咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 152 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 99 篇 控制科学与工程
    • 86 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 74 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 421 篇 物理学
    • 252 篇 数学
    • 95 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 85 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,488 篇 英文
  • 58 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1581 条 记 录,以下是531-540 订阅
排序:
AttCorr: A Novel Deep Learning Model for Flow Correlation Attacks on Tor
AttCorr: A Novel Deep Learning Model for Flow Correlation At...
收藏 引用
Consumer Electronics and Computer engineering (ICCECE), 2021 IEEE International Conference on
作者: Ji Li Chunxiang Gu Xieli Zhang Xi Chen Wenfen Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China
The proliferation of illegal information and criminal behavior on anonymous networks arouses the demand for deanonymization attacks on anonymous communication systems. Flow correlation is a common technique for deanon... 详细信息
来源: 评论
A Novel Deep Learning Approach Featuring Graph-Based Algorithm for Cell Segmentation and Tracking
A Novel Deep Learning Approach Featuring Graph-Based Algorit...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Keliang Zhao Jovial Niyogisubizo Linxia Xiao Yi Pan Dongqing Wei Didi Rosiyadi Yanjie Wei Shenzhen Key Laboratory of Intelligent Bioinformatics and Center for High Performance Computing Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China College of Computer Science and Control Engineering Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China State Key Laboratory of Microbial Metabolism and School of Life Sciences and Biotechnology Shanghai Jiao Tong University Shanghai China Research Center for Artificial Intelligence and Cybersecurity National Research and Innovation Agency Bandung Indonesia
The precise segmentation and tracking of cells in microscopy image sequences play a pivotal role in biomedical research, facilitating the study of tissue, organ, and organism development. However, manual segmentation ...
来源: 评论
Pre-ictal causal connectivity reveals the epileptic network characteristics for deep brain stimulation
收藏 引用
Neuroscience 2025年 579卷 329-343页
作者: Yifan Wang Tao Yu Yulan Ma Weigang Cui Xueyuan Wang Liankun Ren Yang Li Department of Automation Science and Electrical Engineering Beihang University Beijing 100191 China Beijing Institute of Functional Neurosurgery Department of Functional Neurosurgery Xuanwu Hospital Capital Medical University Beijing 100053 China School of Engineering Medicine Beihang University Beijing 100191 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing 100053 China Beijing Advanced Innovation Center for Big Data and Brain Computing State Key Laboratory of Virtual Reality Technology and Systems Department of Automation Science and Electrical Engineering Beihang University Beijing 100191 China
Deep brain stimulation of anterior nucleus of the thalamus (ANT-DBS) is an effective clinical treatment for drug-resistant focal epilepsy. However, the complex epileptic network characteristics underlying ANT-stimulat... 详细信息
来源: 评论
LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks  19
LEFV: A Lightweight and Efficient System for Face Verificati...
收藏 引用
Proceedings of the 3rd International Conference on Video and Image Processing
作者: Ming Liu Ping Zhang Qingbao Li Jinjin Liu Zhifeng Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The emergence of deep learning has made great progress in face recognition. With the popularization of embedded devices, deploying the deep model on embedded devices has become a trend. Most high-precision models requ... 详细信息
来源: 评论
Efficient Low-Resolution Face Recognition via Bridge Distillation
arXiv
收藏 引用
arXiv 2024年
作者: Ge, Shiming Zhao, Shengwei Li, Chenyu Zhang, Yu Li, Jia The Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China SenseTime Group Limited 100084 China The State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China The Peng Cheng Laboratory Shenzhen518055 China
Face recognition in the wild is now advancing towards light-weight models, fast inference speed and resolution-adapted capability. In this paper, we propose a bridge distillation approach to turn a complex face model ... 详细信息
来源: 评论
Software Supply Chain Analysis Based on Function Similarity
Software Supply Chain Analysis Based on Function Similarity
收藏 引用
作者: Wenjie Sun Zheng Shan Fudong liu Xingwei Li Meng Qiao Chunyan Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing
The supply of open source and open source components is growing at an alarming rate,while vulnerabilities in open source components are *** supply chain analysis aims to discover third-party components and open source... 详细信息
来源: 评论
Ultra-Fast Mini License Plate Recognition System Based-on Vision Processing Unit  2
Ultra-Fast Mini License Plate Recognition System Based-on Vi...
收藏 引用
2nd International Conference on Big-Data Service and Intelligent Computation, BDSIC 2020
作者: Wang, Junhui Ren, Shuangyin He, Jiezhong Ji, Xiaolan Huang, Diqing College of Computer National University of Defense Technology State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Computer National University of Defense Technology
As more embedded environments need license plate recognition systems, how to recognize car plates with high speed/accuracy and low energy has become an important and challenging problem. In this paper, we propose a ul... 详细信息
来源: 评论
NAS Honeypot Technology Based on Attack Chain
NAS Honeypot Technology Based on Attack Chain
收藏 引用
作者: Bing Liu Hui Shu Fei Kang State Key Laboratory of Mathematical Engineering and Advanced Computing
With the wide application of network attached storage(NAS), the security problem is becoming more and more serious, together with the increasingly fierce attacks against NAS devices of different manufacturers. In orde... 详细信息
来源: 评论
Field-tuned magnetic structure and phase diagram of the honeycomb magnet YbCl_(3)
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2021年 第3期64卷 84-89页
作者: YiQing Hao HongLiang Wo YiMeng Gu XiaoWen Zhang YiQing Gu ShiYi Zheng Yang Zhao GuangYong Xu Jeffrey WLynn Kenji Nakajima Naoki Murai WenBin Wang Jun Zhao State Key Laboratory of Surface Physics and Department of Physics Fudan UniversityShanghai 200433China NIST Center for Neutron Research National Institute of Standards and TechnologyGaithersburg 20899USA Department of Materials Science and Engineering University of MarylandCollege Park 20742USA J-PARC Center Japan Atomic Energy Agency(JAEA)Ibaraki 319-1195Japan Institute of Nanoelectronic Devices and Quantum Computing Fudan UniversityShanghai 200433China Collaborative Innovation Center of Advanced Microstructures Nanjing 210093China
We report thermodynamic and neutron diffraction measurements on the magnetic ordering properties of the honeycomb lattice magnet YbCl_(3). We find YbCl_(3) exhibits a Ne′el type long-range magnetic order at the wavev... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
作者: Jinzhu Wang Ruijie Cai Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing
Cisco IOS is an operating system that runs on Cisco routing and switching *** security is important to the entire *** vulnerability attacks have become one of the main sources of threat to Cisco IOS security,it is nec... 详细信息
来源: 评论