咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 168 篇 电气工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,007 篇 理学
    • 550 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 117 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,861 篇 英文
  • 59 篇 其他
  • 45 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1962 条 记 录,以下是441-450 订阅
排序:
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection against Multipath Routing
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2155-2171页
作者: Zhao, Ziming Li, Zhaoxuan Xie, Xiaofei Liu, Zhipeng Li, Tingting Yu, Jiongchi Zhang, Fan Chen, Binbin School of Software Technology Zhejiang University Ningbo315100 China College of Computer Science and Technology Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Scientific and Technological Innovation Center 311200 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province 310027 China Jiaxing Research Institute Zhejiang University 314000 China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou450001 China Singapore State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security UCAS Beijing100049 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore Advanced Digital Sciences Center Singapore138632 Singapore Singapore University of Technology and Design SingaporeB96049 Singapore
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to adva... 详细信息
来源: 评论
Spreading Dynamics of Random Walks in Complex Networks  8
Spreading Dynamics of Random Walks in Complex Networks
收藏 引用
8th International Conference on Information Technology: IoT and Smart City, ICIT 2020
作者: Hao, Yaohui Liu, Hongbo Sun, Jiajia Gao, Liwei Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The study of spreading dynamics is an important foundation to analyze the spread of viruses orrumors. The general method of analyzing spreading dynamics is based on model, such as SI model, SISmodel, SIR model,ect. Ho... 详细信息
来源: 评论
ODCP: Optimizing Data Caching and Placement in Distributed File System Using Erasure Coding  17th
ODCP: Optimizing Data Caching and Placement in Distributed F...
收藏 引用
17th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2020
作者: Wu, Shuhan Li, Yunchun Yang, Hailong Luan, Zerong Li, Wei School of Computer Science and Engineering Beihang University Beijing100191 China College of Life Sciences and Bioengineering Beijing University of Technology Beijing100083 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Many current distributed file systems use erasure-coding based data redundancy techniques to improve the reliability of data storage. Such techniques can significantly improve the effective storage utilization. Howeve... 详细信息
来源: 评论
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks  34
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
34th General Assembly and Scientific Symposium of the International Union of Radio Science, URSI GASS 2021
作者: Gao, Yuan Cao, Jiang Guo, Yang Wang, Ping Yang, Siming Wang, Jing Lu, Weidang Si, Peiyuan Zhao, Ming Wu, Xiao Academy of Military Science of the PLA 100091 China College of Information Engineering Zhejiang University of Technology Hangzhou China Tsinghua University Beijing100084 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
swRodinia: A Benchmark Suite for Exploiting Architecture Properties of Sunway Processor  3rd
swRodinia: A Benchmark Suite for Exploiting Architecture Pr...
收藏 引用
3rd BenchCouncil International Symposium on Benchmarking, Measuring, and Optimizing, Bench 2020
作者: Chen, Bangduo Li, Mingzhen Yang, Hailong Luan, Zhongzhi Gan, Lin Yang, Guangwen Qian, Depei School of Computer Science and Engineering Beihang University Beijing100191 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu214125 China Department of Computer Science and Technology Tsinghua University Beijing100084 China
The Sunway processor has been demonstrated with superior performance by various scientific applications, domain specific frameworks and numerical algorithms. However, the optimization techniques that can fully exploit... 详细信息
来源: 评论
A Hybrid Loss Network for Localization of Image Manipulation  19th
A Hybrid Loss Network for Localization of Image Manipulation
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Yin, Qilin Wang, Jinwei Luo, Xiangyang Nanjing University of Information Science and Technology and Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China
With the development of information security, localization of image manipulations havs become a hot topic. In this paper, a hybrid loss network is proposed for the manipulated image forensics. First, the patch predict... 详细信息
来源: 评论
Collision attack framework on RIPEMD-128  2
Collision attack framework on RIPEMD-128
收藏 引用
2nd International Conference on Artificial Intelligence and advanced Manufacture, AIAM 2020
作者: Li, Jingyu Zeng, Guang Yang, Yang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Force Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In th... 详细信息
来源: 评论
Interaction-Aware Cut-In Trajectory Prediction and Risk Assessment in Mixed Traffic
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1752-1762页
作者: Xianglei Zhu Wen Hu Zejian Deng Jinwei Zhang Fengqing Hu Rui Zhou Keqiu Li Fei-Yue Wang the College of Intelligence and Computing Tianjin UniversityTianjin 300350 the China Automotive Technology and Research Center Co.Ltd. Tianjin 300300China the State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body College of Mechanical and Vehicle EngineeringHunan UniversityChangsha 410082China the Department of Mechanical and Mechatronics Engineering University of WaterlooWaterlooON N2L3G1Canada the School of Mechanical Engineering Beijing Institute of TechnologyBeijing 100081China the Macao University of Science and Technology MacaoChina the Waytous Inc. Qingdao 266000China IEEE the State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China
Accurately predicting the trajectories of surrounding vehicles and assessing the collision risks are essential to avoid side and rear-end collisions caused by *** improve the safety of autonomous vehicles in the mixed... 详细信息
来源: 评论
CRNet:3D Face Reconstruction with Contour Map Regression Network  6
CRNet:3D Face Reconstruction with Contour Map Regression Net...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Wei, Tongxin Li, Qingbao Liu, Jinjin School of Software Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing China
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D... 详细信息
来源: 评论
Numerical Solution for Nonlinear 4D Variational Data Assimilation (4D-Var) via ADMM
arXiv
收藏 引用
arXiv 2024年
作者: Li, Bowen Shi, Bin State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
The four-dimensional variational data assimilation (4D-Var) has emerged as an important methodology, widely used in numerical weather prediction, oceanographic modeling, and climate forecasting. Classical unconstraine... 详细信息
来源: 评论