咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 778 篇 期刊文献

馆藏范围

  • 1,587 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,034 篇 工学
    • 623 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 151 篇 信息与通信工程
    • 135 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 99 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 材料科学与工程(可...
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 64 篇 光学工程
    • 51 篇 机械工程
    • 50 篇 核科学与技术
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 752 篇 理学
    • 424 篇 物理学
    • 254 篇 数学
    • 96 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 87 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 25 篇 security
  • 25 篇 training
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 108 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 99 篇 state key labora...
  • 96 篇 yunnan observato...
  • 95 篇 university of ch...
  • 88 篇 key laboratory f...
  • 86 篇 department of ph...
  • 84 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 82 篇 moscow institute...
  • 82 篇 school of astron...
  • 81 篇 institute of fro...
  • 81 篇 national space s...
  • 80 篇 school of physic...
  • 70 篇 department of en...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 76 篇 danzengluobu
  • 75 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 69 篇 liu b.
  • 68 篇 liu d.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 68 篇 guo y.q.
  • 67 篇 chen m.j.
  • 67 篇 bao y.w.
  • 66 篇 hu h.b.
  • 65 篇 liu h.d.
  • 64 篇 li cheng
  • 64 篇 mao j.r.
  • 64 篇 fan y.z.

语言

  • 1,455 篇 英文
  • 98 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1587 条 记 录,以下是941-950 订阅
排序:
A Dual-Watermarking Scheme Robust to Affine Transformation
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1856卷
作者: Feng Liu State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou City Henan Province 450000 China College of Software Engineering Zhengzhou University of Light Industry Zhengzhou City Henan Province 450000 China
This paper proposes a robust watermarking algorithm based on dual watermarking and robust affine transformation. First, the color image is divided into three channels, feature point extraction, watermark embedding, an...
来源: 评论
A Robust Watermarking Scheme based on Delaunay Image Reconstruction Robust to Affine Transformation
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1871卷
作者: Liu Feng Daofu Gong Wenbing Wang State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou City Henan Province 450000 China College of Software Engineering Zhengzhou University of Light Industry Zhengzhou City Henan Province 450000 China
This paper proposes a sub-channel image reconstruction algorithm based on Delaunay triangle. First, according to the different sensitivity of the human eye to the three color channels, different channels are used to a...
来源: 评论
Directer: A parallel and directed fuzzing based on concolic execution  18
Directer: A parallel and directed fuzzing based on concolic ...
收藏 引用
7th International Conference on Software and Information engineering, ICSIE 2018
作者: Song, Xiaobin Wu, Zehui Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Malaysia China National Digital Switching System Engineering and Technological Research Center Zhengzhou China
Fuzzing is a widely used technology to find vulnerabilities, but the current technology is mostly based on coverage and there are relatively few research in the field of directed fuzzing. In this paper, a parallelized... 详细信息
来源: 评论
Universal description of wetting on multiscale surfaces using integral geometry
arXiv
收藏 引用
arXiv 2021年
作者: Sun, Chenhao McClure, James Berg, Steffen Mostaghimi, Peyman Armstrong, Ryan T. State Key Laboratory of Petroleum Resources and Prospecting China University of Petroleum Beijing102249 China Advanced Research Computing Virginia Tech Wright House W. Campus Drive BlacksburgVA24061 United States Shell Global Solutions International B.V. Grasweg 31 Amsterdam1031 WG Netherlands Imperial College London Department of Earth Science and Engineering and Chemical Engineering Exhibition Rd South Kensington LondonSW7 2BX United Kingdom School of Minerals and Energy Resources Engineering University of New South Wales KensingtonNSW2052 Australia
Hypothesis Emerging energy-related technologies deal with multiscale hierarchical structures, intricate surface morphology, non-axisymmetric interfaces, and complex contact lines where wetting is difficult to quantify... 详细信息
来源: 评论
Intra-pulse Intentional Modulation Recognition of Radar Signals at Low SNR  2
Intra-pulse Intentional Modulation Recognition of Radar Sign...
