咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是461-470 订阅
排序:
Web Service Active Defense Mechanism Based on Automated Software Diversity
Web Service Active Defense Mechanism Based on Automated Soft...
收藏 引用
2020 International Conference on Computer engineering and Application, ICCEA 2020
作者: Liu, Zhenwu Zhang, Zheng Liu, Hao Ma, Bolin PLA Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Aiming at the problems of limited number and diversity in existing web server software, an active defense mechanism for web services based on automated software diversity is proposed, and the system framework and impl... 详细信息
来源: 评论
Performance Verification of state Feedback H∞ state Molecular Controller Via Chemical Reaction Networks
Performance Verification of State Feedback H∞ State Molecul...
收藏 引用
International Conference on Industrial Artificial Intelligence (IAI)
作者: Jingwang Yao Xing'An Wang Hui Lv Yang Li Wujie Zhang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China College of Environmental and Chemical Engineering Dalian University Dalian China Dalian Chivy Biotechnology Co. Ltd Dalian PR China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang China
An important goal in synthetic biology is in the design and implementation of control strategies embedded in biochemical reaction systems to enable control of the process at the molecular level. The problem of set-poi...
来源: 评论
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Junyan Lu, Wei Luo, Xiangyang Yang, Rui Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen China
MSC Codes 68T07, 68T10Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. Howeve... 详细信息
来源: 评论
Brain Functional Network Generation Using Distribution-Regularized Adversarial Graph Autoencoder with Transformer for Dementia Diagnosis
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第12期137卷 2129-2147页
作者: Qiankun Zuo Junhua Hu Yudong Zhang Junren Pan Changhong Jing Xuhang Chen Xiaobo Meng Jin Hong School of Information Engineering Hubei University of EconomicsWuhan430205China State Key Laboratory of Simulation and Regulation of Water Cycle in River Basin China Institute of Water Resources and Hydropower ResearchBeijing100038China School of Computing and Mathematic Sciences University of LeicesterLeicesterLE17RHUK Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518055China Faculty of Science and Technology University of MacaoMacao999078China School of Geophysics Chengdu University of TechnologyChengdu610059China Laboratory of Artificial Intelligence and 3D Technologies for Cardiovascular Diseases Guangdong Provincial Key Laboratory of South China Structural Heart DiseaseGuangdong Provincial People’s Hospital(Guangdong Academy of Medical Sciences)Southern Medical UniversityGuangzhou519041China Medical Research Institute Guangdong Provincial People’s Hospital(Guangdong Academy of Medical Sciences)Southern Medical UniversityGuangzhou519041China
The topological connectivity information derived from the brain functional network can bring new insights for diagnosing and analyzing dementia *** brain functional network is suitable to bridge the correlation betwee... 详细信息
来源: 评论
Revocable Broadcast Encryption with Constant Ciphertext and Private key Size
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 690-697页
作者: JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei Zhengzhou University State Key Laboratory of Mathematical Engineering and Advanced Computing Nanjing University of Post and Communications
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo... 详细信息
来源: 评论
Co‑packaged optics(CPO):status,challenges,and solutions
收藏 引用
Frontiers of Optoelectronics 2023年 第1期16卷 1-40页
作者: Min Tan Jiang Xu Siyang Liu Junbo Feng Hua Zhang Chaonan Yao Shixi Chen Hangyu Guo Gengshi Han Zhanhao Wen Bao Chen Yu He Xuqiang Zheng Da Ming Yaowen Tu Qiang Fu Nan Qi Dan Li Li Geng Song Wen Fenghe Yang Huimin He Fengman Liu Haiyun Xue Yuhang Wang Ciyuan Qiu Guangcan Mi Yanbo Li Tianhai Chang Mingche Lai Luo Zhang Qinfen Hao Mengyuan Qin School of Optical and Electronic Information Huazhong University of Science and TechnologyWuhan 430074China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China Department of Electronic and Computer Engineering The Hong Kong University of Science and TechnologyHong KongChina HKUST Fok Ying Tung Research Institute Guangzhou 511462China The Hong Kong University of Science and Technology(Guangzhou) Guangzhou 511462China Chongqing United Micro-Electronics Center(CUMEC) Chongqing 401332China Hisense Broadband Multimedia Technologies Co. Ltd.Qingdao 266000China Institute of Microelectronics Chinese Academy of SciencesBeijing 100029China State Key Laboratory of Superlattices and Microstructures Institute of SemiconductorsChinese Academy of SciencesBeijing 100083China School of Microelectronics Xi’an Jiaotong UniversityXi’an 710049China Zhangjiang Laboratory Shanghai 201210China The State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronic EngineeringShanghai Jiao Tong UniversityShanghai 200240China Huawei Technologies Co. Ltd.Shenzhen 440307China College of Computer National University of Defense TechnologyChangsha 410073China Institute of Computing Technology Chinese Academy of SciencesBeijing 100086China
Due to the rise of 5G,IoT,AI,and high-performance computing applications,datacenter trafc has grown at a compound annual growth rate of nearly 30%.Furthermore,nearly three-fourths of the datacenter trafc resides withi... 详细信息
来源: 评论
Virtual Sample Generation for Retraining the Malicious PDF Detection Model  4
Virtual Sample Generation for Retraining the Malicious PDF D...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: He, Kang Liu, Long Lu, Dong-Zhe Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative vulnerabilities. Machine learning algorithms are developed to detect the maliciousness of PDF files. A... 详细信息
来源: 评论
Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node  4
Anti-reconnaissance Model of Host Fingerprint Based on Virtu...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Zhang, Tao Lu, Bin Li, Ding He, Kang Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable vir... 详细信息
来源: 评论
Visualizing nonlinear resonance in nanomechanical systems via single-electron tunneling
收藏 引用
Nano Research 2021年 第4期14卷 1156-1161页
作者: Xinhe Wang Lin Cong Dong Zhu Zi Yuan Xiaoyang Lin Weisheng Zhao Zaiqiao Bai Wenjie Liang Ximing Sun Guang-Wei Deng Kaili Jiang Fert Beijing Research Institute School of Microelectronics&Beijing Advanced Innovation Centre for Big Data and Brain Computing(BDBC)Beihang UniversityBeijing 100191China State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics and Tsinghua-Foxconn Nanotechnology Research CenterTsinghua UniversityBeijing 100084China Key Laboratory of Quantum Information CASUniversity of Science and Technology of ChinaHefei 230026China Department of Physics Beijing Normal UniversityBeijing 100875China Institute of Physics Chinese Academy of SciencesBeijing 100080China Institute of Nuclear and New Energy Technology Collaborative Innovation Center of Advanced Nuclear Energy TechnologyKey Laboratory of Advanced Reactor EngineeringTsinghua UniversityBeijing 100084China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu 610054China
Numerous reports have elucidated the importance of mechanical resonators comprising quantum-dot-embedded carbon nanotubes(CNTs)for studying the effects of single-electron ***,there is a need to investigate the single-... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
2021国际计算机前沿大会
作者: Wenning Zhang Qinglei Zhou Chongyang Jiao Ting Xu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhongyuan University of Technology Zhengzhou University
To solve the emerging complex optimization problems,multi objective optimization algorithms are *** introducing the surrogate model for approximate fitness calculation,the multi objective firefly algorithm with surrog...
来源: 评论