咨询与建议

限定检索结果

文献类型

  • 1,099 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,985 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,267 篇 工学
    • 704 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 170 篇 电气工程
    • 122 篇 控制科学与工程
    • 122 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 92 篇 光学工程
    • 79 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,011 篇 理学
    • 551 篇 物理学
    • 384 篇 数学
    • 122 篇 统计学(可授理学、...
    • 119 篇 化学
    • 115 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 deep neural netw...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 85 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1985 条 记 录,以下是851-860 订阅
排序:
DISCO Might Not Be Funky: Random Intelligent Reflective Surface Configurations That Attack
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Huan Dai, Lipeng Zhang, Hongliang Zhang, Chongfu Tian, Zhongxing Cai, Yi Swindlehurst, A. Lee Han, Zhu The School of Electronic and Information Engineering Soochow University Suzhou215006 China The School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China The State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Peking University Beijing100871 China The Center for Pervasive Communications and Computing University of California IrvineCA92697 United States The University of Houston HoustonTX77004 United States
Emerging intelligent reflective surfaces (IRSs) significantly improve system performance, but also pose a significant risk for physical layer security (PLS). Unlike the extensive research on legitimate IRS-enhanced co... 详细信息
来源: 评论
Extracting hidden messages of MLSB steganography based on optimal stego subset
收藏 引用
Science China(Information Sciences) 2018年 第11期61卷 241-243页
作者: Chunfang YANG Xiangyang LUO Jicang LU Fenlin LIU Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,In recent years, steganalysis researchers have tried their best to extract the hidden messages. For example, under the condition of a known embedding position generator, Liu et al.[1] proposed a collision ... 详细信息
来源: 评论
Double JPEG Compression Detection Based on Markov Model  18th
Double JPEG Compression Detection Based on Markov Model
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yung-Qing Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images ... 详细信息
来源: 评论
Ultra-high-amplitude Peregrine solitons induced by helicoidal spin-orbit coupling
arXiv
收藏 引用
arXiv 2024年
作者: Ding, Cui-Cui Zhou, Qin Malomed, B.A. Research Group of Nonlinear Optical Science and Technology Research Center of Nonlinear Science School of Mathematical and Physical Sciences Wuhan Textile University Wuhan430200 China State Key Laboratory of New Textile Materials and Advanced Processing Technologies Wuhan Textile University Wuhan430200 China Department of Physical Electronics School of Electrical Engineering Faculty of Engineering The Center for Light-Matter University Tel Aviv University Tel Aviv Israel Instituto de Alta Investigación Universidad de Tarapacá Casilla 7D Arica Chile
In the framework of the model of a spatially non-uniform Bose-Einstein condensate with helicoidal spin-orbit (SO) coupling, we find abnormal Peregrine solitons (PSs) on top of flat and periodic backgrounds, with ultra... 详细信息
来源: 评论
Observation of giant nonlinear valley Hall effect
arXiv
收藏 引用
arXiv 2025年
作者: He, Pan Zhang, Min Cao, Jin Li, Jingru Liu, Hao Zhai, Jinfeng Wang, Ruibo Xiao, Cong Yang, Shengyuan A. Shen, Jian State Key Laboratory of Surface Physics Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai200433 China Hefei National Laboratory Hefei230088 China Institute of Applied Physics and Materials Engineering Faculty of Science and Technology University of Macau China Fudan University Shanghai200433 China Department of Physics Fudan University Shanghai China Shanghai Research Center for Quantum Sciences Shanghai China Zhangjiang Fudan International Innovation Center Fudan University Shanghai201210 China Collaborative Innovation Center of Advanced Microstructures Nanjing210093 China
The valley Hall effect (VHE) holds great promise for valleytronic applications by leveraging the valley degree of freedom. To date, research on VHE has focused on its linear response to an applied current, leaving non... 详细信息
来源: 评论
Hypermultiplexed Integrated-Photonics-based Tensor Optical Processor
arXiv
收藏 引用
arXiv 2024年
作者: Ou, Shaoyuan Xue, Kaiwen Zhou, Lian Lee, Chun-Ho Sludds, Alexander Hamerly, Ryan Zhang, Ke Feng, Hanke Kopparapu, Reshma Zhong, Eric Wang, Cheng Englund, Dirk Yu, Mengjie Chen, Zaijun Ming Hsieh Department of Electrical and Computer Engineering University of Southern California Los AngelesCA90089 United States Research Laboratory of Electronics MIT CambridgeMA02139 United States PHI Laboratories NTT Research Inc. 940 Stewart Drive SunnyvaleCA94085 United States Department of Electrical Engineering State Key Laboratory of Terahertz and Millimeter Waves City University of Hong Kong Kowloon Hong Kong School of Advanced Computing University of Southern California Los AngelesCA90089 United States Opticore Inc. Los AngelesCA90007 United States
The escalating data volume and complexity resulting from the rapid expansion of artificial intelligence (AI), internet of things (IoT) and 5G/6G mobile networks is creating an urgent need for energy-efficient, scalabl... 详细信息
来源: 评论
PreZ-DGGAN: A Drug Graph GAN Based on Pre-Learning of Implicit Variables  2nd
PreZ-DGGAN: A Drug Graph GAN Based on Pre-Learning of Implic...
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Liu, Yixin Fan, Yueqin Li, Zhipeng Zhang, Qinhu Big Data and Intelligent Computing Research Center Guangxi Academy of Science Nanning530007 China School of Mechanical Engineering Guangxi University Nanning530004 China Ningbo Institute of Digital Twin Eastern Institute of Technology Ningbo315201 China Institute for Regenerative Medicine Medical Innovation Center and State Key Laboratory of Cardiology School of Medicine Shanghai East Hospital Tongji University Shanghai200123 China College of Advanced Agricultural Sciences Zhejiang Agriculture and Forestry University Hangzhou311300 China
In the field of drug discovery and development, deep learning techniques have become a powerful tool to accelerate the discovery and development of new drugs. In the design and optimization of lead molecules, generati... 详细信息
来源: 评论
Representation Learning on Networks for Community Detection
Representation Learning on Networks for Community Detection
收藏 引用
International Conference on advanced Cloud and Big Data (CBD)
作者: Jingya Zhou Jianxi Fan Jin Wang Baolei Cheng School of Computer Science and Technology Soochow University Suzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Community detection is a fundamental problem in network analysis. In recent years, network representation learning has been leveraged to help the detection of potential communities. However, representation learning an... 详细信息
来源: 评论
Recurrent Neural Network Based Binary Code Vulnerability Detection
Recurrent Neural Network Based Binary Code Vulnerability Det...
收藏 引用
2019第二届算法、计算和人工智能国际会议
作者: Jianyun Zheng Jianmin Pang Xiaochuan Zhang Xin Zhou MingLiang Li Jun Wang State Key Laboratory of Mathematical Engineering and Advanced Computing
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network(RNN) b... 详细信息
来源: 评论
A Framework for Multi-Variant Execution Environment
A Framework for Multi-Variant Execution Environment
收藏 引用
作者: Wang Junchao Liu Zhenwu Liu Hao Pang Jianmin State key Laboratory of Mathematical Engineering and Advanced Computing
Software diversity has been proven to be an effective approach to enhance system *** make the best of the advantage brought by software diversity,a multi-variant execution environment is ***,although some MVEEs have b... 详细信息
来源: 评论