咨询与建议

限定检索结果

文献类型

  • 1,112 篇 期刊文献
  • 889 篇 会议
  • 1 册 图书

馆藏范围

  • 2,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 709 篇 计算机科学与技术...
    • 576 篇 软件工程
    • 181 篇 信息与通信工程
    • 180 篇 电子科学与技术(可...
    • 173 篇 电气工程
    • 128 篇 控制科学与工程
    • 124 篇 化学工程与技术
    • 106 篇 材料科学与工程(可...
    • 96 篇 生物工程
    • 92 篇 光学工程
    • 81 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 51 篇 生物医学工程(可授...
    • 45 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,023 篇 理学
    • 555 篇 物理学
    • 384 篇 数学
    • 121 篇 化学
    • 121 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 81 篇 地球物理学
    • 60 篇 系统科学
  • 223 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 31 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 software
  • 24 篇 cryptography
  • 20 篇 malware
  • 19 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 625 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,743 篇 英文
  • 218 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
2002 条 记 录,以下是411-420 订阅
排序:
On the Sharing-Based Model of Steganography  19th
On the Sharing-Based Model of Steganography
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Xianfeng Yang, Chunfang Liu, Fenlin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100195 China School of Cyber Security University of Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Steganography has long been considered as a way of hiding the fact of secret communication. However, the fact that a message sender and a receiver communicated with each other is seldom protected. It can be dangerous ... 详细信息
来源: 评论
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by Distributed Ledger Technology and Internet of Things  23
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gao, Haoyu Li, Leixiao Lin, Hao Chang, Xiangyang Wan, Jianxiong Li, Jie Zhu, Fangyuan College of Data Science and Application Inner Mongolia University of Technology China Inner Mongolia Autonomous Reg. Eng. and Technol. Research Center of Big Data Based Software Service China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
P2P Botnet is famous for the resilience against termination. However, its dependence on Neighbor List (NL) makes it susceptible to infiltration and poison, also leading to a dearth of adequate protection of Botmaster&... 详细信息
来源: 评论
Exploration and research of blended learning in the "principles of computer organization"  2
Exploration and research of blended learning in the "princip...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Hou, Yifan Wang, Wei Liu, Fudong Shan, Zheng Wang, Junchao Wang, Lixin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
The'Principles of Computer Organization' is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the 'Principles of Computer Organizati... 详细信息
来源: 评论
The Propagation Strategy Model of Taint Analysis  4
The Propagation Strategy Model of Taint Analysis
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Ren, Yuzhu Zhao, Jiangtao Zhang, Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
来源: 评论
LinNet: Linear Network for Efficient Point Cloud Representation Learning  38
LinNet: Linear Network for Efficient Point Cloud Representat...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Deng, Hao Jing, Kunlei Cheng, Shengmei Liu, Cheng Ru, Jiawei Bo, Jiang Wang, Lin State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services School of Information Science and Technology Northwest University China Shaanxi Key Laboratory of Higher Education Institution of Generative Artificial Intelligence and Mixed Reality China School of Software Engineering Xi'an Jiaotong University China Department of Computing The Hong Kong Polytechnic University Hong Kong
Point-based methods have made significant progress, but improving their scalability in large-scale 3D scenes is still a challenging problem. In this paper, we delve into the point-based method and develop a simpler, f...
来源: 评论
MC-RGCN: A Multi-Channel Recurrent Graph Convolutional Network to Learn High-Order Social Relations for Diffusion Prediction
MC-RGCN: A Multi-Channel Recurrent Graph Convolutional Netwo...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Ningbo Huang Gang Zhou Mengli Zhang Meng Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Information diffusion prediction aims to predict the tendency of information spreading in the network. Previous methods focus on extracting chronological features from diffusion paths and leverage relations in social ... 详细信息
来源: 评论
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xiaocan Yin, Qilin Liu, Jiarui Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China Alibaba Group Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 China
Talking face generation (TFG) allows for producing lifelike talking videos of any character using only facial images and accompanying text. Abuse of this technology could pose significant risks to society, creating th... 详细信息
来源: 评论
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph
ZeroDVS: Trace-Ability and Security Detection of Container I...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Yan Zheng Weiyu Dong Jiangtao Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
Docker image is the foundation for container operation. Docker Hub is the largest online repository of public container images. Users can upload and download any random image file to the hub due to the absence of adeq... 详细信息
来源: 评论
mathematical modeling of lunar soft landing —Take chang'e-3 as an example
Mathematical modeling of lunar soft landing —Take chang'e-3...
收藏 引用
IEEE International Conference on Automation, Electronics and Electrical engineering (AUTEEE)
作者: Benchao Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, the three-dimensional sphere dynamic model of lunar precise soft landing of the probe is discussed. Taking the National College Students' mathematical modeling competition as the background and Chan... 详细信息
来源: 评论
A Novel Feature Selection Strategy Based on Salp Swarm Algorithm for Plant Disease Detection
收藏 引用
Plant Phenomics 2023年 第2期5卷 209-225页
作者: Xiaojun Xie Fei Xia Yufeng Wu Shouyang Liu Ke Yan Huanliang Xu Zhiwei Ji College of Artificial Intelligence Nanjing Agricultural UniversityNanjingJiangsu 210095China Center for Data Science and Intelligent Computing Nanjing Agricultural UniversityNanjingJiangsu 210095China State Key Laboratory for Crop Genetics and Germplasm Enhancement Bioinformatics CenterAcademy for Advanced Interdisciplinary StudiesNanjing Agricultural UniversityNanjingJiangsu 210095China Academy for Advanced Interdisciplinary Studies Nanjing Agricultural UniversityNanjingJiangsu 210095China Department of the Built Environment College of Design and EngineeringNational University of Singapore4 Architecture DriveSingapore 117566Singapore
Deep learning has been widely used for plant disease recognition in smart agriculture and has proven to be a powerful tool for image classification and pattern ***,it has limited interpretability for deep *** the tran... 详细信息
来源: 评论