收藏 引用
2nd IEEE International Conference on Circuits, System and Simulation, ICCSS 2018
作者: Xi, Tian Yishan, Liu Xianyue, Pan Wentao, Chen College of Electronic Science and Engineering National University of Defense Technology Changsha China State Key Laboratory of Mathemsatical Engineering and Advanced Computing Wuxi China
Intra-pulse features extraction of radar is of great research significance in electronic reconnaissance technology. With continuous development and equipment of the new system radar, the characteristics of the modern ... 详细信息
来源: 评论
Factorization of odd integers as lattice search procedure  1
收藏 引用
9th International Symposium on Intelligence Computation and Applications, ISICA 2017
作者: Wang, Xingbo Foshan University Foshan CityGuangdong Province528000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The article puts forward a 3-dimensional searching approach that can factorize odd composite integers. The article first proves that, an odd composite number can be expressed by a trivariate function, then demonstrate... 详细信息
来源: 评论
A TrustEnclave-Based Architecture for Ensuring Run-Time Security in Embedded Terminals
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 447-457页
作者: Rui Chang Liehui Jiang Wenzhi Chen Yaobin Xie Zhongyong Lu the State Key Laboratory of Mathematic Engineering and Advanced Computing the Department of Computer Zhejiang University
The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use unive... 详细信息
来源: 评论
Performance of LHAASO-WCDA and observation of the Crab Nebula as a standard candle
收藏 引用
Chinese Physics C 2021年 第8期45卷 166-181页
作者: F.Aharonian Q.An Axikegu L.X.Bai Y.X.Bai Y.W.Bao D.Bastieri X.J.Bi Y.J.Bi H.Cai J.T.Cai Z.Cao Z.Cao J.Chang J.F.Chang X.C.Chang B.M.Chen J.Chen L.Chen L.Chen L.Chen M.J.Chen M.L.Chen Q.H.Chen S.H.Chen S.Z.Chen T.L.Chen X.L.Chen Y.Chen N.Cheng Y.D.Cheng S.W.Cui X.H.Cui Y.D.Cui B.Z.Dai H.L.Dai Z.G.Dai Danzengluobu D.della Volpe B.D'Ettorre Piazzoli X.J.Dong J.H.Fan Y.Z.Fan Z.X.Fan J.Fang K.Fang C.F.Feng L.Feng S.H.Feng Y.L.Feng B.Gao C.D.Gao Q.Gao W.Gao M.M.Ge L.S.Geng G.H.Gong Q.B.Gou M.H.Gu J.G.Guo X.L.Guo Y.Q.Guo Y.Y.Guo Y.A.Han H.H.He H.N.He J.C.He S.L.He X.B.He Y.He M.Heller Y.K.Hor C.Hou X.Hou H.B.Hu S.Hu S.C.Hu X.J.Hu D.H.Huang Q.L.Huang W.H.Huang X.T.Huang Z.C.Huang F.Ji X.L.Ji H.Y.Jia K.Jiang Z.J.Jiang C.Jin D.Kuleshov K.Levochkin B.B.Li C.Li C.Li F.Li H.B.Li H.C.Li H.Y.Li J.Li K.Li W.L.Li X.Li X.Li X.R.Li Y.Li Y.Z.Li Z.Li Z.Li E.W.Liang Y.F.Liang S.J.Lin B.Liu C.Liu D.Liu H.Liu H.D.Liu J.Liu J.L.Liu J.S.Liu J.Y.Liu M.Y.Liu R.Y.Liu S.M.Liu W.Liu Y.N.Liu Z.X.Liu W.J.Long R.Lu H.K.Lv B.Q.Ma L.L.Ma X.H.Ma J.R.Mao A.Masood W.Mitthumsiri T.Montaruli Y.C.Nan B.Y.Pang P.Pattarakijwanich Z.Y.Pei M.Y.Qi B.Q.Qiao D.Ruffolo V.Rulev A.Saiz L.Shao O.Shchegolev X.D.Sheng J.R.Shi H.C.Song Yu.V.Stenkin V.Stepanov Q.N.Sun X.N.Sun Z.B.Sun P.H.T.Tam Z.B.Tang W.W.Tian B.D.Wang C.Wang H.Wang H.G.Wang J.C.Wang J.S.Wang L.P.Wang L.Y.Wang R.N.Wang W.Wang W.Wang X.G.Wang X.J.Wang X.Y.Wang Y.D.Wang Y.J.Wang Y.P.Wang Z.Wang Z.Wang Z.H.Wang Z.X.Wang D.M.Wei J.J.Wei Y.J.Wei T.Wen C.Y.Wu H.R.Wu S.Wu W.X.Wu X.F.Wu S.Q.Xi J.Xia J.J.Xia G.M.Xiang G.Xiao H.B.Xiao G.G.Xin Y.L.Xin Y.Xing D.L.Xu R.X.Xu L.Xue D.H.Yan C.W.Yang F.F.Yang J.Y.Yang L.L.Yang M.J.Yang R.Z.Yang S.B.Yang Y.H.Yao Z.G.Yao Y.M.Ye L.Q.Yin