咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是101-110 订阅
排序:
Recent progress of iron-based electrocatalysts for nitrogen reduction reaction
收藏 引用
Journal of Materials Science & Technology 2023年 第9期140卷 121-134页
作者: Tianyi Wang Zhongyuan Guo Xiaoli Zhang Qinye Li Aimin Yu Chengzhang Wu Chenghua Sun Department of Chemistry and Biotechnology School of ScienceComputing and Engineering TechnologiesSwinburne University of TechnologyHawthornVIC3122Australia School of Material Science and Engineering Zhengzhou UniversityZhengzhou 450001China State Key Laboratory of Advanced Special Steel Shanghai Key Laboratory of Advanced FerrometallurgySchool of Materials Science and EngineeringShanghai UniversityShanghai 200444China
Ammonia is a critical feedstock for modern industry and agriculture,which is also a promising carbonfree energy *** nitrogen reduction reaction(ENRR)is a sustainable and efficient approach to synthesize ammonia under ... 详细信息
来源: 评论
Interest Points Analysis for Internet Forum Based on Long-Short Windows Similarity
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3247-3267页
作者: Xinghai Ju Jicang Lu Xiangyang Luo Gang Zhou Shiyu Wang Shunhang Li Yang Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China School of Computing and Information Systems Singapore Management University188065Singapore College of Computer Science and Big Data Fuzhou UniversityFuzhou350116China
For Internet forum Points of Interest(PoI),existing analysis methods are usually lack of usability analysis under different conditions and ignore the long-term variation,which lead to blindness in method *** address t... 详细信息
来源: 评论
Passive on-chip isolators based on the thin-film lithium niobate platform
收藏 引用
Chinese Physics B 2025年 第3期34卷 408-413页
作者: Jiacheng Liu Gongyu Xia Qilin Hong Pingyu Zhu Kai-Kai Zhang keyu Xia Ping Xu Shiqiao Qin Zhihong Zhu College of Advanced Interdisciplinary Studies&Hunan Provincial Key Laboratory of Novel Nano Optoelectronic Information Materials and Devices National University of Defense TechnologyChangsha 410073China Institute for Quantum Information and State Key Laboratory of High-Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China College of Engineering and Applied Sciences National Laboratory of Solid State Microstructuresand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210023China
Optical isolators,the photonic analogs of electronic diodes,are essential for ensuring the unidirectional flow of light in optical systems,thereby mitigating the destabilizing effects of back ***-film lithium niobate(... 详细信息
来源: 评论
DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight
DPW-RRM: Random Routing Mutation Defense Method Based on Dyn...
收藏 引用
作者: Jin, Hui Li, Zhaoyang Hu, Ruiqin Tan, Jinglei Zhang, Hongqi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China School of Cyberspace Security Zhengzhou University Zhengzhou Henan450001 China
Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the... 详细信息
来源: 评论
A Binary Function Name Prediction Method Based on Variable Alignment and Translation Model  4
A Binary Function Name Prediction Method Based on Variable A...
收藏 引用
4th International Conference on Machine Learning and Computer Application, ICMLCA 2023
作者: Xia, Bing Yin, Jiabin Ge, Yunxiang Yang, Ruinan ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China ZhongYuan University of Technology Zhengzhou China
Binary function naming is a code analysis task that generates functional descriptions of functions, and its results can be applied in the fields of malicious code analysis, vulnerability causation analysis, and algori... 详细信息
来源: 评论
Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
收藏 引用
Chinese Journal of Electronics 2020年 第6期29卷 1165-1177页
作者: HE Kang ZHU Yuefei HE Yubo LIU Long LU Bin LIN Wei State Key Laboratory of Mathematical Engineering and Advanced Computing
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decrease... 详细信息
来源: 评论
Research on Sleep Staging Method Based on Multi-Scale Convolution and Self-Attention Mechanism  2
Research on Sleep Staging Method Based on Multi-Scale Convol...
收藏 引用
2nd International Conference on Biomedical and Intelligent Systems, IC-BIS 2023
作者: Pan, Dongdong Li, Yingying School of Computer and Artificial Intelligence Zhengzhou University China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University China
Sleep is a very important physiological process for humans, and sleep staging is an important basis for evaluating sleep quality and diagnosing sleep-related diseases. Manual sleep staging is time-consuming and labori... 详细信息
来源: 评论
Numerical Simulation Study of Oil-Water Emulsion Separation in an Ultrasonic Field:Effect of Coupling between Acoustic and Flow Field Parameters
收藏 引用
China Petroleum Processing & Petrochemical Technology 2024年 第1期26卷 116-125页
作者: Wang Heping Lin Yinchao Li Yanggui Zhang Xiaohang Wu Yi Key Laboratory of Engineering Mathematics and Advanced Computing of Nanchang Institute of Technology School of SciencesNanchang Institute of TechnologyNanchang 330099People’s Republic of China Dongguan Key Laboratory of Kunpeng Computing School of Computer ScienceGuangdong University of Science&TechnologyDongguan 523083China State Key Laboratory of Plateau Ecology and Agriculture Qinghai UniversityXining 810016China
In this study,the separation and coalescence of oil-in-water emulsions are explored in an ultrasonic field using the lattice Boltzmann *** simulating the propagation of ultrasonic waves,this study focuses on examining... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
The convergence properties of infeasible inexact proximal alternating linearized minimization
收藏 引用
Science China Mathematics 2023年 第10期66卷 2385-2410页
作者: Yukuan Hu Xin Liu State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China
The proximal alternating linearized minimization(PALM)method suits well for solving blockstructured optimization problems,which are ubiquitous in real *** the cases where subproblems do not have closed-form solutions,... 详细信息
来源: 评论