咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1989 条 记 录,以下是571-580 订阅
排序:
ThicknessVAE: Learning a Lateral Prior for Clothed Human Body Reconstruction
ThicknessVAE: Learning a Lateral Prior for Clothed Human Bod...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaotao Wu Zhaoxin Fan Huiguang He Dinggang Shen School of Biomedical Engineering & State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China NeuBCI Group State Key Laboratory of Brain Cognition and Brain-Inspired Intelligence Technology Institute of Automation Chinese Academy of Sciences Beijing China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Institute of Artificial Intelligence Beihang University Beijing China Beijing Academy of Blockchain and Edge Computing China Shanghai United Imaging Intelligence Co. Ltd. Shanghai China Shanghai Clinical Research and Trial Center Shanghai China
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper a... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network  2
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
2019 2nd International Symposium on Big Data and Applied Statistics, ISBDAS 2019
作者: Lu, Shoupu Li, Qingbao Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Province Zhengzhou450001 China Henan University of Economics and Law Henan Province Zhengzhou450000 China
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac... 详细信息
来源: 评论
Parallelizing Neural Network Models Effectively on GPU by Implementing Reductions Atomically  22
Parallelizing Neural Network Models Effectively on GPU by Im...
收藏 引用
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques
作者: Jie Zhao Cédric Bastoul Yanzhi Yi Jiahui Hu Wang Nie Renwei Zhang Zhen Geng Chong Li Thibaut Tachon Zhiliang Gan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Huawei Technologies France SASU Paris France Huawei Technologies Co. Ltd. Beijing China Huawei Technologies Co. Ltd. Hangzhou China Huawei Technologies Co. Ltd. Shenzhen China
Due to the missing of a good orchestration of loop transformations, existing optimizing compilers for deploying neural networks on GPU either parallelize reductions ineffectively or miss the fusion opportunities with ... 详细信息
来源: 评论
PS-HOMO: A Protection Scheme for iOS SMS  4
PS-HOMO: A Protection Scheme for iOS SMS
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Zhou, Guomiao Wu, Qianqiong Duan, Ming Xi, Qi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China Institute of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang Henan471000 China
iOS Short Message Service (SMS) transmits messages in plaintext, which would lead to potential security threats of data. It is meaningful to design a safe and effective SMS. In this paper, all iOS Security Guides are ... 详细信息
来源: 评论
Improved Impossible Polytopic Attacks on Round-reduced des  4
Improved Impossible Polytopic Attacks on Round-reduced des
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Wang, Jing Wu, Qianqiong Fu, Chaohui Zhou, Guomiao Duan, Ming State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China College of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang Henan471000 China
In Eurocrypt 2016, Tyge Tiessen introduced the d-difference which considering the differences between multiple plaintexts, and proposed the impossible polytopic attack on block cipher which effectively reducing the da... 详细信息
来源: 评论
Design and implementation of high performance cryptographic service framework based on trustzone
Design and implementation of high performance cryptographic ...
收藏 引用
2020 International Conference on engineering Management of Communication and Technology, EMCTECH 2020
作者: Yuan, Lu Huang, Chenlin Wang, Lulu Ding, Yan Li, Yun Cheng, Hua National University of Defense Technology Academy of Computer Science Changsha China Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Due to its favorable isolation and security features, TrustZone technology has been widely used in mobile payment, cloud computing, Internet of Things, etc. However, the cryptographic algorithm provided by the trusted... 详细信息
来源: 评论
MAST-Pro: Dynamic Mixture-of-Experts for Adaptive Segmentation of Pan-Tumors with Knowledge-Driven Prompts
arXiv
收藏 引用
arXiv 2025年
作者: Meng, Runqi Song, Sifan Jin, Pengfei Oh, Yujin Teng, Lin Wang, Yulin Sun, Yiqun Chen, Ling Li, Xiang Li, Quanzheng Guo, Ning Shen, Dinggang School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University China Center of Advanced Medical Computing and Analysis Massachusetts General Hospital Harvard Medical School Harvard University United States Shanghai United Imaging Intelligence Co. Ltd China Shanghai Clinical Research and Trial Center China
Accurate tumor segmentation is crucial for cancer diagnosis and treatment. While foundation models have advanced general-purpose segmentation, existing methods still struggle with: (1) limited incorporation of medical... 详细信息
来源: 评论
PediaBench: A Comprehensive Chinese Pediatric Dataset for Benchmarking Large Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Qian Chen, Panfeng Li, Jiali Feng, Linkun Liu, Shuyu Zhao, Heng Chen, Mei Li, Hui Wang, Yanhao State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Guizhou Engineering Laboratory for Advanced Computing and Medical Information Services Guiyang China College of Big Data and Internet Shenzhen Technology University Shenzhen China School of Data Science and Engineering East China Normal University Shanghai China
The emergence of Large Language Models (LLMs) in the medical domain has stressed a compelling need for standard datasets to evaluate their question-answering (QA) performance. Although there have been several benchmar... 详细信息
来源: 评论
Universal conservation laws of the wave-particleentanglement triad:theory and experiment
收藏 引用
Light(Science & Applications) 2025年 第3期14卷 861-868页
作者: Ziheng Ding Yaohao Deng Shao-Ming Fei Si-Qi Zhou Xiaojiong Chen Ziwen Rui Zhihao Ma Yunlong Xiao Jianwei Wang School of Mathematical Sciences MOE-LSCShanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory for Mesoscopic Physics School of PhysicsPeking UniversityBejing 100871China Bejing Academy of Quantum Information Sciences Beijing 100871China School of Mathematical Sciences Capital Normal UniversityBeijing 100048China Max Planck Institute for Mathematics in the Sciences Leipzig 04103Germany Department of Physics and Astronomy Stony Brook UniversityNew YorkNY11794-3800USA Shanghai Seres Information Technology Co. LtdShanghai 200040China shenzhen Institute for Quantum Science and Engineering Southern University of Science and TechnologyShenzhen 518055China A*STAR Quantum Innovation Centre(Q.InC) Agency for ScienceTechnology and Research(A*STAR)2Fusionopolis WayInnovis\#08-03Singapore138634Republic of Singapore institute of High Performance Computing(IHPC) Agency for ScienceTechnology and Research(A*STAR)1 Fusionopolis WayConnexis\#16-16Singapore 138632Republic of Singapore
When observed,a quantum system exhibits either wave-like or particle-like properties,depending on how it is ***,this duality is affected by the entanglement of the system with its quantum memory,raising a fundamental ... 详细信息
来源: 评论
A Malware Similarity Analysis Method Based on Network Control Structure Graph
A Malware Similarity Analysis Method Based on Network Contro...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Duanyi Wang Hui Shu Fei Kang Wenjuan Bu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Recently, graph-based malware similarity analysis has been widely used in the field of malware detection. However, the wide application of code obfuscation, polymorphism, and deformation changes the structure of malic... 详细信息
来源: 评论