咨询与建议

限定检索结果

文献类型

  • 1,075 篇 期刊文献
  • 879 篇 会议
  • 3 册 图书

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,244 篇 工学
    • 690 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 175 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 92 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 59 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 35 篇 核科学与技术
  • 1,005 篇 理学
    • 549 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 119 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 618 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 95 篇 university of ch...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 school of physic...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 77 篇 institute of fro...
  • 77 篇 school of physic...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 67 篇 national astrono...
  • 66 篇 department of en...

作者

  • 83 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 65 篇 li xin
  • 65 篇 guo y.q.
  • 64 篇 bao y.w.
  • 63 篇 hu h.b.
  • 63 篇 liu b.
  • 62 篇 min z.
  • 58 篇 qin j.j.

语言

  • 1,863 篇 英文
  • 52 篇 其他
  • 45 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是31-40 订阅
排序:
RobNODDI: Robust NODDI Parameter Estimation with Adaptive Sampling Under Continuous Representation
RobNODDI: Robust NODDI Parameter Estimation with Adaptive S...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Xiao, Taohui Cheng, Jian Fan, Wenxin Yang, Jing Li, Cheng Dong, Enqing Wang, Shanshan School of Mechanical Electrical and Information Engineering Shandong University Weihai264209 China State Key Laboratory of Software Development Environment Beihang University Beijing China Key Laboratory of Data Science and Intelligent Computing Institute of International Innovation Beihang University Zhejiang Hangzhou China Paul C. Lauterbur Research Center for Biomedical Imaging Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen China Peng Cheng Laboratory Guangdong Shenzhen China
Neurite Orientation Dispersion and Density Imaging (NODDI) is an important imaging technology used to evaluate the microstructure of brain tissue, which is of great significance for the discovery and treatment of vari... 详细信息
来源: 评论
Solid-state stepwise temperature-programmable synthesis of bioinspired Fe-N-C oxygen reduction electrocatalyst featuring Fe-N_(5)configuration
收藏 引用
Nano Research 2025年 第3期18卷 654-665页
作者: Wei Sang Somboon Chaemchuen Longyang Zhang Zechen Wang Xingchuan Li Cocoro Andrew Nagasaka Mo Xiong Naoki Ogiwara Cheng Chen Zhao Wang Jian Zhang Francis Verpoort Shichun Mu Zongkui Kou Tingting Wang State Key Laboratory of Advanced Technology for Materials Synthesis and Processing Wuhan University of TechnologyWuhan 430070China Department of Basic Science School of Arts and SciencesThe University of TokyoKomabaMeguro-kuTokyo 153-8902Japan MOE Key Laboratory for Non-Equilibrium Synthesis and Modulation of Condensed Matter School of PhysicsXi’an Jiao tong UniversityXi’an 710049China Sanya Science and Education Innovation Park of Wuhan University of Technology Sanya 572000China Department of Chemical Engineering Faculty of EngineeringMahidol UniversityNakhon Pathom 73170Thailand School of Mathematical&Physical Sciences Wuhan Textile UniversityWuhan 430200China Joint Institute of Chemical Research(FFMiEN) Peoples Friendship University of Russia(RUDN University)6 Miklukho-Maklaya Str.117198 MoscowRussia National Research Tomsk Polytechnic University Lenin Avenue 30634050 TomskRussia Hubei Key Laboratory of Ferro &Piezo-electric Materials and DevicesFaculty of Physics and Electronic SciencesHubei UniversityWuhan 430062China School of Chemistry and Chemical Engineering Hainan UniversityHaikou 57022China
The bioinspired Fe-N-C features an asymmetric Fe-N_(5)configuration to produce active metal-oxygen intermediates by introducing axial N ligand into a symmetric Fe-N_(4) structure,enabling highly active oxygen reductio... 详细信息
来源: 评论
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 455-465页
作者: Jialin Li Xiangyang Luo Yi Zhang Pei Zhang Chunfang Yang Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography... 详细信息
来源: 评论
Cooperative computing Techniques for a Deeply Fused and Heterogeneous Many-Core Processor Architecture
收藏 引用
Journal of Computer Science & Technology 2015年 第1期30卷 145-162页
作者: 郑方 李宏亮 吕晖 过锋 许晓红 谢向辉 State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h... 详细信息
来源: 评论
Angle-resolved magneto-chiral anisotropy in a non-centrosymmetric atomic layer superlattice
收藏 引用
Science Bulletin 2025年 第9期70卷 1406-1409页
作者: Cheng, Long Bao, Mingrui Zhang, Xue Zhang, Jingxian Yang, Qun Li, Qiang Cao, Hui Qiu, Dawei Li, Hui Cheng, Guanglei Zhou, Hua Zuo, Jian-Min Zhou, Xiaodong Shen, Jian Zhu, Zhifeng Wang, Wenbo Zhai, Xiaofang School of Physical Science and Technology ShanghaiTech University Shanghai201210 China CAS Key Laboratory of Microscale Magnetic Resonance and School of Physical Sciences University of Science and Technology of China Hefei230026 China School of Information Science and Technology ShanghaiTech University Shanghai201210 China State Key Laboratory of Surface Physics and Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai200433 China X-ray Science Division Advanced Photon Source Argonne National Laboratory LemontIL60439 United States Institutes of Physical Science and Information Technology Anhui University Hefei230601 China Department of Materials Science and Engineering and Materials Research Laboratory University of Illinois Urbana–Champaign UrbanaIL61801 United States ShanghaiTech Laboratory for Topological Physics ShanghaiTech University Shanghai201210 China
来源: 评论
Unraveling the Morphological and Energetic Properties of 2PACz Self-Assembled Monolayers Fabricated With Upscaling Deposition Methods
收藏 引用
Energy & Environmental Materials 2025年 第2期8卷 295-308页
作者: Silvia Mariotti Ilhem Nadia Rabehi Congyang Zhang Xiaomin Huo Jiahao Zhang Penghui Ji Tianhao Wu Tongtong Li Shuai Yuan Xiaomin Liu Ting Guo Chenfeng Ding Hengyuan Wang Annalisa Bruno Luis K.Ono Yabing Qi Energy Materials and Surface Sciences Unit (EMSSU) Okinawa Institute of cience and Technology Graduate University (OIST) State Key Laboratory of Organic Electronics and Information Displays & Institute of Advanced Materials (IAM) Nanjing University of Posts & Telecommunications School of Physical and Mathematical Science & School of Materials Science Engineering & EEnergy Research Institute NTU Nanyang Technological University
Self-assembled monolayers(SAMs) are widely used as hole transport materials in inverted perovskite solar cells,offering low parasitic absorption and suitability for semitransparent and tandem solar *** SAMs have sho... 详细信息
来源: 评论
Cryptanalysis of full PRIDE block cipher
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 169-180页
作者: Yibin DAI Shaozhen CHEN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight... 详细信息
来源: 评论
Stego key searching for LSB steganography on JPEG decompressed image
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 60-74页
作者: Jiufen LIU Yuguo TIAN Tao HAN Junchao WANG Xiangyang LUO Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
At present, steganalysis research focuses on detecting the existence of a hidden message. However,extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer f... 详细信息
来源: 评论
Software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 评论
An efficient quantum meet-in-the-middle attack against NTRU-2005
收藏 引用
Chinese Science Bulletin 2013年 第28期58卷 3514-3518页
作者: WANG Hong MA Zhi MA ChuanGui State Key Laboratory of Mathematical Engineering and Advanced Computing
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and ... 详细信息
来源: 评论