咨询与建议

限定检索结果

文献类型

  • 1,075 篇 期刊文献
  • 879 篇 会议
  • 3 册 图书

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,244 篇 工学
    • 690 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 175 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 92 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 59 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 35 篇 核科学与技术
  • 1,005 篇 理学
    • 549 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 119 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 618 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 95 篇 university of ch...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 school of physic...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 77 篇 institute of fro...
  • 77 篇 school of physic...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 67 篇 national astrono...
  • 66 篇 department of en...

作者

  • 83 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 65 篇 li xin
  • 65 篇 guo y.q.
  • 64 篇 bao y.w.
  • 63 篇 hu h.b.
  • 63 篇 liu b.
  • 62 篇 min z.
  • 58 篇 qin j.j.

语言

  • 1,863 篇 英文
  • 52 篇 其他
  • 45 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是21-30 订阅
排序:
Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
收藏 引用
Chinese Journal of Electronics 2020年 第6期29卷 1165-1177页
作者: HE Kang ZHU Yuefei HE Yubo LIU Long LU Bin LIN Wei State Key Laboratory of Mathematical Engineering and Advanced Computing
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decrease... 详细信息
来源: 评论
Non-binary entanglement-assisted quantum stabilizer codes
收藏 引用
Science China(Information Sciences) 2017年 第4期60卷 210-223页
作者: Lan LUO Zhi MA Zhengchao WEI Riguang LENG State Key Laboratory of Mathematical Engineering and Advanced Computing
In this paper, we present the pm-ary entanglement-assisted(EA) stabilizer formalism, where p is a prime and m is a positive integer. Given an arbitrary non-abelian "stabilizer", the problem of code construct... 详细信息
来源: 评论
LaTLS: A Lattice-Based TLS Proxy Protocol
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 313-321页
作者: ZHANG Xinglong CHENG Qingfeng LI Yuting State Key Laboratory of Mathematical Engineering and Advanced Computing
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论
A Further Understanding of Differential-Linear Cryptanalysis
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 660-666页
作者: REN Jiongjiong CHEN Shaozhen State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Cryptology
Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the ***, the links between differential-lin... 详细信息
来源: 评论
Passive on-chip isolators based on the thin-film lithium niobate platform
收藏 引用
Chinese Physics B 2025年 第3期34卷 408-413页
作者: Jiacheng Liu Gongyu Xia Qilin Hong Pingyu Zhu Kai-Kai Zhang keyu Xia Ping Xu Shiqiao Qin Zhihong Zhu College of Advanced Interdisciplinary Studies&Hunan Provincial Key Laboratory of Novel Nano Optoelectronic Information Materials and Devices National University of Defense TechnologyChangsha 410073China Institute for Quantum Information and State Key Laboratory of High-Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China College of Engineering and Applied Sciences National Laboratory of Solid State Microstructuresand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210023China
Optical isolators,the photonic analogs of electronic diodes,are essential for ensuring the unidirectional flow of light in optical systems,thereby mitigating the destabilizing effects of back ***-film lithium niobate(... 详细信息
来源: 评论
ThicknesVAE: Learning a Latera Prior for Clothed Human Body Reconsuction
ThicknesVAE: Learning a Latera Prior for Clothed Human Body ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wu, Xiaotao Fan, Zhaoxin He, Huiguang Shen, Dinggang School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai201210 China NeuBCI Group State Key Laboratory of Brain Cognition and Brain-inspired Intelligence Technology Institute of Automation Chinese Academy of Sciences Beijing China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Institute of Artificial Intelligence Beihang University Beijing100191 China Beijing Academy of Blockchain and Edge Computing China Shanghai United Imaging Intelligence Co. Ltd. Shanghai200232 China Shanghai Clnical Research and Trial Center Shanghai201210 China
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper a... 详细信息
来源: 评论
Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack
收藏 引用
Communications in Theoretical Physics 2015年 第3期63卷 296-302页
作者: 王卫龙 高明 马智 State Key Laboratory of Mathematical Engineering and Advanced Computing
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol... 详细信息
来源: 评论
Super-Resolution of Diffusion-Weighted Images via TDI-Conditioned Diffusion Model  15th
Super-Resolution of Diffusion-Weighted Images via TDI-Cond...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Ma, Jiquan Teng, Yujun Chen, Geng Jiang, Haotian Zhang, Kai Liu, Feihong Rekik, Islem Shen, Dinggang School of Computer Science and Technology Heilongjiang University Harbin China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an China School of Biomedical Engineering and State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China School of Information Science and Technology Northwest University Xi’an China BASIRA Lab Imperial-X and Department of Computing Imperial College London London United Kingdom
Diffusion-Weighted Imaging (DWI) is a significant technique for studying white matter. However, it suffers from low-resolution obstacles in clinical settings. Post-acquisition Super-Resolution (SR) can enhance the res... 详细信息
来源: 评论
Low-power technologies in high-performance computer: trends and perspectives
收藏 引用
National Science Review 2016年 第1期3卷 23-25页
作者: Xianghui Xie State Key Laboratory of Mathematical Engineering and Advanced Computing
INTRODUCTION With the breakdown of Dennard’s scaling rule,chip power for a given area size is not constant as transistors shrink from generation to generation[1].In particular,the power wall problem worsens with the ... 详细信息
来源: 评论