咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是361-370 订阅
排序:
Simulation detection based on single photon quantum key distribution protocol
Simulation detection based on single photon quantum key dist...
收藏 引用
2020 International Conference on Electronics, Communications and Information Technology, CECIT 2020
作者: Liu, X.N. Hu, C.C. Yin, M.J. Jin, L. School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论
Dual-axial self-attention network for text classification
收藏 引用
Science China(Information Sciences) 2021年 第12期64卷 80-90页
作者: Xiaochuan ZHANG Xipeng QIU Jianmin PANG Fudong LIU Xingwei LI State Key Laboratory of Mathematical Engineering and Advanced Computing Shanghai Key Laboratory of Intelligent Information Processing Fudan University School of Computer Science Fudan University
Text classification is an important task in natural language processing and numerous studies aim to improve the accuracy and efficiency of text classification models. In this study, we propose an effective and efficie... 详细信息
来源: 评论
A Software Diversity-Based Lab in Operating System for Cyber Security Students  3
A Software Diversity-Based Lab in Operating System for Cyber...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Wang, Junchao Pang, Jianmin Shan, Zheng Wei, Jin Yao, Jinyang Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zheng Zhou China School of Computer Science Data Arena Institute Fudan University Zheng Zhou China
The course of operating system's labs usually fall behind the state of art technology. In this paper, we propose a Software Diversity-Assisted Defense (SDAD) lab based on software diversity, mainly targeting for s... 详细信息
来源: 评论
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed Signals on Coprime Array
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed ...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Heng Jiang Lichun Li Hailong Zhang Hongyi Pan Xue Li College of Information System Engineering Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The coprime array constructs virtual array to obtain higher degrees of freedom (DOF), but the premise of doing so is that the signals are independent of each other. Once there are coherent signals, the signal model of... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model  7th
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Zhang, Wenning Zhou, Qinglei Jiao, Chongyang Xu, Ting State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China Zhongyuan University of Technology Zhengzhou450000 China Zhengzhou University Zhengzhou450000 China
To solve the emerging complex optimization problems, multi objective optimization algorithms are needed. By introducing the surrogate model for approximate fitness calculation, the multi objective firefly algorithm wi... 详细信息
来源: 评论
Metaheuristic Optimization Methods and Techniques for Multiple Sclerosis Detection  4th
Metaheuristic Optimization Methods and Techniques for Multip...
收藏 引用
4th International Conference on IoT and Big Data Technologies for Health Care, IotCare 2023
作者: Wang, Jiaji Wu, Meng Chen, Shuwen Zhu, Huisheng School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom School of Physics and Information Engineering Jiangsu Second Normal University Jiangsu Nanjing210016 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China
This paper explores the application of metaheuristic optimization methods in the context of Multiple Sclerosis (MS) detection, addressing the challenges of early and accurate diagnosis. It introduces Genetic Algorithm... 详细信息
来源: 评论
Mechanistic investigation of highly bendable magnesium alloy sheet fabricated by short-process manufacturing
收藏 引用
Journal of Magnesium and Alloys 2024年 第10期12卷 4289-4310页
作者: Shiwei Xu Peijie Xiao Xiaofan Wu John Holmes Frédéric Mompiou Zhenyu Xiao Chen Jin Tianjiao Li Kuaishe Wang Zhuoran Zeng College of Mechanical and Vehicle Engineering Hunan UniversityChangsha 410082China State Key Laboratory of Advanced Design and Manufacturing Technology for Vehicle Hunan UniversityChangsha 410082China Suzhou Research Institute of Hunan University Suzhou 215131China College of Engineering Computing and CyberneticAustralian National UniversityACT 2601Australia CEMES-CNRS Universitéde Toulouse29 rue J.MarvigToulouse 31055France Qinghai Salt Lake Teli Magnesium Co. Ltd.Xining 810000China International Joint Laboratory for Light Alloys(Ministry of Education) College of Materials Science and EngineeringChongqing UniversityChongqing 400044China School of Metallurgical Engineering Xi’an University of Architecture&TechnologyXi’an 710055China College of Materials Science and Engineering Hunan UniversityChangsha 410082China
In this study,a commercial magnesium alloy AZ31(Mg-3Al-1Zn-0.3Mn)sheet through a short manufacturing process was found to be ductile and highly formable in *** possessing a strong basal texture,the short-processed she... 详细信息
来源: 评论
Use Tabu Search Particle Swarm Optimization Algorithm to Detect COVID-19  4th
Use Tabu Search Particle Swarm Optimization Algorithm to Det...
收藏 引用
4th International Conference on IoT and Big Data Technologies for Health Care, IotCare 2023
作者: Chen, Shuwen Wang, Jiaji Zhu, Huisheng School of Physics and Information Engineering Jiangsu Second Normal University Jiangsu Nanjing210016 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom
Efficient and accurate COVID-19 detection methods are paramount in the ongoing battle against the global pandemic. In this study, we present a novel approach that leverages the Tabu Search Particle Swarm Optimization ... 详细信息
来源: 评论
A software upgrade security analysis method on network traffic classification using deep learning
A software upgrade security analysis method on network traff...
收藏 引用
2020 International Conference on Urban engineering and Management Science, ICUEMS 2020
作者: Zhang, Bing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论