咨询与建议

限定检索结果

文献类型

  • 1,112 篇 期刊文献
  • 889 篇 会议
  • 1 册 图书

馆藏范围

  • 2,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 709 篇 计算机科学与技术...
    • 576 篇 软件工程
    • 181 篇 信息与通信工程
    • 180 篇 电子科学与技术(可...
    • 173 篇 电气工程
    • 128 篇 控制科学与工程
    • 124 篇 化学工程与技术
    • 106 篇 材料科学与工程(可...
    • 96 篇 生物工程
    • 92 篇 光学工程
    • 81 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 51 篇 生物医学工程(可授...
    • 45 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,023 篇 理学
    • 555 篇 物理学
    • 384 篇 数学
    • 121 篇 化学
    • 121 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 81 篇 地球物理学
    • 60 篇 系统科学
  • 223 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 31 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 software
  • 24 篇 cryptography
  • 20 篇 malware
  • 19 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 625 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,743 篇 英文
  • 218 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
2002 条 记 录,以下是311-320 订阅
排序:
Image Electronic Evidence Screening Based on Improved SSD  6
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Liu, Yafei Jiang, Liehui Liu, Tieming Zhang, Youwei Zhengzhou University Zhongyuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 249-251页
作者: Ting CHEN Xinghua LI Qingfeng CHENG School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist... 详细信息
来源: 评论
Metaheuristic Optimization Methods and Techniques for Multiple Sclerosis Detection  4th
Metaheuristic Optimization Methods and Techniques for Multip...
收藏 引用
4th International Conference on IoT and Big Data Technologies for Health Care, IotCare 2023
作者: Wang, Jiaji Wu, Meng Chen, Shuwen Zhu, Huisheng School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom School of Physics and Information Engineering Jiangsu Second Normal University Jiangsu Nanjing210016 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China
This paper explores the application of metaheuristic optimization methods in the context of Multiple Sclerosis (MS) detection, addressing the challenges of early and accurate diagnosis. It introduces Genetic Algorithm... 详细信息
来源: 评论
Lightweight DCT-Like Domain Forensics Model for Adversarial Example  19th
Lightweight DCT-Like Domain Forensics Model for Adversarial ...
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Junjie Wang, Jinwei Nanjing University of Information Science and Technology Jiangsu210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
Since the emergence of adversarial examples brings great security threat to deep neural network which is widely used in various fields, their forensics become very important. In this paper, a lightweight model for the... 详细信息
来源: 评论
Modelization and analysis of dynamic heterogeneous redundant system
Modelization and analysis of dynamic heterogeneous redundant...
收藏 引用
作者: Wang, Wei Li, Guangsong Gai, Keke Tang, Yazhe Yang, Benchao Si, Xueming State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Xi'an Jiaotong University Xi'an China Shanghai Key Laboratory of Data Science Fudan University Shanghai China
With the development and popularization of Internet technology, network security has become the focus of attention. Vulnerabilities and back doors are regarded as two of the main reasons of network security problems. ... 详细信息
来源: 评论
A Binary Function Name Prediction Method Based on Variable Alignment and Translation Model  23
A Binary Function Name Prediction Method Based on Variable A...
收藏 引用
Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application
作者: Bing Xia Jiabin Yin Yunxiang Ge Ruinan Yang Key Laboratory of Mathematical Engineering and Advanced Computing ZhongYuan University of Technology China Henan Key Laboratory on Public Opinion Intelligent Analysis ZhongYuan University of Technology China ZhongYuan University of Technology China
Binary function naming is a code analysis task that generates functional descriptions of functions, and its results can be applied in the fields of malicious code analysis, vulnerability causation analysis, and algori...
来源: 评论
Use Tabu Search Particle Swarm Optimization Algorithm to Detect COVID-19  4th
Use Tabu Search Particle Swarm Optimization Algorithm to Det...
收藏 引用
4th International Conference on IoT and Big Data Technologies for Health Care, IotCare 2023
作者: Chen, Shuwen Wang, Jiaji Zhu, Huisheng School of Physics and Information Engineering Jiangsu Second Normal University Jiangsu Nanjing210016 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom
Efficient and accurate COVID-19 detection methods are paramount in the ongoing battle against the global pandemic. In this study, we present a novel approach that leverages the Tabu Search Particle Swarm Optimization ... 详细信息
来源: 评论
Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center
收藏 引用
Journal of Computer Science & Technology 2023年 第4期38卷 773-792页
作者: 田文洪 徐敏贤 周光耀 吴逵 须成忠 Rajkumar Buyya School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054China Yangtze Delta Region Institute(Huzhou) University of Electronic Science and Technology of ChinaHuzhou 313001China Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Department of Computer Science University of VictoriaVictoriaBCV8W 3P6Canada State Key Laboratory of Internet of Things for Smart City University of MacaoMacao 999078China School of Computing and Information Systems University of MelbourneMelbourne 3010Australia
Load balancing is vital for the efficient and long-term operation of cloud data *** virtualization,post(reactive)migration of virtual machines(VMs)after allocation is the traditional way for load balancing and consoli... 详细信息
来源: 评论
Breaking Limitation of Convergence in Continuous Optimization: Predefined-Time Gradient Flows  63
Breaking Limitation of Convergence in Continuous Optimizatio...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Zhang, Renyongkang Guo, Ge Gao, Zhenyu Yu, Miao Zhang, Lu Wang, Zhengsong Han, Meng Yin, Yanyan Northeastern University College of Information Science and Engineering Shenyang110819 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China Northeastern University at Qinhuangdao School of Control Engineering Qinhuangdao066004 China Curtin University School of Electrical Engineering Computing and Mathematical Sciences PerthWA6102 Australia
This paper investigates the continuous-time unconstrained optimization via dynamical gradient flow systems. For strongly convex objective functions, a gradient flow with predefined time convergence is proposed, which ... 详细信息
来源: 评论
Brillouin Klein space and half-turn space in three-dimensional acoustic crystals
收藏 引用
Science Bulletin 2024年 第13期69卷 2050-2058页
作者: Zhenxiao Zhu Linyun Yang Jien Wu Yan Meng Xiang Xi Bei Yan Jingming Chen Jiuyang Lu Xueqin Huang Weiyin Deng Ce Shang Perry Ping Shum Yihao Yang Hongsheng Chen Kexin Xiang Gui-Geng Liu Zhengyou Liu Zhen Gao State Key Laboratory of Optical Fiber and Cable Manufacture Technology Department of Electronic and Electrical EngineeringSouthern University of Science and TechnologyShenzhen 518055China School of Physics and Optoelectronics South China University of TechnologyGuangzhou 510640China Key Laboratory of Artificial Micro-and Nanostructures of Ministry of Education and School of Physics and Technology Wuhan UniversityWuhan 430072China King Abdullah University of Science and Technology(KAUST) Physical Science and Engineering Division(PSE)Thuwal 23955-6900Saudi Arabia Interdisciplinary Center for Quantum Information State Key Laboratory of Modern Optical InstrumentationZJU-Hangzhou Global Science and Technology Innovation CenterCollege of Information Science and Electronic EngineeringZJU-UIUC InstituteZhejiang UniversityHangzhou 310027China Division of Physics and Applied Physics School of Physical and Mathematical SciencesNanyang Technological UniversitySingapore 637371Singapore Institute for Advanced Studies Wuhan UniversityWuhan 430072China
The Bloch band theory and Brillouin zone(BZ)that characterize wave-like behaviors in periodic mediums are two cornerstones of contemporary physics,ranging from condensed matter to topological *** theoretical breakthro... 详细信息
来源: 评论