNan450001 China
As more and more software products are threatened by malicious reverse analysis, along with software products are pirated, tampered with and so on, it is of great significance to study software security protection tec... 详细信息
来源: 评论