咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是381-390 订阅
排序:
Modeling of Epitaxial Growth of Single Crystal Superalloys Fabricated by Direct Energy Deposition
SSRN
收藏 引用
SSRN 2023年
作者: Shi, Ling Wang, Jiang Xu, Songzhe Li, Jingjing Chen, Chaoyue Hu, Tao Sundar, Hari Ren, Zhongming State Key Laboratory of Advanced Special Steels School of Materials Science and Engineering Shanghai University Shanghai China School of Computing University of Utah Salt Lake City United States
Single crystal (SX) nickel-based superalloys have been used for turbine blades fabrication in recent years because of their superior mechanical performance at high temperature. The restoration of SX blades is signific... 详细信息
来源: 评论
4DRGS: 4D Radiative Gaussian Splatting for Efficient 3D Vessel Reconstruction from Sparse-View Dynamic DSA Images
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Zhentao Zha, Ruyi Zhao, Huangxuan Li, Hongdong Cui, Zhiming School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China School of Computing Australian National University Canberra Australia School of Computer Science Wuhan University Wuhan China
Reconstructing 3D vessel structures from sparse-view dynamic digital subtraction angiography (DSA) images enables accurate medical assessment while reducing radiation exposure. Existing methods often produce suboptima... 详细信息
来源: 评论
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering  16
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks  16
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit  4
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Wang, Jinzhu Cai, Ruijie Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ... 详细信息
来源: 评论
Network representation learning based extended matrix factorization for recommendation  6th
Network representation learning based extended matrix factor...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Xu, Jinmao Gong, Daofu Liu, Fenlin Tan, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in... 详细信息
来源: 评论
Dynamic Network Change Detection via Dynamic Network Representation Learning  14th
Dynamic Network Change Detection via Dynamic Network Represe...
收藏 引用
14th EAI International Conference on Communications and Networking in China, ChinaCom 2019
作者: Feng, Hao Liu, Yan Zhou, Ziqiao Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The structure of the network in the real world is very complex, as the dynamic network structure evolves in time dimension, how to detect network changes accurately and further locate abnormal nodes is a research hots... 详细信息
来源: 评论
Defense method of ruby code injection attack based on instruction set randomization  20
Defense method of ruby code injection attack based on instru...
收藏 引用
8th International Conference on Computer and Communications Management, ICCCM 2020
作者: Wang, Jiang Yao, Yuan Zhang, Gaofei Li, Fangyun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Code injection attack is a major security threat to applications, especially web applications. This type of attack stems from the attacker's ability to use the vulnerability/backdoor of the application to inject a... 详细信息
来源: 评论
Network security assessment based on full host-based attack graph
Network security assessment based on full host-based attack ...
收藏 引用
2020 International Conference on Cyberspace Innovation of advanced Technologies, CIAT 2020
作者: Wang, Xiao-Fan Zhou, Tian-Yang Zhu, Jun-Hu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to... 详细信息
来源: 评论
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention
收藏 引用
Journal of Visual Communication and Image Representation 2024年 98卷
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei Ye, Long School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
As a powerful forgery operation in the image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, especially in boundar... 详细信息
来源: 评论