咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 152 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 99 篇 控制科学与工程
    • 86 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 74 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 421 篇 物理学
    • 252 篇 数学
    • 95 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 85 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,488 篇 英文
  • 58 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1581 条 记 录,以下是571-580 订阅
排序:
UEFI Trusted computing Vulnerability Analysis Based on state Transition Graph
UEFI Trusted Computing Vulnerability Analysis Based on State...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Yanyang Gu Ping Zhang Zhifeng Chen Fei Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI.... 详细信息
来源: 评论
Improved Method for Dynamic Heterogeneous Redundant Model Database
Improved Method for Dynamic Heterogeneous Redundant Model Da...
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Yuan Tang Zheng Zhang YuFeng Zhao ZhenWu Liu State key laboratory of mathematics engineering and advanced computing Zhengzhou China
The correctness and reliability of data is the most basic element of data storage system. It is primary for data security to ensure the correctness and reliability of data. The dynamic heterogeneous redundancy model h... 详细信息
来源: 评论
Research on 3D Human Body Reconstruction Algorithm of Monocular Image
Research on 3D Human Body Reconstruction Algorithm of Monocu...
收藏 引用
Artificial Intelligence Technology (ACAIT), Asian Conference on
作者: Zijian Liang Huan Liang Wenlong Fu Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The three-dimensional human body feature parameters extracted by the neural network method are coupled in the high-dimensional feature space. The fully connected network processes the three-dimensional human pose and ... 详细信息
来源: 评论
FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virtual Execution
FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virt...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Zhijie Gui Hui Shu Ju Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Considering that the deployment of IoT devices is becoming more and more widespread, the security analysis of the firmware of these devices is extremely important. However, a large number of devices now have vulnerabi... 详细信息
来源: 评论
Thinking and Practice of Online Teaching under COVID-19 Epidemic
Thinking and Practice of Online Teaching under COVID-19 Epid...
收藏 引用
IEEE International Conference on Computer Science and Educational Informatization (CSEI)
作者: Zhang Ping Liu Fudong Shan Zheng State Key Laboratory of Mathematical Engineering and Advanced computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Implementation of Multi-compartment Neuron Model with Synaptic Plasticity Using FPGA
Implementation of Multi-compartment Neuron Model with Synapt...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Yiwen Ding Wenlong Fu Lihong Cao Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Computational neuroscience is interdisciplinary and plays an essential role in facilitating the development of cognitive neuroscience and Artificial General Intelligence (AGI). To explore the computational efficiency ... 详细信息
来源: 评论
Deep Learning based Recommedation System: A Review of Recent Works
Deep Learning based Recommedation System: A Review of Recent...
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Meiling Wang Xiaonan Liu Lina Jing State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The research upsurge of recommendation system and deep learning makes the deep learning based recommendation system become an inevitable trend. Through the introduction of the latest research of deep learning based re... 详细信息
来源: 评论
The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection
The Analysis of HTTPS Privacy Protection Based on Malicious ...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Zeyan Liu Jianshan Pen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th... 详细信息
来源: 评论
An Efficient Sieve Algorithm with Evolutionary Technique
An Efficient Sieve Algorithm with Evolutionary Technique
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Zedong Sun Chunxiang Gu Yonghui Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t... 详细信息
来源: 评论
The various graphs in graph computing  1
收藏 引用
22nd Annual Conference on Computer engineering and Technology, NCCET 2018
作者: Sun, Rujun Zhang, Lufei State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The world is full of relationships, and graph is the most evident representation for them. With the increasing of data scale, graphs become larger and have encountered a new world of analyzing. What can we learn from ... 详细信息
来源: 评论