咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 168 篇 电气工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,007 篇 理学
    • 550 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 117 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,861 篇 英文
  • 59 篇 其他
  • 45 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1962 条 记 录,以下是471-480 订阅
排序:
A secure spectrum auction scheme without the trusted party based on the smart contract
收藏 引用
Digital Communications and Networks 2021年 第2期7卷 223-234页
作者: Jiaqi Wang Ning Lu Qingfeng Cheng Lu Zhou Wenbo Shi School of Computer Science and Engineerings Northeastern University Shenyang 110004China School of Computer Science and Technology Xidian UniversityXi'anChina Strategic Support Force Information Engineering University Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Division of Computer Science University ofAizuAizu-WakamatsuJapan School of Computer and Communication Engineering Nordieastem UniversityQinhuangdao066004China
With the development of communication 5G networks and technologies,spectrum resources are increasingly *** scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum a... 详细信息
来源: 评论
Replace2Self: Self-Supervised Denoising based on Voxel Replacing and Image Mixing for Diffusion MRI
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Wu, Linhai Wang, Lihui Deng, Zeyu Zhu, Yuemin Wei, Hongjiang Guizhou University Key Laboratory of Advanced Medical Imaging and Intelligent Computing of Guizhou Province Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education State Key Laboratory of Public Big Data College of Computer Science and Technology 550025 China Univ Lyon INSA Lyon CNRS Inserm CREATIS UMR 5220 LyonF-69621 France Shanghai Jiao Tong University School of Biomedical Engineering Shanghai200030 China
Low signal to noise ratio (SNR) remains one of the limitations of diffusion weighted (DW) imaging. How to suppress the influence of noise on the subsequent analysis about the tissue microstructure is still challenging... 详细信息
来源: 评论
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Junyan Lu, Wei Luo, Xiangyang Yang, Rui Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen China
MSC Codes 68T07, 68T10Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. Howeve... 详细信息
来源: 评论
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Jiawei Wang, Jinwei Wang, Hao Luo, Xiangyang Nanjing University of Information Science and Technology Nanjing China Nanjing University of Science and Technology Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
Malicious intelligent algorithms greatly threaten the security of social users’ privacy by detecting and analyzing the uploaded photos to social network platforms. The destruction to DNNs brought by the adversarial a... 详细信息
来源: 评论
Antisymmetric planar Hall effect in rutile oxide films induced by the Lorentz force
收藏 引用
Science Bulletin 2024年 第15期69卷 2362-2369页
作者: Yongwei Cui Zhaoqing Li Haoran Chen Yunzhuo Wu Yue Chen Ke Pei Tong Wu Nian Xie Renchao Che Xuepeng Qiu Yi Liu Zhe Yuan Yizheng Wu Department of Physics State Key Laboratory of Surface PhysicsFudan UniversityShanghai 200433China Institute for Nanoelectronic Devices and Quantum Computing Fudan UniversityShanghai 200433China Interdisciplinary Center for Theoretical Physics and Information Sciences Fudan UniversityShanghai 200433China Center for Advanced Quantum Studies and Department of Physics Beijing Normal UniversityBeijing 100875China Laboratory of Advanced Materials Shanghai Key Lab of Molecular Catalysis and Innovative MaterialsAcademy for Engineering&TechnologyFudan UniversityShanghai 200438China Shanghai Key Laboratory of Special Artificial Microstructure Materials and Technology School of Physics Science and EngineeringTongji UniversityShanghai 200092China Zhejiang Laboratory Hangzhou 311100China Shanghai Research Center for Quantum Sciences Shanghai 201315China Shanghai Key Laboratory of Metasurfaces for Light Manipulation Fudan UniversityShanghai 200433China
The conventional Hall effect is linearly proportional to the field component or magnetization component perpendicular to a film. Despite the increasing theoretical proposals on the Hall effect to the in-plane field or... 详细信息
来源: 评论
Efficient Cache Strategy for Face Recognition System  20
Efficient Cache Strategy for Face Recognition System
收藏 引用
5th International Conference on Big Data and computing, ICBDC 2020
作者: Zong, Guoxiao Li, Qingbao Zhang, Ping Zhang, Guimin Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing NO.62 Science Avenue ZhengzhouCN 450001 China
Recently, the need for real-time deep learning applications, such as face recognition system, implement on the embedded devices is increasing. At the system level, caching system is one of the most effective ways to r... 详细信息
来源: 评论
H∞Asynchronous Control for Discrete-Time Semi-Markov Jump Systems  16th
H∞Asynchronous Control for Discrete-Time Semi-Markov Jump S...
收藏 引用
16th IFAC Symposium on Large Scale Complex Systems: Theory and Applications LSS 2022
作者: Jin, Liqiang Yin, Yanyan Liu, Yanqing Teo, Kok Lay Liu, Fei National Key Laboratory of Advanced Process Control for Light Industry Ministry of Education Institute of Automation Jiangnan University Wuxi214122 China School of Electrical Engineering Computing and Mathematical Sciences Curtin University PerthWA6102 Australia School of Mathematical Sciences Sunway University Kuala Lumpur47500 Malaysia Tianjin University of Finance and Economics Tianjin China
This paper investigates the problem of H∞asynchronous control for discrete-time semi-Markov jump systems. In practice, it is difficult to ensure that controller modes and system modes are updated synchronously. There... 详细信息
来源: 评论
A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph
A Vulnerability Detection Method for Intermediate Code Based...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Bing Xia Chongjun Tang Wenbo Liu Shihao Chu Yu Dong Dept. ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Dept. ZhongYuan University of Technology Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China Dept. ZhongYuan University of Technology Zhengzhou China Dept. ZhongYuan University of Technology
With the advancement of information technology, the rapid increase in software systems has led to a growing demand for research on vulnerability detection. In recent years, the fast-paced development of deep learning ... 详细信息
来源: 评论
Outsourced secure ID3 decision tree algorithm over horizontally partitioned datasets with consortium blockchain  10
Outsourced secure ID3 decision tree algorithm over horizonta...
收藏 引用
10th International Conference on Communication and Network Security, ICCNS 2020
作者: Yang, Ming Hu, Xuexian Wei, Jianghog Zhang, Qihui Liu, Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China Guangxi Key Laboratory of Cryptography and Information Security Guilin Guangxi China
Due to the capacity of storing massive data and providing huge computing resources, cloud computing has been a desirable platform to assist machine learning in multiple-data-owners scenarios. However, the issue of dat... 详细信息
来源: 评论
Open Set Recognition for Encrypted Traffic using Intra-class Partition and Boundary Sample Generation
Open Set Recognition for Encrypted Traffic using Intra-class...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Xue Li Jinlong Fei Zan Qi Zhuo Lv Heng Jiang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China National Digital Switching System Engineering Technological Research Center PLA Information Engineering University Zhengzhou China
Existing deep learning-based encrypted traffic recognition methods can achieve high precision identification performance while protecting user privacy, but almost all of them focus on closed sets, in which training da... 详细信息
来源: 评论