咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是491-500 订阅
排序:
Maximal coin-walker entanglement in a ballistic quantum walk
收藏 引用
Physical Review A 2022年 第4期105卷 042216-042216页
作者: Rong Zhang Ran Yang Jian Guo Chang-Wei Sun Jia-Chen Duan Heng Zhou Zhenda Xie Ping Xu Yan-Xiao Gong Shi-Ning Zhu National Laboratory of Solid State Microstructure School of Physics School of Electronic Science and Engineering and Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing 210093 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunication Nanjing 210023 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Institute for Quantum Information and State Key Laboratory of High Performance Computing College of Computing National University of Defense Technology Changsha 410073 China
We report that the position-inhomogeneous quantum walk (IQW) can be utilized to produce the maximal high-dimensional entanglement while maintaining the quadratic speedup spread of the wave function. Our calculations s... 详细信息
来源: 评论
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud
Security-as-a-Service with Cyberspace Mimic Defense Technolo...
收藏 引用
2021国际计算机前沿大会
作者: Junchao Wang Jianmin Pang Jin Wei State Key Laboratory of Mathematical Engineering and Advanced Computing School of Computer Science Fudan University Shanghai Key Laboratory of Data Science Fudan University
Users usually focus on the application-level requirements which are quite friendly and direct to them. However, there are no existing tools automating the application-level requirements to infrastructure provisioning ...
来源: 评论
Mining defects of result-sensitive function based on information entropy  6th
Mining defects of result-sensitive function based on informa...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Chen, Lin Yang, Chunfang Liu, Fenlin Gong, Daofu Yin, ZhongXu Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Result-sensitive function is a typical type of security-sensitive function. The misuse of result-sensitive functions often leads to a lot kinds of software defects. Existing defect detection methods based on code mini... 详细信息
来源: 评论
A Scalable Attention Mechanism Based Neural Network for Text Classification  4
A Scalable Attention Mechanism Based Neural Network for Text...
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Zheng, Jianyun Pang, Jianmin Zhang, Xiaochuan Sun, Di Zhou, Xin Zhang, Kai Wang, Dong Li, Mingliang Wang, Jun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China Xi'An Institute of Surveying and Mapping Xi'an710000 China
In general, deep learning based text classification methods are considered to be effective but tend to be relatively slow especially for model training. In this work, we present a powerful, so-called "scalable at... 详细信息
来源: 评论
A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures
收藏 引用
Security and Communication Networks 2021年 第1期2021卷
作者: Ba, Yang Hu, Xuexian Chen, Yue Hao, Zenghang Li, Xuewei Yan, Xincheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Kunming Audit Center Kunming650001 China State Key Laboratory of Space Medicine Fundamentals and Application Beijing100094 China
Data sharing has become a key technology to break down data silos in the big data era. Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in secure data-sharing schemes to realize flexible and fine-g... 详细信息
来源: 评论
Rotation Transformation: A Method to Improve the Transferability of Adversarial Examples
Rotation Transformation: A Method to Improve the Transferabi...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Zheming Li Hengwei Zhang Junqiang Ma Bo Yang Chenwei Li Jingwen Li State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China PLA Army Beijing China
Convolutional neural network models are fragile to adversarial examples. Adding disturbances that humans cannot observe in clean images can make the model classification error. Among the adversarial attack methods, wh... 详细信息
来源: 评论
Green Floating Blockchain-Empowered Co-Trust Security Mechanism with Energy Efficiency Against Attack Threat for 6G-IoV
Green Floating Blockchain-Empowered Co-Trust Security Mechan...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yibing Liu Lijun Huo Hansong Xu Qianqian Pan Jun Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Science and Technology on Information Systems Engineering Laboratory National University of Defense Technology Changsha China School of Engineering The University of Tokyo Tokyo Japan Graduate School of Information Production and Systems Waseda University Fukuoka Japan
The Internet of Vehicles (IoV) based on the 6-th Generation (6G) communication brings convenience, but also raises anxiety about information security. Researchers have developed static security schemes based on the bl...
来源: 评论
RobNODDI: Robust NODDI Parameter Estimation with Adaptive Sampling under Continuous Representation
arXiv
收藏 引用
arXiv 2024年
作者: Xiao, Taohui Cheng, Jian Fan, Wenxin Yang, Jing Li, Cheng Dong, Enqing Wang, Shanshan School of Mechanical Electrical & Information Engineering Shandong University Weihai264209 China State Key Laboratory of Software Development Environment Beihang University Beijing China Key Laboratory of Data Science and Intelligent Computing Institute of International Innovation Beihang University Zhejiang Hangzhou China Paul C. Lauterbur Research Center for Biomedical Imaging Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen China Peng Cheng Laboratory Guangdong Shenzhen China
Neurite Orientation Dispersion and Density Imaging (NODDI) is an important imaging technology used to evaluate the microstructure of brain tissue, which is of great significance for the discovery and treatment of vari...
来源: 评论
Enhanced Anomalous Hall Effect of Pt on an Antiferromagnetic Insulator with Fully Compensated Surface
收藏 引用
Chinese Physics Letters 2022年 第10期39卷 60-65页
作者: Yu Bai Zhe Wang Na Lei Wisal Muhammad Lifeng Xiang Qiang Li Huilin Lai Yinyan Zhu Wenbing Wang Hangwen Guo Lifeng Yin Ruqian Wu Jian Shen State Key Laboratory of Surface Physics and Institute for Nanoelectronics Devices and Quantum Computing Fudan UniversityShanghai 200433China Shanghai Qi Zhi Institute Shanghai 200232China Department of Physics Fudan UniversityShanghai 200433China Zhangjiang Fudan International Innovation Center Fudan UniversityShanghai 201210China Shanghai Research Center for Quantum Sciences Shanghai 201315China Fert Beijing Institute BDBCSchool of Electronic and Information EngineeringBeihang UniversityBeijing 100191China Department of Physics and Astronomy University of CaliforniaIrvineCalifornia 92697USA Collaborative Innovation Center of Advanced Microstructures Nanjing 210093China
We report a significantly enhanced anomalous Hall effect(AHE)of Pt on antiferromagnetic insulator thin film(3-unit-cell La_(0.7)Sr_(0.3)MnO_(3),abbreviated as LSMO),which is one order of magnitude larger than that of ... 详细信息
来源: 评论
Expert with Outlier Exposure for Continual Learning of New Diseases
Expert with Outlier Exposure for Continual Learning of New D...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zhengjing Xu Kanghao Chen Wei-Shi Zheng Zhijun Tan Xiaobo Yang Ruixuan Wang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE China State Key Laboratory of Dampness Syndrome of Chinese Medicine Guangzhou China Department of Network Intelligence Peng Cheng Laboratory Shenzhen China
Current intelligent diagnosis systems struggle to continually learn to diagnose more and more diseases due to catastrophic forgetting of old knowledge when learning new knowledge. Although storing small old data for s... 详细信息
来源: 评论