咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是111-120 订阅
排序:
Boosting cationic and anionic redox activity of Li-rich layered oxide cathodes via Li/Ni disordered regulation
收藏 引用
Journal of Energy Chemistry 2025年 第1期100卷 533-543页
作者: Zewen Liu Zhen Wu Hao Wang Xudong Zhang Yuanzhen Chen Yongning Liu Shengwu Guo Shenghua Chen Yanli Nan Yan Liu State Key Laboratory for Mechanical Behavior of Materials Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina School of Materials Science and Engineering Xi’an University of Architecture and TechnologyXi’an 710055ShaanxiChina Hefei Advanced Computing Center Operation Management Corp Ltd Hefei 230088AnhuiChina Network Information Center Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina
Lithium-rich layered oxides (LLOs) are increasingly recognized as promising cathode materials for nextgeneration high-energy-density lithium-ion batteries (LIBs).However,they suffer from voltage decay and low initial ... 详细信息
来源: 评论
Research on Sleep Staging Method Based on Multi-Scale Convolution and Self-Attention Mechanism  2
Research on Sleep Staging Method Based on Multi-Scale Convol...
收藏 引用
2nd International Conference on Biomedical and Intelligent Systems, IC-BIS 2023
作者: Pan, Dongdong Li, Yingying School of Computer and Artificial Intelligence Zhengzhou University China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University China
Sleep is a very important physiological process for humans, and sleep staging is an important basis for evaluating sleep quality and diagnosing sleep-related diseases. Manual sleep staging is time-consuming and labori... 详细信息
来源: 评论
DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight
DPW-RRM: Random Routing Mutation Defense Method Based on Dyn...
收藏 引用
作者: Jin, Hui Li, Zhaoyang Hu, Ruiqin Tan, Jinglei Zhang, Hongqi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China School of Cyberspace Security Zhengzhou University Zhengzhou Henan450001 China
Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the... 详细信息
来源: 评论
ThickV-Stain: Unprocessed Thick Tissues Virtual Staining for Rapid Intraoperative Histology  7
ThickV-Stain: Unprocessed Thick Tissues Virtual Staining for...
收藏 引用
7th International Conference on Medical Imaging with Deep Learning, MIDL 2024
作者: Shi, Lulin Hou, Xingzhong Wong, Ivy H.M. Chan, Simon C.K. Chen, Zhenghui Lo, Claudia T.K. Wong, Terence T.W. Translational and Advanced Bioimaging Laboratory Department of Chemical and Biological Engineering The Hong Kong University of Science and Technology Hong Kong State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Virtual staining has shown great promise in realizing a rapid and low-cost clinical alternative for pathological examinations, eliminating the need for chemical reagents and laborious staining procedures. However, mos... 详细信息
来源: 评论
Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
收藏 引用
Chinese Journal of Electronics 2020年 第6期29卷 1165-1177页
作者: HE Kang ZHU Yuefei HE Yubo LIU Long LU Bin LIN Wei State Key Laboratory of Mathematical Engineering and Advanced Computing
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decrease... 详细信息
来源: 评论
Edge-Driven Industrial computing Power Networks: Digital Twin-Empowered Service Provisioning by Hybrid Soft Actor-Critic
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8095-8109页
作者: Zhang, Long Song, Deng-Ao Zhang, Hongliang Tian, Ni Zhuang, Zirui Niyato, Dusit Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
With the proliferation of data-intensive industrial applications, the collaboration of computing powers among standalone edge servers is vital to provision such services for smart devices. In this paper, we propose an... 详细信息
来源: 评论
A Further Understanding of Differential-Linear Cryptanalysis
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 660-666页
作者: REN Jiongjiong CHEN Shaozhen State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Cryptology
Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the ***, the links between differential-lin... 详细信息
来源: 评论
Programmable logic controller memory management vulnerability analysis  3
Programmable logic controller memory management vulnerabilit...
收藏 引用
2022 3rd International Conference on Signal Processing and Computer Science, SPCS 2022
作者: Geng, Yangyang Ma, Rongkuan Wei, Qiang Wang, Wenhai State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou310000 China
Programmable logic controller (PLC) is omnipresent in industrial control system (ICS), which plays an imperative part in critical infrastructures. However, once a PLC is compromised by an attacker, it will create dest... 详细信息
来源: 评论
Whole-Function Vectorization Based on Simplified Openmp Directives
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Lili Yao, Jinyang Li, Yingying Zhang, Ping Xu, Jinlong Zhao, Bo Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
With the continuous development of computing technology, an increasing number of vendors have integrated SIMD extension components into processors. These components can accelerate program execution efficiency and have... 详细信息
来源: 评论
An Abnormal Domain Name Generation Method Based on a Character-Level Model  22
An Abnormal Domain Name Generation Method Based on a Charact...
收藏 引用
Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence
作者: Chunbing Wu Jinlong Fei State Key Laboratory of Mathematical Engineering and Advanced Computing China
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli...
来源: 评论