咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是411-420 订阅
排序:
A Partial-Lifting-Based Compiling Concolic Execution Approach
A Partial-Lifting-Based Compiling Concolic Execution Approac...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Haotian Zhang Weiyu Dong Jian Lin State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
It has been a common phenomenon that embedded devices are used ubiquitously while the security of proprietary software running on devices has become more and more significant. These softwares are often presented to re... 详细信息
来源: 评论
Research on security assessment based on big data and multi-entity profile
Research on security assessment based on big data and multi-...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Wenfu Liu Jianmin Pang Shudan Yang Nan Li Qiming Du Daozhu Sun Fudong Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have intern... 详细信息
来源: 评论
Integrating KNN and Gradient Boosting Decision Tree for Recommendation
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Qiming Du Nan Li Shudan Yang Daozhu Sun Wenfu Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论
DG-CNN:Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images
收藏 引用
Journal of Computer Science & Technology 2022年 第2期37卷 277-294页
作者: Xiao-Zheng Xie Jian-Wei Niu Senior Member Xue-Feng Liu Qing-Feng Li Yong Wang Jie Han Shaojie Tang State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang UniversityBeijing 100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityHangzhou 310051China Department of Diagnostic Ultrasound National Cancer CenterChinese Academy of Medical SciencesPeking Union Medical CollegeBeijing 100021China Naveen Jindal School of Management The University of Texas at DallasRichardsonTX 75080-3021U.S.A.
Although using convolutional neural networks(CNNs)for computer-aided diagnosis(CAD)has made tremendous progress in the last few years,the small medical datasets remain to be the major bottleneck in this *** address th... 详细信息
来源: 评论
Network Topology Overlapping Group Detection Based on h-Core Pruning  6
Network Topology Overlapping Group Detection Based on h-Core...
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Zhang, Qi Liu, Yan Cai, Yuheng Zhong Yuan Network Security Research Institute Zhengzhou University Zhengzhou China Pla Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The network group detection has a large number of application researches and has achieved certain results in network security, IP entity location and load balancing. However, due to the large scale of the network topo... 详细信息
来源: 评论
Continual Reinforcement Learning for Digital Twin Synchronization Optimization
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Tong, Haonan Chen, Mingzhe Zhao, Jun Hu, Ye Yang, Zhaohui Liu, Yuchen Yin, Changchuan Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence Beijing Advanced Information Network Laboratory Beijing China College of Computing and Data Science Singapore University of Miami Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing Coral Gables33146 United States University of Miami Department of Industrial and Systems Engineering Coral Gables33146 United States Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China North Carolina State University Department of Computer Science RaleighNC27695 United States Beijing Key Laboratory of Network System Architecture and Convergence China Beijing University of Posts and Telecommunications Beijing Advanced Information Network Laboratory Beijing100876 China
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously colle... 详细信息
来源: 评论
Visual Class Incremental Learning with Textual Priors Guidance based on an Adapted Vision-Language Model
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zhang, Wentao Yu, Tong Wang, Ruixuan Xie, Jianhui Trucco, Emanuele Zheng, Wei-Shi Yang, Xiaobo Sun Yat-sen Univerisity School of Computer Science and Engineering Guangzhou510275 China Peng Cheng Laboratory Shenzhen518066 China MOE Key Laboratory of Machine Intelligence and Advanced Computing Guangzhou510275 China Second Affiliated Hospital Guangzhou University of Chinese Medicine State Key Laboratory of Dampness Syndrome of Chinese Medicine Guangzhou510260 China Guangdong Provincial Key Laboratory of Clinical Research on Traditional Chinese Medicine Syndrome Guangzhou510120 China University of Dundee School of Science and Engineering DundeeDD1 4HN United Kingdom
An ideal artificial intelligence (AI) system should have the capability to continually learn like humans. However, when learning new knowledge, AI systems often suffer from catastrophic forgetting of old knowledge. Al... 详细信息
来源: 评论
Cross-Network User Matching Based on Association Strength
Cross-Network User Matching Based on Association Strength
收藏 引用
作者: Qiuyan Jiang Daofu Gong Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Qingdao Agricultural University
Cross-network user matching is the one of the fundamental problems in social network fusion and analysis. This paper proposes an unsupervised algorithm based on association strength to address this problem. Specifical... 详细信息
来源: 评论
Network security assessment based on full host-based attack graph  2020
Network security assessment based on full host-based attack ...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of advanced Technologies
作者: Xiao-fan Wang Tian-yang Zhou Jun-hu Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to... 详细信息
来源: 评论
Strain-tunable magnetic compensation temperature of epitaxial Tb3Fe5O12 thin films
收藏 引用
Physical Review B 2023年 第18期108卷 184403-184403页
作者: Yufei Li Xihui Yang Hua Bai Mingzhi Wang Dashuai Cheng Cheng Song Zhe Yuan Yi Liu Zhong Shi Shanghai Key Laboratory of Special Artificial Microstructure Materials and Technology and Pohl Institute of Solid State Physics and School of Physics Science and Engineering Tongji University Shanghai 200092 China Center for Advanced Quantum Studies and Department of Physics Beijing Normal University Beijing 100875 China Key Laboratory of Advanced Materials School of Materials Science and Engineering Beijing Innovation Center for Future Chips Tsinghua University Beijing 100084 China Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai 200433 China
High-quality rare-earth iron garnet (ReIG) Tb3Fe5O12 (TbIG) thin films are epitaxially grown on a series of (111)-oriented garnet substrates with various lattice constants. The coherent growth induces a substrate-depe... 详细信息
来源: 评论