咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 777 篇 期刊文献

馆藏范围

  • 1,586 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,033 篇 工学
    • 622 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 150 篇 信息与通信工程
    • 135 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 99 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 材料科学与工程(可...
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 64 篇 光学工程
    • 51 篇 机械工程
    • 50 篇 核科学与技术
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 751 篇 理学
    • 424 篇 物理学
    • 253 篇 数学
    • 96 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 87 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 25 篇 security
  • 25 篇 training
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 108 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 99 篇 state key labora...
  • 96 篇 yunnan observato...
  • 95 篇 university of ch...
  • 88 篇 key laboratory f...
  • 86 篇 department of ph...
  • 84 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 82 篇 moscow institute...
  • 82 篇 school of astron...
  • 81 篇 institute of fro...
  • 81 篇 national space s...
  • 80 篇 school of physic...
  • 70 篇 department of en...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 76 篇 danzengluobu
  • 75 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 69 篇 liu b.
  • 68 篇 liu d.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 68 篇 guo y.q.
  • 67 篇 chen m.j.
  • 67 篇 bao y.w.
  • 66 篇 hu h.b.
  • 65 篇 liu h.d.
  • 64 篇 li cheng
  • 64 篇 mao j.r.
  • 64 篇 fan y.z.

语言

  • 1,454 篇 英文
  • 98 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1586 条 记 录,以下是701-710 订阅
排序:
Group Signatures with Decentralized Tracing  15th
Group Signatures with Decentralized Tracing
收藏 引用
15th International Conference on Information Security and Cryptology, Inscrypt 2019
作者: Lu, Tingting Li, Jiangtao Zhang, Lei Lam, Kwok-Yan Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China State Key Laboratory of Cryptology P.O. Box 5159 Beijing China Shanghai Institute for Advanced Communication and Data Science Shanghai China School of Computer Engineering and Science Shanghai University Shanghai China Nanyang Technological University Singapore Singapore
Group signature is a useful cryptographic primitive that allows a message to be signed by a user on behalf of a group which is managed by some trusted authority, namely the group manager. However, group signature sche... 详细信息
来源: 评论
ZeroSpy: Exploring Software Inefficiency with Redundant Zeros  20
ZeroSpy: Exploring Software Inefficiency with Redundant Zero...
收藏 引用
Supercomputing Conference
作者: Xin You Hailong Yang Zhongzhi Luan Depei Qian Xu Liu Beihang University China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China North Carolina State University USA
Redundant zeros cause inefficiencies in which the zero values are loaded and computed repeatedly, resulting in unnecessary memory traffic and identity computation that waste memory bandwidth and CPU resources. optimiz... 详细信息
来源: 评论
Superconductivity in pressurized trilayer La4Ni3O10-δ single crystals
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Yinghao Peng, Di Zhang, Enkang Pan, Bingying Chen, Xu Chen, Lixing Ren, Huifen Liu, Feiyang Hao, Yiqing Li, Nana Xing, Zhenfang Lan, Fujun Han, Jiyuan Wang, Junjie Jia, Donghan Wo, Hongliang Gu, Yiqing Gu, Yimeng Ji, Li Wang, Wenbin Gou, Huiyang Shen, Yao Ying, Tianping Chen, Xiaolong Yang, Wenge Cao, Huibo Zheng, Changlin Zeng, Qiaoshi Guo, Jiangang Zhao, Jun State Key Laboratory of Surface Physics Department of Physics Fudan University Shanghai200433 China Shanghai Research Center for Quantum Sciences Shanghai201315 China Shanghai201203 China College of Physics and Optoelectronic Engineering Ocean University of China Shandong Qingdao266100 China Beijing National Laboratory for Condensed Matter Physics Institute of Physics Chinese Academy of Sciences Beijing100190 China Neutron Scattering Division Oak Ridge National Laboratory Oak RidgeTN37831 United States Center for High Pressure Science and Technology Advanced Research Shanghai201203 China School of Physical Sciences University of Chinese Academy of Sciences Beijing100049 China Center for High Pressure Science and Technology Advanced Research Beijing100094 China State Key Laboratory of ASIC and System School of Microelectronics Fudan University Shanghai China Institute of Nanoelectronics and Quantum Computing Fudan University Shanghai200433 China Shanghai Branch Hefei National Laboratory Shanghai201315 China
The pursuit of discovering new high-temperature superconductors that diverge from the copper-based paradigm1-3 carries profound implications for elucidating mechanisms behind superconductivity and may also enable new ... 详细信息
来源: 评论
High-capacity and Robust Image Watermarking Algorithm
Research Square
