咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是541-550 订阅
排序:
Weakly-supervised Audio Temporal Forgery Localization via Progressive Audio-language Co-learning Network
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Junyan Xu, Wenbo Lu, Wei Luo, Xiangyang Yang, Rui Guo, Shize MoE Key Laboratory of Information Technology Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China
Audio temporal forgery localization (ATFL) aims to find the precise forgery regions of the partial spoof audio that is purposefully modified. Existing ATFL methods rely on training efficient networks using fine-graine... 详细信息
来源: 评论
PS-HOMO: A Protection Scheme for iOS SMS  4
PS-HOMO: A Protection Scheme for iOS SMS
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Zhou, Guomiao Wu, Qianqiong Duan, Ming Xi, Qi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China Institute of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang Henan471000 China
iOS Short Message Service (SMS) transmits messages in plaintext, which would lead to potential security threats of data. It is meaningful to design a safe and effective SMS. In this paper, all iOS Security Guides are ... 详细信息
来源: 评论
Improved Impossible Polytopic Attacks on Round-reduced des  4
Improved Impossible Polytopic Attacks on Round-reduced des
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Wang, Jing Wu, Qianqiong Fu, Chaohui Zhou, Guomiao Duan, Ming State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China College of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang Henan471000 China
In Eurocrypt 2016, Tyge Tiessen introduced the d-difference which considering the differences between multiple plaintexts, and proposed the impossible polytopic attack on block cipher which effectively reducing the da... 详细信息
来源: 评论
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
作者: Jinjin Liu Zhifeng Chen Xiaonan Li Tongxin Wei School of Computer Science Zhongyuan University of Technology State Key Laboratory of Mathematical Engineering and Advanced Computing School of Cyberspace Security Zhengzhou University
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
NiCoP nanoleaves array for electrocatalytic alkaline H2 evolution and overall water splitting
收藏 引用
Journal of Energy Chemistry 2020年 第11期29卷 395-401页
作者: Lei Chen Yaohao Song Yi Liu Liang Xu Jiaqian Qin Yongpeng Lei Yougen Tang State Key Laboratory of Powder Metallurgy Hunan Provincial Key Laboratory of Chemical Power SourcesCollege of Chemistry and Chemical EngineeringCentral South UniversityChangsha 410083HunanChina Energy Materials Computing Center Jiangxi University of Science and TechnologyNanchang 330013JiangxiChina Research Unit of Advanced Materials for Energy Storage Metallurgy and Materials Science Research InstituteChulalongkorn UniversityBangkok 10330Thailand
The development of non-precious, high-efficient and durable electrocatalysts for H2 evolution in alkaline media is highly desirable. Herein we report NiCoP nanoleaves array vertically grown on Ni foam for H2 evolution... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network  2
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
2019 2nd International Symposium on Big Data and Applied Statistics, ISBDAS 2019
作者: Lu, Shoupu Li, Qingbao Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Province Zhengzhou450001 China Henan University of Economics and Law Henan Province Zhengzhou450000 China
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac... 详细信息
来源: 评论
Parallelizing Neural Network Models Effectively on GPU by Implementing Reductions Atomically  22
Parallelizing Neural Network Models Effectively on GPU by Im...
收藏 引用
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques
作者: Jie Zhao Cédric Bastoul Yanzhi Yi Jiahui Hu Wang Nie Renwei Zhang Zhen Geng Chong Li Thibaut Tachon Zhiliang Gan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Huawei Technologies France SASU Paris France Huawei Technologies Co. Ltd. Beijing China Huawei Technologies Co. Ltd. Hangzhou China Huawei Technologies Co. Ltd. Shenzhen China
Due to the missing of a good orchestration of loop transformations, existing optimizing compilers for deploying neural networks on GPU either parallelize reductions ineffectively or miss the fusion opportunities with ... 详细信息
来源: 评论
Accurate and Efficient Human Activity Recognition Through Semi-Supervised Deep Learning
收藏 引用
IEEE Sensors Journal 2025年 第12期25卷 23105-23116页
作者: Long, Xianlei Wang, Ping Gu, Fuqiang Yan, Jinjin Yu, Fangwen Li, Yan Chen, Chao Guo, Songtao Chongqing University College of Computer Science Chongqing400044 China Harbin Engineering University Qingdao Innovation and Development Center Qingdao266400 China Tsinghua University Department of Precision Instrument Beijing China Macquarie University School of Computing Sydney Australia Chongqing University State Key Laboratory of Mechanical Transmission for Advanced Equipment Chongqing400044 China
In recent years, deep learning has been widely used for human activity recognition (HAR) based on wearable sensor data due to its excellent performance. However, deep learning approaches often need a large amount of l... 详细信息
来源: 评论
A Malware Similarity Analysis Method Based on Network Control Structure Graph
A Malware Similarity Analysis Method Based on Network Contro...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Duanyi Wang Hui Shu Fei Kang Wenjuan Bu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Recently, graph-based malware similarity analysis has been widely used in the field of malware detection. However, the wide application of code obfuscation, polymorphism, and deformation changes the structure of malic... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
Computer Communication and Network Security (CCNS), International Conference on
作者: Shao Yuwen Zhang Zheng Li Bingzheng Ji Xinsheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China R&D Center National Digital Switching System Engineering & Technological Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论