咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是311-320 订阅
排序:
APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite
收藏 引用
Computers, Materials & Continua 2020年 第11期65卷 1795-1807页
作者: Tairan Hu Tianyang Zhou Yichao Zang Qingxian Wang Hang Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China School of Electrical Engineering and Telecommunications UNSW KensingtonNSW 2033Australia
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning und... 详细信息
来源: 评论
Similarity Measure for Binary Function Based on Graph Mover's Distance
Similarity Measure for Binary Function Based on Graph Mover'...
收藏 引用
2020 International Conference on Computer Vision, Image and Deep Learning, CVIDL 2020
作者: Sun, Wenjie Shan, Zheng Liu, Fudong Qiao, Meng Gui, Hairen Li, Xingwei State Key Laboratory of Mathematical Engineering and Advanced Computing China
Graph matching has a wide range of applications. However, graph matching faces two challenges: high computational complexity and loss information of graph embedded. In order to solve these two problems and correctly i... 详细信息
来源: 评论
A solvent-free process enabling ZnO/porous carbon with enhanced microwave absorption
收藏 引用
Journal of Materials Science & Technology 2023年 第18期149卷 255-264页
作者: Qi Chen Xing Liu Tingting Wang Xiaogang Su Meng Liu Somboon Chaemchuen Francis Verpoort State Key Laboratory of Advanced Technology for Materials Synthesis and Processing Wuhan University of TechnologyWuhan 430070China School of Materials Science and Engineering Wuhan University of TechnologyWuhan 430070China School of Mathematical&Physical Sciences Wuhan Textile UniversityWuhan 430200China National Research Tomsk Polytechnic University Lenin Avenue 30634050 TomskRussian Federation School of Materials Science and Engineering North University of ChinaTaiyuan 030051China
Exploring a simple,rapid,solvent-free synthetic method for mass production of cheap,broadband mi-crowave absorbers remains the main ***,a mild solvent-free procedure is reported to syn-thesize zinc oxide nanoparticles... 详细信息
来源: 评论
Study on Binary Code Evolution with Concrete Semantic Analysis  7th
Study on Binary Code Evolution with Concrete Semantic Analys...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Xia, Bing Pang, Jianmin Wang, Jun Liu, Fudong Yue, Feng Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450007 China ZhongYuan University of Technology Zhengzhou450007 China
The study on binary code evolution is very crucial for understanding vulnerability repair and malicious code variants. Researchers on code evolution focus on the source code level, whereas very few works have been don... 详细信息
来源: 评论
Effect of thickness variations of lithium niobate on insulator waveguide on the frequency spectrum of spontaneous parametric down-conversion
收藏 引用
Chinese Physics B 2021年 第11期30卷 268-273页
作者: Guang-Tai Xue Xiao-Hui Tian Chi Zhang Zhenda Xie Ping Xu Yan-Xiao Gong Shi-Ning Zhu National Laboratory of Solid State Microstructures School of PhysicsSchool of Electronic Science and EngineeringCollege of Engineering and Applied Sciencesand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210093China Institute for Quantum Information and State Key Laboratory of High Performance Computing College of ComputingNational University of Defense TechnologyChangsha 410073China
We study the effect of waveguide thickness variations on the frequency spectrum of spontaneous parametric downconversion in the periodically-poled lithium niobate on insulator(LNOI)*** analyze several variation models... 详细信息
来源: 评论
Feature Rotation Invariance Learning for Point Cloud Analysis  10
Feature Rotation Invariance Learning for Point Cloud Analysi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Shi, Lu Cao, Qi Zhang, Guoqing Yi, Jin Huang, Yansen Cen, Yigang Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer Science and Technology Visual Intellgence +X International Cooperation Joint Laboratory of Moe Beijing100044 China University of Glasgow The School of Computing Science 567739 Singapore Beijing Jiaotong University With the Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education The State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer and Information Technology Beijing100044 China Guizhou University Guizhou Lianjian Civil Engineering Quality Testing Monitoring Center Co. Ltd The College of Civil Engineering Guizhou550025 China
While deep learning has significantly advanced point cloud analysis, extracting effective features from their disordered structure remains challenging. Existing approaches often rely on complex network architectures o... 详细信息
来源: 评论
Association Analysis of User Promiscuous Traffic Based on Convolutional Neural Network  4
Association Analysis of User Promiscuous Traffic Based on Co...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Li, Yonglin Liu, Yan Zhengzhou University Zhong Yuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Analyzing user behavior from promiscuous network traffic, digging out user characteristics, and analyzing user behavior patterns are the main purposes of user association analysis. Existing methods start from the traf... 详细信息
来源: 评论
Computation Offloading for Multi-user Sequential Tasks in Heterogeneous Mobile Edge computing  17th
Computation Offloading for Multi-user Sequential Tasks in He...
收藏 引用
17th EAI International Conference on Collaborative computing: Networking, Applications, and Worksharing, CollaborateCom 2021
作者: Xu, Huanhuan Zhou, Jingya Gu, Fei School of Computer Science and Technology Soochow University Suzhou215006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Currently, many computation offloading studies in Mobile Edge computing (MEC) mainly focus on the multi-user and multi-task offloading, where the tasks are independent and inseparable. However, nowadays many mobile ap... 详细信息
来源: 评论
Nonautonomous Breather and Rogue Wave in Spinor Bose–Einstein Condensates with Space-Time Modulated Potentials
收藏 引用
Chinese Physics Letters 2023年 第4期40卷 6-10页
作者: 丁崔崔 周勤 徐四六 Houria Triki Mohammad Mirzazadeh 刘文军 Research Group of Nonlinear Optical Science and Technology School of Mathematical and Physical SciencesWuhan Textile UniversityWuhan 430200China State Key Laboratory of New Textile Materials and Advanced Processing Technologies Wuhan Textile UniversityWuhan 430200China School of Biomedical Engineering and Medical Imaging Xianning Medical CollegeHubei University of Science and TechnologyXianning 437100China Radiation Physics Laboratory Department of PhysicsFaculty of SciencesBadji Mokhtar UniversityP.O.Box 1223000 AnnabaAlgeria Department of Engineering Sciences Faculty of Technology and EngineeringEast of GuilanUniversity of GuilanRudsar-VajargahIran State Key Laboratory of Information Photonics and Optical Communications School of ScienceBeijing University of Posts and TelecommunicationsBeijing 100876China
To study controlled evolution of nonautonomous matter-wave breathers and rogue waves in spinor Bose–Einstein condensates with spatiotemporal modulation,we focus on a system of three coupled Gross–Pitaevskii equation... 详细信息
来源: 评论
A Decision Tree Based on Differential Privacy  5
A Decision Tree Based on Differential Privacy
收藏 引用
5th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Sun, Daozhu Li, Nan Yang, Shudan Du, Qiming Information Engineering University Department of Cyberspace Security Academy Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Harbin China
In the era of big data, personal privacy leakage has become a hidden danger for social development. As an output privacy protection model, differential privacy can effectively quantify and limit personal privacy discl... 详细信息
来源: 评论