N.Yin X.H.You Z.Y.You Y.H.Yu Q.Yuan H.D.Zeng T.X.Zeng W.Zeng Z.K.Zeng M.Zha X.X.Zhai B.B.Zhang H.M.Zhang H.Y.Zhang J.L.Zhang J.W.Zhang L.Zhang L.Zhang L.X.Zhang P.F.Zhang P.P.Zhang R.Zhang S.R.Zhang S.S.Zhang X.Zhang X.P.Zhang Y.Zhang Y.Zhang Y.F.Zhang Y.L.Zhang B.Zhao J.Zhao L.Zhao L.Z.Zhao S.P.Zhao F.Zheng Y.Zheng B.Zhou H.Zhou J.N.Zhou Key Laboratory of Particle Astrophyics&Experimental Physics Division&Computing Center Institute of High Energy PhysicsChinese Academy of SciencesBeijing 100049China University of Chinese Academy of Sciences Beijing 100049China TIANFU Cosmic Ray Research Center ChengduSichuanChina State Key Laboratory of Particle Detection and Electronics China University of Science and Technology of China Hefei 230026China Department of Engineering Physics Tsinghua UniversityBeijing 100084China National Astronomical Observatories Chinese Academy of SciencesBeijing 100101China National Space Science Center Chinese Academy of SciencesBeijing 100190China School of Physics Peking UniversityBeijing 100871China Center for Astrophysics Guangzhou UniversityGuangzhou 510006China School of Physics and Astronomy&School of Physics(Guangzhou) Sun Yat-sen UniversityZhuhai 519082China School of Physical Science and Technology Guangxi UniversityNanning 530004China Hebei Normal University Shijiazhuang 050024China School of Physics and Microelectronics Zhengzhou UniversityZhengzhou 450001China School of Astronomy and Space Science Nanjing UniversityNanjing 210023China Key Laboratory of Dark Matter and Space Astronomy Purple Mountain ObservatoryChinese Academy of SciencesNanjing 210023China Institute of Frontier and Interdisciplinary Science Shandong UniversityQingdao 266237China Key Laboratory for Research in Galaxies and Cosmology Shanghai Astronomical ObservatoryChinese Academy of SciencesShanghai 200030China Tsung-Dao Lee Institute&School of Physics and Astronomy Shanghai Jiao Tong UniversityShanghai 200240China School of Physical Science and Technology&School of Information Science and Technology Southwest Jiaotong UniversityChengdu 610031China College of Physics Sichuan UniversityChengdu 610065China Key Laboratory of Cosmic Rays(Tibet University) Ministry of EducationLhasa 850000China School of Physics and Technology Wuhan UniversityWuhan 430072China School of Physics and Astronomy Yunnan University
The first Water Cherenkov detector of the LHAASO experiment(WCDA-1)has been operating since April *** data for the first year have been analyzed to test its performance by observing the Crab Nebula as a standard *** W... 详细信息
来源: 评论
Virtual Sample Generation for Retraining the Malicious PDF Detection Model
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1584卷
作者: Kang He Long Liu Dong-Zhe Lu Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China Information Engineering University Zhengzhou 450001 China
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative vulnerabilities. Machine learning algorithms are developed to detect the maliciousness of PDF files. A...
来源: 评论
Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1584卷
作者: Tao Zhang Bin Lu Ding Li Kang He Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China Information Engineering University Zhengzhou 450001 China
Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable vir...
来源: 评论