咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是21-30 订阅
排序:
A Note on "Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus"
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Fei Wang, Zilong Gong, Guang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada
In 2017, Zhang et al. proposed a question (not open problem) and two open problems in [IEEE TIT 63 (8): 5336–5349, 2017] about constructing bent functions by using Rothaus’ construction. In this note, we prove that ... 详细信息
来源: 评论
ThicknesVAE: Learning a Latera Prior for Clothed Human Body Reconsuction
ThicknesVAE: Learning a Latera Prior for Clothed Human Body ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wu, Xiaotao Fan, Zhaoxin He, Huiguang Shen, Dinggang School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai201210 China NeuBCI Group State Key Laboratory of Brain Cognition and Brain-inspired Intelligence Technology Institute of Automation Chinese Academy of Sciences Beijing China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Institute of Artificial Intelligence Beihang University Beijing100191 China Beijing Academy of Blockchain and Edge Computing China Shanghai United Imaging Intelligence Co. Ltd. Shanghai200232 China Shanghai Clnical Research and Trial Center Shanghai201210 China
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper a... 详细信息
来源: 评论
Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
收藏 引用
Chinese Journal of Electronics 2020年 第6期29卷 1165-1177页
作者: HE Kang ZHU Yuefei HE Yubo LIU Long LU Bin LIN Wei State Key Laboratory of Mathematical Engineering and Advanced Computing
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decrease... 详细信息
来源: 评论
Non-binary entanglement-assisted quantum stabilizer codes
收藏 引用
Science China(Information Sciences) 2017年 第4期60卷 210-223页
作者: Lan LUO Zhi MA Zhengchao WEI Riguang LENG State Key Laboratory of Mathematical Engineering and Advanced Computing
In this paper, we present the pm-ary entanglement-assisted(EA) stabilizer formalism, where p is a prime and m is a positive integer. Given an arbitrary non-abelian "stabilizer", the problem of code construct... 详细信息
来源: 评论
LaTLS: A Lattice-Based TLS Proxy Protocol
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 313-321页
作者: ZHANG Xinglong CHENG Qingfeng LI Yuting State Key Laboratory of Mathematical Engineering and Advanced Computing
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论
Metaheuristic Optimization Methods and Techniques for Multiple Sclerosis Detection  4th
Metaheuristic Optimization Methods and Techniques for Multip...
收藏 引用
4th International Conference on IoT and Big Data Technologies for Health Care, IotCare 2023
作者: Wang, Jiaji Wu, Meng Chen, Shuwen Zhu, Huisheng School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom School of Physics and Information Engineering Jiangsu Second Normal University Jiangsu Nanjing210016 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China
This paper explores the application of metaheuristic optimization methods in the context of Multiple Sclerosis (MS) detection, addressing the challenges of early and accurate diagnosis. It introduces Genetic Algorithm... 详细信息
来源: 评论
Use Tabu Search Particle Swarm Optimization Algorithm to Detect COVID-19  4th
Use Tabu Search Particle Swarm Optimization Algorithm to Det...
收藏 引用
4th International Conference on IoT and Big Data Technologies for Health Care, IotCare 2023
作者: Chen, Shuwen Wang, Jiaji Zhu, Huisheng School of Physics and Information Engineering Jiangsu Second Normal University Jiangsu Nanjing210016 China State Key Laboratory of Millimeter Waves Southeast University Nanjing210096 China School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom
Efficient and accurate COVID-19 detection methods are paramount in the ongoing battle against the global pandemic. In this study, we present a novel approach that leverages the Tabu Search Particle Swarm Optimization ... 详细信息
来源: 评论
RobNODDI: Robust NODDI Parameter Estimation with Adaptive Sampling Under Continuous Representation  15th
RobNODDI: Robust NODDI Parameter Estimation with Adaptive S...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Xiao, Taohui Cheng, Jian Fan, Wenxin Yang, Jing Li, Cheng Dong, Enqing Wang, Shanshan School of Mechanical Electrical and Information Engineering Shandong University Weihai264209 China State Key Laboratory of Software Development Environment Beihang University Beijing China Key Laboratory of Data Science and Intelligent Computing Institute of International Innovation Beihang University Zhejiang Hangzhou China Paul C. Lauterbur Research Center for Biomedical Imaging Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen China Peng Cheng Laboratory Guangdong Shenzhen China
Neurite Orientation Dispersion and Density Imaging (NODDI) is an important imaging technology used to evaluate the microstructure of brain tissue, which is of great significance for the discovery and treatment of vari... 详细信息
来源: 评论
A Further Understanding of Differential-Linear Cryptanalysis
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 660-666页
作者: REN Jiongjiong CHEN Shaozhen State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Cryptology
Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the ***, the links between differential-lin... 详细信息
来源: 评论