咨询与建议

限定检索结果

文献类型

  • 1,084 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,254 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 169 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 552 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1966 条 记 录,以下是401-410 订阅
排序:
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph
ZeroDVS: Trace-Ability and Security Detection of Container I...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Yan Zheng Weiyu Dong Jiangtao Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
Docker image is the foundation for container operation. Docker Hub is the largest online repository of public container images. Users can upload and download any random image file to the hub due to the absence of adeq... 详细信息
来源: 评论
ThicknesVAE: Learning a Latera Prior for Clothed Human Body Reconsuction
ThicknesVAE: Learning a Latera Prior for Clothed Human Body ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wu, Xiaotao Fan, Zhaoxin He, Huiguang Shen, Dinggang School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai201210 China NeuBCI Group State Key Laboratory of Brain Cognition and Brain-inspired Intelligence Technology Institute of Automation Chinese Academy of Sciences Beijing China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Institute of Artificial Intelligence Beihang University Beijing100191 China Beijing Academy of Blockchain and Edge Computing China Shanghai United Imaging Intelligence Co. Ltd. Shanghai200232 China Shanghai Clnical Research and Trial Center Shanghai201210 China
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper a... 详细信息
来源: 评论
mathematical modeling of lunar soft landing —Take chang'e-3 as an example
Mathematical modeling of lunar soft landing —Take chang'e-3...
收藏 引用
IEEE International Conference on Automation, Electronics and Electrical engineering (AUTEEE)
作者: Benchao Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, the three-dimensional sphere dynamic model of lunar precise soft landing of the probe is discussed. Taking the National College Students' mathematical modeling competition as the background and Chan... 详细信息
来源: 评论
A Novel Feature Selection Strategy Based on Salp Swarm Algorithm for Plant Disease Detection
收藏 引用
Plant Phenomics 2023年 第2期5卷 209-225页
作者: Xiaojun Xie Fei Xia Yufeng Wu Shouyang Liu Ke Yan Huanliang Xu Zhiwei Ji College of Artificial Intelligence Nanjing Agricultural UniversityNanjingJiangsu 210095China Center for Data Science and Intelligent Computing Nanjing Agricultural UniversityNanjingJiangsu 210095China State Key Laboratory for Crop Genetics and Germplasm Enhancement Bioinformatics CenterAcademy for Advanced Interdisciplinary StudiesNanjing Agricultural UniversityNanjingJiangsu 210095China Academy for Advanced Interdisciplinary Studies Nanjing Agricultural UniversityNanjingJiangsu 210095China Department of the Built Environment College of Design and EngineeringNational University of Singapore4 Architecture DriveSingapore 117566Singapore
Deep learning has been widely used for plant disease recognition in smart agriculture and has proven to be a powerful tool for image classification and pattern ***,it has limited interpretability for deep *** the tran... 详细信息
来源: 评论
SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints
arXiv
收藏 引用
arXiv 2024年
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论
A Partial-Lifting-Based Compiling Concolic Execution Approach
A Partial-Lifting-Based Compiling Concolic Execution Approac...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Haotian Zhang Weiyu Dong Jian Lin State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
It has been a common phenomenon that embedded devices are used ubiquitously while the security of proprietary software running on devices has become more and more significant. These softwares are often presented to re... 详细信息
来源: 评论
Research on security assessment based on big data and multi-entity profile
Research on security assessment based on big data and multi-...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Wenfu Liu Jianmin Pang Shudan Yang Nan Li Qiming Du Daozhu Sun Fudong Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have intern... 详细信息
来源: 评论
Molecular Dynamics Study of the Effect of Substrate Temperature on the Barrier Behavior in Aluminum Oxide Josephson Junctions
SSRN
收藏 引用
SSRN 2022年
作者: Han, Chuanbing Sun, Huihui Hou, Chaofeng Qiu, Junling Wang, Weilong Liu, Fudong Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Institute of Process Engineering Chinese Academy of Sciences Beijing100190 China
Although the quality and reliability of Josephson junctions have improved considerably, the effect of preparation parameters on the structure and nanochemical properties of the barrier layer remains elusive. Here, we ... 详细信息
来源: 评论
Integrating KNN and Gradient Boosting Decision Tree for Recommendation
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Qiming Du Nan Li Shudan Yang Daozhu Sun Wenfu Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论
Expert with Outlier Exposure for Continual Learning of New Diseases
Expert with Outlier Exposure for Continual Learning of New D...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Xu, Zhengjing Chen, Kanghao Zheng, Wei-Shi Tan, Zhijun Yang, Xiaobo Wang, Ruixuan Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE China State Key Laboratory of Dampness Syndrome of Chinese Medicine Guangzhou China Peng Cheng Laboratory Department of Network Intelligence Shenzhen China
Current intelligent diagnosis systems struggle to continually learn to diagnose more and more diseases due to catastrophic forgetting of old knowledge when learning new knowledge. Although storing small old data for s... 详细信息
来源: 评论