咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1989 条 记 录,以下是811-820 订阅
排序:
Maximal coin-walker entanglement in a ballistic quantum walk
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Rong Yang, Ran Guo, Jian Sun, Chang-Wei Duan, Jia-Chen Zhou, Heng Xie, Zhenda Xu, Ping Gong, Yan-Xiao Zhu, Shi-Ning National Laboratory of Solid State Microstructure School of Physics School of Electronic Science and Engineering Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing210093 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunication Nanjing210023 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computing National University of Defense Technology Changsha410073 China
We report the position-inhomogeneous quantum walk (IQW) can be utilized to produce the maximal high dimensional entanglement while maintaining the quadratic speedup spread of the wave-function. Our calculations show t... 详细信息
来源: 评论
SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts
SmartGift: Learning to Generate Practical Inputs for Testing...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Teng Zhou Kui Liu Li Li Zhe Liu Jacques Klein Tegawendé F. Bissyandé Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Monash University Melbourne Australia Interdisciplinary Centre for Security Reliability and Trust (SnT) University of Luxembourg Luxembourg
With the boom of Initial Coin Offerings (ICO) in the financial markets, smart contracts have gained rapid popularity among consumers. Smart contract vulnerabilities however made them a prime target to malicious attack...
来源: 评论
Binary semantic Similarity Comparison based on software gene
Binary semantic Similarity Comparison based on software gene
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Sun, Wenjie Chen, Yihang Shan, Zheng Liu, Fudong Wang, Qiuna State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Materials Branch of State Grid Henan Electric Power Company Zhengzhou China
The similarity of binary code is widely used in code copyright protection, vulnerability mining, malicious code analysis and etc. In this paper, we proposed a method for measuring/evaluating the similarity of two bina... 详细信息
来源: 评论
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
General Assembly and Scientific Symposium, URSI
作者: Yuan Gao Jiang Cao Yang Guo Ping Wang Siming Yang Jing Wang Weidang Lu Peiyuan Si Ming Zhao Xiao Wu Academy of Military Science of the PLA China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China College of Information Engineering Zhejiang University of Technology Hangzhou China Beijing National Research Center for Information Science and Technology (BNRist) Tsinghua University Beijing China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
Asynchronous Functional Brain Network Construction with Spatiotemporal Transformer for MCI Classification
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Tang, Xiang Zhang, Jianjia Wu, Xiaotong Zhou, Luping Wang, Lei Wu, Weiwen Shen, Dinggang The School of Biomedical Engineering Sun Yat-sen University China School of Electrical and Information Engineering University of Sydney Australia School of Computing and Information Technology University of Wollongong Australia The School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai201210 China Shanghai United Imaging Intelligence Company Ltd. Shanghai200230 China Shanghai Clinical Research and Trial Center Shanghai201210 China
Construction and analysis of functional brain networks (FBNs) with rs-fMRI is a promising method to diagnose functional brain diseases. Nevertheless, the existing methods suffer from several limitations. First, the fu... 详细信息
来源: 评论
High?Index?Faceted Ni_3S_2 Branch Arrays as Bifunctional Electrocatalysts for Efficient Water Splitting
收藏 引用
Nano-Micro Letters 2019年 第1期11卷 205-216页
作者: Shengjue Deng Kaili Zhang Dong Xie Yan Zhang Yongqi Zhang Yadong Wang Jianbo Wu Xiuli Wang Hong Jin Fan Xinhui Xia Jiangping Tu State Key Laboratory of Silicon Materials Key Laboratory of Advanced Materials and Applications for Batteries of Zhejiang Province and Department of Materials Science and Engineering Zhejiang University Guangdong Engineering and Technology Research Center for Advanced Nanomaterials School of Environment and Civil Engineering Dongguan University of Technology School of Physical and Mathematical Sciences Nanyang Technological University School of Engineering Nanyang Polytechnic Zhejiang Provincial Key Laboratory for Cutting Tools Taizhou University
For efficient electrolysis of water for hydrogen generation or other valueadded chemicals, it is highly relevant to develop low-temperature synthesis of low-cost and high-e ciency metal sulfide electrocatalysts on a l... 详细信息
来源: 评论
Semantic-based malware behavior description: Past and future  9
Semantic-based malware behavior description: Past and future
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Yang, Ping Shu, Hui Xiong, Xiaobing Kang, Fei State Key Laboratory of Mathematical Engineering Advanced University of Information and Engineering Zhengzhou450001 China
Traditional malware detection is faced with problems of low efficiency and high cost. In recent years, in order to improve the efficiency and accuracy of malware detection, a method based on semantic malware behavior ... 详细信息
来源: 评论
Joint Beamforming Design for Intelligent Omni Surface Assisted Wireless Communication Systems
arXiv
收藏 引用
arXiv 2022年
作者: Cai, Wenhao Li, Ming Liu, Yang Wu, Qingqing Liu, Qian The School of Information and Communication Engineering Dalian University of Technology Dalian116024 China The State Key Laboratory of Internet of Things for Smart City University of Macau 999078 China Guangdong-Macau Joint Laboratory for Advanced and Intelligent Computing China The School of Computer Science and Technology Dalian University of Technology Dalian116024 China
Intelligent reflecting surface (IRS) has been widely considered as one of the key enabling techniques for future wireless communication networks owing to its ability of dynamically controlling the phase shift of refle... 详细信息
来源: 评论
Structure-Preserving Operator Learning: Modeling the Collision Operator of Kinetic Equations
arXiv
收藏 引用
arXiv 2024年
作者: Lee, Jae Yong Schotthöfer, Steffen Xiao, Tianbai Krumscheid, Sebastian Frank, Martin Center for Artificial Intelligence and Natural Sciences Korea Institute for Advanced Study Seoul Korea Republic of Oak Ridge National Laboratory Computer Science and Mathematics Division Oak RidgeTN United States State Key Laboratory of High Temperature Gas Dynamics Centre for Interdisciplinary Research in Fluids Institute of Mechanics Chinese Academy of Sciences Beijing China School of Engineering Science University of Chinese Academy of Sciences Beijing China Karlsruhe Institute of Technology Scientific Computing Center Karlsruhe76131 Germany
This work explores the application of deep operator learning principles to a problem in statistical physics. Specifically, we consider the linear kinetic equation, consisting of a differential advection operator and a... 详细信息
来源: 评论
Machine learning prediction of network dynamics with privacy protection
arXiv
收藏 引用
arXiv 2022年
作者: Xia, Xin Su, Yansen Lü, Linyuan Zhang, Xingyi Lai, Ying-Cheng Zhang, Hai-Feng The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Mathematical Science Anhui University Hefei230601 China The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Anhui University Hefei230601 China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu610054 China School of Electrical Computer and Energy Engineering Arizona State University TempeAZ85287 United States
Predicting network dynamics based on data, a problem with broad applications, has been studied extensively in the past, but most existing approaches assume that the complete set of historical data from the whole netwo... 详细信息
来源: 评论