咨询与建议

限定检索结果

文献类型

  • 1,112 篇 期刊文献
  • 889 篇 会议
  • 1 册 图书

馆藏范围

  • 2,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 709 篇 计算机科学与技术...
    • 576 篇 软件工程
    • 181 篇 信息与通信工程
    • 180 篇 电子科学与技术(可...
    • 173 篇 电气工程
    • 128 篇 控制科学与工程
    • 124 篇 化学工程与技术
    • 106 篇 材料科学与工程(可...
    • 96 篇 生物工程
    • 92 篇 光学工程
    • 81 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 51 篇 生物医学工程(可授...
    • 45 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,023 篇 理学
    • 555 篇 物理学
    • 384 篇 数学
    • 121 篇 化学
    • 121 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 81 篇 地球物理学
    • 60 篇 系统科学
  • 223 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 31 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 software
  • 24 篇 cryptography
  • 20 篇 malware
  • 19 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 625 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,743 篇 英文
  • 218 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
2002 条 记 录,以下是461-470 订阅
排序:
swRodinia: A Benchmark Suite for Exploiting Architecture Properties of Sunway Processor  3rd
swRodinia: A Benchmark Suite for Exploiting Architecture Pr...
收藏 引用
3rd BenchCouncil International Symposium on Benchmarking, Measuring, and Optimizing, Bench 2020
作者: Chen, Bangduo Li, Mingzhen Yang, Hailong Luan, Zhongzhi Gan, Lin Yang, Guangwen Qian, Depei School of Computer Science and Engineering Beihang University Beijing100191 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu214125 China Department of Computer Science and Technology Tsinghua University Beijing100084 China
The Sunway processor has been demonstrated with superior performance by various scientific applications, domain specific frameworks and numerical algorithms. However, the optimization techniques that can fully exploit... 详细信息
来源: 评论
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks  34
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
34th General Assembly and Scientific Symposium of the International Union of Radio Science, URSI GASS 2021
作者: Gao, Yuan Cao, Jiang Guo, Yang Wang, Ping Yang, Siming Wang, Jing Lu, Weidang Si, Peiyuan Zhao, Ming Wu, Xiao Academy of Military Science of the PLA 100091 China College of Information Engineering Zhejiang University of Technology Hangzhou China Tsinghua University Beijing100084 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
A Hybrid Loss Network for Localization of Image Manipulation  19th
A Hybrid Loss Network for Localization of Image Manipulation
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Yin, Qilin Wang, Jinwei Luo, Xiangyang Nanjing University of Information Science and Technology and Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China
With the development of information security, localization of image manipulations havs become a hot topic. In this paper, a hybrid loss network is proposed for the manipulated image forensics. First, the patch predict... 详细信息
来源: 评论
Collision attack framework on RIPEMD-128  2
Collision attack framework on RIPEMD-128
收藏 引用
2nd International Conference on Artificial Intelligence and advanced Manufacture, AIAM 2020
作者: Li, Jingyu Zeng, Guang Yang, Yang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Force Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In th... 详细信息
来源: 评论
Interaction-Aware Cut-In Trajectory Prediction and Risk Assessment in Mixed Traffic
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1752-1762页
作者: Xianglei Zhu Wen Hu Zejian Deng Jinwei Zhang Fengqing Hu Rui Zhou Keqiu Li Fei-Yue Wang the College of Intelligence and Computing Tianjin UniversityTianjin 300350 the China Automotive Technology and Research Center Co.Ltd. Tianjin 300300China the State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body College of Mechanical and Vehicle EngineeringHunan UniversityChangsha 410082China the Department of Mechanical and Mechatronics Engineering University of WaterlooWaterlooON N2L3G1Canada the School of Mechanical Engineering Beijing Institute of TechnologyBeijing 100081China the Macao University of Science and Technology MacaoChina the Waytous Inc. Qingdao 266000China IEEE the State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China
Accurately predicting the trajectories of surrounding vehicles and assessing the collision risks are essential to avoid side and rear-end collisions caused by *** improve the safety of autonomous vehicles in the mixed... 详细信息
来源: 评论
CRNet:3D Face Reconstruction with Contour Map Regression Network  6
CRNet:3D Face Reconstruction with Contour Map Regression Net...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Wei, Tongxin Li, Qingbao Liu, Jinjin School of Software Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing China
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D... 详细信息
来源: 评论
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Zuomin Lu, Wei Luo, Xiangyang Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China School of Cyber Science and Engineering Wuhan University Wuhan430072 China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen518107 China
The misuse of deep learning-based facial manipulation poses a significant threat to civil rights. To prevent this fraud at its source, proactive defense has been proposed to disrupt the manipulation process by adding ... 详细信息
来源: 评论
Numerical Solution for Nonlinear 4D Variational Data Assimilation (4D-Var) via ADMM
arXiv
收藏 引用
arXiv 2024年
作者: Li, Bowen Shi, Bin State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
The four-dimensional variational data assimilation (4D-Var) has emerged as an important methodology, widely used in numerical weather prediction, oceanographic modeling, and climate forecasting. Classical unconstraine... 详细信息
来源: 评论
Revocable Broadcast Encryption with Constant Ciphertext and Private key Size
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 690-697页
作者: JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei Zhengzhou University State Key Laboratory of Mathematical Engineering and Advanced Computing Nanjing University of Post and Communications
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo... 详细信息
来源: 评论
A survey of coverage-guided greybox fuzzing with deep neural models
收藏 引用
Information and Software Technology 2025年 186卷
作者: Qiu, Junyang Jiang, Yupeng Miao, Yuantian Luo, Wei Pan, Lei Zheng, Xi State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214123 China School of Computing Macquarie University Sydney 2109 NSW Australia School of Information and Physical Sciences University of Newcastle Newcastle 2308 NSW Australia School of Information Technology Deakin University Melbourne 3125 VIC Australia
Coverage-guided greybox fuzzing (CGF) has emerged as a powerful technique for software vulnerability detection, yet traditional techniques often struggle with the increasing complexity of modern software systems and t... 详细信息
来源: 评论