收藏 引用
Research Square 2021年
作者: Liu, Zheng Li, Xi-Yan Zhou, Qing-Lei Sun, Hanqing Lian, Weimin Wang, Guizhi School of Information Engineering Henan University of Animal Husbandry and Economy Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Information Science and Technology HaiNan Normal University Haikou China School of Information Engineering Zhengzhou University Zhengzhou China
With the development of internet, digital media can be manipulated, reproduced, and distributed conveniently over networks. However, illegal copy, transmission and distribution of digital media become an important sec... 详细信息
来源: 评论
Retraction Note: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2024年 第1期15卷 245-245页
作者: Bao, Zhenkun Guo, Yanqing Li, Xiaolong Zhang, Yi Xu, Meng Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou Science and Technology Institute Zhengzhou China School of Information and Communication Engineering Dalian University of Technology Dalian China Institute of Information Science Beijing Jiaotong University Beijing China
来源: 评论
A survey of coverage-guided greybox fuzzing with deep neural models
收藏 引用
Information and Software Technology 2025年 186卷
作者: Qiu, Junyang Jiang, Yupeng Miao, Yuantian Luo, Wei Pan, Lei Zheng, Xi State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214123 China School of Computing Macquarie University Sydney 2109 NSW Australia School of Information and Physical Sciences University of Newcastle Newcastle 2308 NSW Australia School of Information Technology Deakin University Melbourne 3125 VIC Australia
Coverage-guided greybox fuzzing (CGF) has emerged as a powerful technique for software vulnerability detection, yet traditional techniques often struggle with the increasing complexity of modern software systems and t... 详细信息
来源: 评论
Optimization on the symplectic Stiefel manifold: SR decomposition-based retraction and applications
arXiv
收藏 引用
arXiv 2022年
作者: Gao, Bin Son, Nguyen Thanh Stykel, Tatjana State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Institut für Mathematik Centre for Advanced Analytics and Predictive Sciences Universität Augsburg Universitätsstraße 12a Augsburg86159 Germany Thai Nguyen University of Sciences Thai Nguyen24118 Viet Nam
Numerous problems in optics, quantum physics, stability analysis, and control of dynamical systems can be brought to an optimization problem with matrix variable subjected to the symplecticity constraint. As this cons... 详细信息
来源: 评论
PET Denoising and Uncertainty Estimation Based on NVAE Model
PET Denoising and Uncertainty Estimation Based on NVAE Model
收藏 引用
2021 IEEE Nuclear Science Symposium and Medical Imaging Conference, NSS/MIC 2021
作者: Cui, Jianan Xie, Yutong Gong, Kuang Kim, Kyungsang Yang, Jaewon Larson, Peder Hope, Thomas Behr, Spencer Seo, Youngho Liu, Huafeng Li, Quanzheng Zhejiang University State Key Laboratory of Modern Optical Instrumentation College of Optical Science and Engineering Hangzhou China Massachusetts General Hospital Harvard Medical School Center for Advanced Medical Computing and Analysis BostonMA United States Peking University Beijing China Massachusetts General Hospital Harvard Medical School Gordon Center for Medical Imaging BostonMA United States Department of Radiology and Biomedical Imaging CA94107 United States
The structure of the deep neural network is constantly changing, and its performance is constantly breaking through. Recently, a new network, Nouveau variational auto-encoder (NVAE), has been proposed and gained great... 详细信息
来源: 评论
System architecture for high-performance permissioned blockchains
收藏 引用
Frontiers of Computer Science 2019年 第6期13卷 1151-1165页
作者: Libo FENG Hui ZHANG Wei-Tek TSAI Simeng SUN State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China Digital Society&Blockchain Laboratory School of Computer ScienceBeihang UniversityBeijing 100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing 100191China School of Computing Informatics and Decision Systems EngineeringArizona State UniversityTempeUSA
Blockchain(BC),as an emerging distributed database technology with advanced security and reliability,has attracted much attention from experts who devoted to efinance,intellectual property protection,the internet of t... 详细信息
来源: 评论
Optimizing the Memory Hierarchy by Compositing Automatic Transformations on Computations and Data
Optimizing the Memory Hierarchy by Compositing Automatic Tra...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Jie Zhao Peng Di State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Huawei Technologies Co. Ltd Beijing China
Optimizing compilers exploit the memory hierarchy using loop tiling and fusion, but these two transformations usually interfere with each other due to the oversight of transformations on data in memories. We present a... 详细信息
来源: 评论