咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是311-320 订阅
排序:
Image Electronic Evidence Screening Based on Improved SSD  6
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Liu, Yafei Jiang, Liehui Liu, Tieming Zhang, Youwei Zhengzhou University Zhongyuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论
Lightweight DCT-Like Domain Forensics Model for Adversarial Example  19th
Lightweight DCT-Like Domain Forensics Model for Adversarial ...
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Junjie Wang, Jinwei Nanjing University of Information Science and Technology Jiangsu210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
Since the emergence of adversarial examples brings great security threat to deep neural network which is widely used in various fields, their forensics become very important. In this paper, a lightweight model for the... 详细信息
来源: 评论
APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite
收藏 引用
Computers, Materials & Continua 2020年 第11期65卷 1795-1807页
作者: Tairan Hu Tianyang Zhou Yichao Zang Qingxian Wang Hang Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China School of Electrical Engineering and Telecommunications UNSW KensingtonNSW 2033Australia
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning und... 详细信息
来源: 评论
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection  39
GLCF: A Global-Local Multimodal Coherence Analysis Framework...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Chen, Xiaocan Yin, Qilin Liu, Jiarui Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510006 China Alibaba Group Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 Macao
Talking face generation (TFG) allows for producing lifelike talking videos of any character using only facial images and accompanying text. Abuse of this technology could pose significant risks to society, creating th... 详细信息
来源: 评论
SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints  39
SUMI-IFL: An Information-Theoretic Framework for Image Forge...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau Macao School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Zuomin Lu, Wei Luo, Xiangyang Wang, Qian Cao, Xiaochun The School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Institute of Artificial Intelligence Sun Yat-sen University Guangzhou510006 China The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China The School of Cyber Science and Engineering Wuhan University Wuhan430072 China The School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen518107 China
—The misuse of deep learning-based facial manipulation poses a potential threat to civil rights. To prevent this fraud at its source, proactive defense technology was proposed to disrupt the manipulation process by a... 详细信息
来源: 评论
DPA-2:a large atomic model as a multitask learner
收藏 引用
npj Computational Materials 2024年 第1期10卷 185-199页
作者: Duo Zhang Xinzijian Liu Xiangyu Zhang Chengqian Zhang Chun Cai Hangrui Bi Yiming Du Xuejian Qin Anyang Peng Jiameng Huang Bowen Li Yifan Shan Jinzhe Zeng Yuzhi Zhang Siyuan Liu Yifan Li Junhan Chang Xinyan Wang Shuo Zhou Jianchuan Liu Xiaoshan Luo Zhenyu Wang Wanrun Jiang Jing Wu Yudi Yang Jiyuan Yang Manyi Yang Fu-Qiang Gong Linshuang Zhang Mengchao Shi Fu-Zhi Dai Darrin M.York Shi Liu Tong Zhu Zhicheng Zhong Jian Lv Jun Cheng Weile Jia Mohan Chen Guolin Ke Weinan E Linfeng Zhang Han Wang AI for Science Institute BeijingP.R.China DP Technology BeijingP.R.China Academy for Advanced Interdisciplinary Studies Peking UniversityBeijingP.R.China State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingP.R.China University of Chinese Academy of Sciences BeijingP.R.China HEDPS CAPTCollege of EngineeringPeking UniversityBeijingP.R.China Ningbo Institute of Materials Technology and Engineering Chinese Academy of SciencesNingboP.R.China CAS Key Laboratory of Magnetic Materials and Devices and Zhejiang Province Key Laboratory of Magnetic Materials and Application Technology Chinese Academy of SciencesNingboP.R.China School of Electronics Engineering and Computer Science Peking UniversityBeijingP.R.China Shanghai Engineering Research Center of Molecular Therapeutics&New Drug Development School of Chemistry and Molecular EngineeringEast China Normal UniversityShanghaiP.R.China Laboratory for Biomolecular Simulation Research Institute for Quantitative Biomedicine and Department of Chemistry and Chemical BiologyRutgers UniversityPiscatawayNJUSA Department of Chemistry Princeton UniversityPrincetonNJUSA College of Chemistry and Molecular Engineering Peking UniversityBeijingP.R.China Yuanpei College Peking UniversityBeijingP.R.China School of Electrical Engineering and Electronic Information Xihua UniversityChengduP.R.China State Key Laboratory of Superhard Materials College of PhysicsJilin UniversityChangchunP.R.China Key Laboratory of Material Simulation Methods&Software of Ministry of Education College of PhysicsJilin UniversityChangchunP.R.China International Center of Future Science Jilin UniversityChangchunP.R.China Key Laboratory for Quantum Materialsof Zhejiang Province Department of PhysicsSchool of ScienceWestlake UniversityHangzhouP.R.China Atomistic Simulations Italian Institute of TechnologyGenovaItaly State Key Laboratory of Physical Chemistry of Solid Surface iChEMCollege of Chemistry and Chemical EngineeringXiame
The rapid advancements in artificial intelligence(AI)are catalyzing transformative changes in atomic modeling,simulation,and ***-driven potential energy models havedemonstrated the capability to conduct large-scale,lo... 详细信息
来源: 评论
Performance Verification of Smith Predictor Control Using IMC Scheme via Chemical Reaction Networks and DNA Strand Displacement Reaction
Performance Verification of Smith Predictor Control Using IM...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Jingwang Yao Hui Lv Yijun Xiao Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang China
Biochemical process control is often achieved through feedback control strategies for theoretical analysis and optimization of biochemical reaction processes. Here, the design improves the robustness of the biochemica...
来源: 评论
Magnetoresistance Oscillations in Vertical Junctions of 2D Antiferromagnetic Semiconductor CrPS4
收藏 引用
Physical Review X 2024年 第4期14卷 041065-041065页
作者: Pengyuan Shi Xiaoyu Wang Lihao Zhang Wenqin Song Kunlin Yang Shuxi Wang Ruisheng Zhang Liangliang Zhang Takashi Taniguchi MOE Key Laboratory for Nonequilibrium Synthesis and Modulation of Condensed Matter Shaanxi Province Key Laboratory of Advanced Materials and Mesoscopic Physics School of Physics Xi’an Jiaotong University Xi’an 710049 China State Key Laboratory of Surface Physics and Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai 200433 China State Key Laboratory for Manufacturing Systems Engineering Xi’an Jiaotong University Xi’an 710049 China Research Center for Materials Nanoarchitectonics National Institute for Materials Science 1-1 Namiki Tsukuba 305-0044 Japan
Magnetoresistance (MR) oscillations serve as a hallmark of intrinsic quantum behavior, traditionally observed only in conducting systems. Here we report the discovery of MR oscillations in an insulating system, the ve... 详细信息
来源: 评论
PPIRB:Achieving an privacy-preserving image retrieval scheme Based on Blockchain  5
PPIRB:Achieving an privacy-preserving image retrieval scheme...
收藏 引用
5th International Conference on Data Science and Information Technology, DSIT 2022
作者: Yuan, Bo Peng, Jiahui Li, Chunpei Qiu, Wangjie School of Computer Science and Engineering State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Guangxi Key Lab of Multi-source Information Mining Security Guangxi Normal University GuiLin China State Key Laboratory of Software Development Environment Beihang University Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing100191 China
With the proliferation of cloud services, the work of large-scale image retrieval is carried out on remote cloud become a trend in order to get rid of the storage burden and computation. However, traditional retrieval... 详细信息
来源: 评论