咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是591-600 订阅
排序:
A Survey on Neural Machine Translation Applied to Sign Language Generation
A Survey on Neural Machine Translation Applied to Sign Langu...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Yue Zhang Lihong Cao State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is increasing at a rapid rate. There is a significant communic... 详细信息
来源: 评论
Unknown Traffic Identification Based on Deep Adaptation Networks
Unknown Traffic Identification Based on Deep Adaptation Netw...
收藏 引用
IEEE Conference on ALocal Computer Networks Workshops (LCN Workshops)
作者: Ziji Yang Wei Lin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Network traffic classification has become an important basis for computer networks. However, the emergence of new applications, which generate unknown traffic constantly, has brought new challenges. The most critical ... 详细信息
来源: 评论
Topology-Aware Software Assignment in Networked Systems  2
Topology-Aware Software Assignment in Networked Systems
收藏 引用
2019 2nd International Conference on advanced Algorithms and Control engineering, ICAACE 2019
作者: Wang, Junchao Liu, Hao Liu, Zhenwu Zhang, Zheng Pang, Jianmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Cyberspace mimic defense has been proven to be a revolutionary defense technology that "changes the rules of the game" to ensure the security of cyberspace. However, the software diversity inherent in mimic ... 详细信息
来源: 评论
OneFlow: Redesign the Distributed Deep Learning Framework from Scratch
arXiv
收藏 引用
arXiv 2021年
作者: Yuan, Jinhui Li, Xinqi Cheng, Cheng Liu, Juncheng Guo, Ran Cai, Shenghang Yao, Chi Yang, Fei Yi, Xiaodong Wu, Chuan Zhang, Haoran Zhao, Jie OneFlow Research Sweden Zhejiang Laboratory China The University of Hong Kong Hong Kong University of Pennsylvania United States State Key Laboratory of Mathematical Engineering and Advanced Computing China
Deep learning frameworks such as TensorFlow and PyTorch provide a productive interface for expressing and training a deep neural network (DNN) model on a single device or using data parallelism. Still, they may not be... 详细信息
来源: 评论
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Ling Chen Wenwen Liu Daofu Gong Yan Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
Binary software vulnerability detection method based on attention mechanism
Binary software vulnerability detection method based on atte...
收藏 引用
International Conference on Mechanical, Control and Computer engineering (ICMCCE)
作者: Wenjie Han Jianmin Pang Xin Zhou Di Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Aiming at the stack overflow vulnerability in binary software, this paper proposes a binary vulnerability detection method based on the attention mechanism. First, this paper analyze the basic characteristics of stack... 详细信息
来源: 评论
A Framework for Multi-Variant Execution Environment
A Framework for Multi-Variant Execution Environment
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Junchao, Wang Zhenwu, Liu Hao, Liu Jianmin, Pang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software diversity has been proven to be an effective approach to enhance system security. To make the best of the advantage brought by software diversity, a multi-variant execution environment is needed. However, alt... 详细信息
来源: 评论
Median Filtering Detection Based on Quaternion Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 929-943页
作者: Jinwei Wang Qiye Ni Yang Zhang Xiangyang Luo Yunqing Shi Jiangtao Zhai Sunil Kr Jha Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing100093China Department of Electrical Computer Engineering New Jersey Institute of TechnologyNew JerseyNJ07102USA
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m... 详细信息
来源: 评论
DSA-NIE: Double Static Attributes Based Node Importance Evaluation of Inter-Domain Routing System  5
DSA-NIE: Double Static Attributes Based Node Importance Eval...
收藏 引用
5th IEEE International Conference on Computer and Communications, ICCC 2019
作者: Zhu, Huihu Qiu, Han Zhu, Junhu Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi... 详细信息
来源: 评论
Computer evidence analysis technology based on weighted frequent pattern growth algorithm  5th
Computer evidence analysis technology based on weighted freq...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Xue, Tianxiao Li, Qingbao Zhang, Ping Chen, Zhifeng Feng, Peijun Luo, Nan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The current analysis of computer forensics is still dependent on the investigation personnel, leading to the problem of heavy workload and low efficiency. At the same time, computer evidences have the characteristics ... 详细信息
来源: 评论