咨询与建议

限定检索结果

文献类型

  • 1,085 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,257 篇 工学
    • 703 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 175 篇 信息与通信工程
    • 171 篇 电气工程
    • 122 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 83 篇 网络空间安全
    • 70 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 549 篇 物理学
    • 385 篇 数学
    • 124 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 法学
    • 31 篇 社会学
  • 38 篇 医学
    • 32 篇 临床医学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 15 篇 topology
  • 14 篇 network topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 615 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 65 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1966 条 记 录,以下是201-210 订阅
排序:
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering  16
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论
A Natural Deep Ritz Method for Essential Boundary Value Problems
收藏 引用
Journal of Computational Physics 2025年
作者: Haijun Yu Shuo Zhang Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and System Sciences State Key Laboratory of Mathematical Sciences (SKLMS) and State Key Laboratory of Scientific and Engineering Computing (LSEC) Chinese Academy of Sciences Beijing 100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing 100049 China
Deep neural network approaches show promise in solving partial differential equations. However, unlike traditional numerical methods, they face challenges in enforcing essential boundary conditions. The widely adopted...
来源: 评论
Truth discovery on multi-dimensional properties of data sources  19
Truth discovery on multi-dimensional properties of data sour...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Zheng, Yan Yin, Meijuan Luo, Junyong He, Gongzhen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
In the era of information explosion, data fusion has captured increasing attention from researchers as it plays an important part in data application. However, resolving the inconsistency of information generated by v... 详细信息
来源: 评论
Recommender system based on adaptive threshold filtering GCN
Recommender system based on adaptive threshold filtering GCN
收藏 引用
2022 International Conference on Neural Networks, Information, and Communication engineering, NNICE 2022
作者: Qiao, Meng Gui, Hairen Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio... 详细信息
来源: 评论
A survey of proactive defense in industrial control system
A survey of proactive defense in industrial control system
收藏 引用
2022 International Conference on Electronic Information Technology, EIT 2022
作者: Liu, Ke Wu, Qianqiong Geng, Yangyang Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de... 详细信息
来源: 评论
Anti-obfuscation Binary Code Clone Detection Based on Software Gene  7th
Anti-obfuscation Binary Code Clone Detection Based on Softwa...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Tang, Ke Liu, Fudong Shan, Zheng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin... 详细信息
来源: 评论
Research on general permutation encryption module based on chaos theory  5
Research on general permutation encryption module based on c...
收藏 引用
2014 5th International Conference on Information Technology for Manufacturing Systems, ITMS 2014
作者: Sun, Wen Jie State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam... 详细信息
来源: 评论
Efficient and secure authentication scheme based on certificateless aggregate signature in space networks  7
Efficient and secure authentication scheme based on certific...
收藏 引用
2017 7th International Workshop on Computer Science and engineering, WCSE 2017
作者: Hu, Zhiyan Du, Xuehui Cao, Lifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
According to the requirements of the space networks for computing cost, communication cost and security, a new efficient certificateless aggregate signature algorithm is proposed. The signature length is only 2 group ... 详细信息
来源: 评论
A Survey of Security Analysis on Industrial Control Devices via Rehosting  3
A Survey of Security Analysis on Industrial Control Devices ...
收藏 引用
3rd IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Liu, Houzhi Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
At present, the network security of embedded devices has received more and more attention. However, the existing dynamic analysis tools can't performance in embedded devices as common softwares. The main reason is... 详细信息
来源: 评论
Network representation learning based extended matrix factorization for recommendation  6th
Network representation learning based extended matrix factor...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Xu, Jinmao Gong, Daofu Liu, Fenlin Tan, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in... 详细信息
来源: 评论