咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1989 条 记 录,以下是681-690 订阅
排序:
IRS-Enhanced Anti-Jamming Precoding Against DISCO Physical Layer Jamming Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Huan Zhang, Hongliang Cai, Yi Zhang, Yunjing Lee Swindlehurst, A. Han, Zhu Electronic Information School Soochow University Suzhou China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Peking University Beijing China Department of Electrical and Computer Engineering University of Houston Houston United States Center for Pervasive Communications and Computing University of California Irvine United States
Illegitimate intelligent reflective surfaces (IRSs) can pose significant physical layer security risks on multi-user multiple-input single-output (MU-MISO) systems. Recently, a DISCO approach has been proposed an ille... 详细信息
来源: 评论
Automatically Generating Malware Summary Using Semantic Behavior Graphs (SBGs)
Automatically Generating Malware Summary Using Semantic Beha...
收藏 引用
Information Communication Technologies Conference (ICTC)
作者: Ping Yang Hui Shu Fei Kang Wenjuan Bu State Key Laboratory of Mathematical Engineering and Advanced Computing University of Information and Engineering Zhengzhou China
In malware behavior analysis, there are limitations in the analysis method of control flow and data flow. Researchers analyzed data flow by dynamic taint analysis tools, however, it cost a lot. In this paper, we propo... 详细信息
来源: 评论
Preference-Guided Reinforcement Learning for Efficient Exploration
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Guojian Wu, Faguo Zhang, Xiao Chen, Tianyuan Chen, Xuyang Zhao, Lin The School of Mathematical Sciences Beihang University Beijing100191 China The Key Laboratory of Mathematics Informatics and Behavioral Semantics Ministry of Education Beijing100191 China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing100191 China Zhongguancun Laboratory Beijing100194 China The Institute of Artificial Intelligence Beihang University Beijing100191 China The Department of Electrical and Computer Engineering National University of Singapore 117583 Singapore
In this paper, we investigate preference-based reinforcement learning (PbRL) that allows reinforcement learning (RL) agents to learn from human feedback. This is particularly valuable when defining a fine-grain reward... 详细信息
来源: 评论
Maximal coin-walker entanglement in a ballistic quantum walk
收藏 引用
Physical Review A 2022年 第4期105卷 042216-042216页
作者: Rong Zhang Ran Yang Jian Guo Chang-Wei Sun Jia-Chen Duan Heng Zhou Zhenda Xie Ping Xu Yan-Xiao Gong Shi-Ning Zhu National Laboratory of Solid State Microstructure School of Physics School of Electronic Science and Engineering and Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing 210093 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunication Nanjing 210023 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Institute for Quantum Information and State Key Laboratory of High Performance Computing College of Computing National University of Defense Technology Changsha 410073 China
We report that the position-inhomogeneous quantum walk (IQW) can be utilized to produce the maximal high-dimensional entanglement while maintaining the quadratic speedup spread of the wave function. Our calculations s... 详细信息
来源: 评论
Boosting adversarial attacks on neural networks with better optimizer
arXiv
收藏 引用
arXiv 2020年
作者: Yin, Heng Zhang, Hengwei Wang, Jindong Dou, Ruiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Convolutional neural networks have outperformed humans in image recognition tasks, but they remain vulnerable to attacks from adversarial examples. Since these data are crafted by adding imperceptible noise to normal ... 详细信息
来源: 评论
One-neutron stripping process in the^(209)Bi(^(6)Li,^(5)Li)^(210)Bi*reaction reaction
收藏 引用
Nuclear Science and Techniques 2024年 第6期35卷 120-129页
作者: Gao-Long Zhang Zhen-Wei Jiao Guang-Xin Zhang E.N.Cardozo B.Paes Shi-Peng Hu Jian-Qiang Qian Daniele Mengoni Wei-Wei Qu Cong-Bo Li Yun Zheng Huan-Qiao Zhang Hui-Bin Sun Nan Wang Chun-Lei Zhang J.J.Valiente-Dobón D.Testov M.Mazzocco A.Gozzelino C.Parascandolo D.Pierroutsakou M.La Commara A.Goasduff D.Bazzacco D.R.Napoli F.Galtarossa F.Recchia A.Illana S.Bakes I.Zanon S.Aydin Gde Angelis M.Siciliano R.Menegazzo S.M.Lenzi S.Akkoyun L.F.Canto J.Lubian School of Physics Beihang UniversityBeijing 100191China Sino-French Institute of Nuclear Engineering and Technology Sun Yat-Sen UniversityZhuhai 519082China Instituto de Física Universidade Federal Fluminense24210-340 NiteróiRio de JaneiroBrazil Laboratorio TANDAR Comisión Nacional de Energía AtómicaBKNA1650 San MartíınArgentina Institute for Advanced Study in Nuclear Energy and Safety Shenzhen UniversityShenzhen 518060China Shenzhen Key Laboratory of Research and Manufacture of High Purity Germanium Materials and Fetectors Shenzhen UniversityShenzhen 518060China INFN Sezione di PadovaPaduaItaly Dipartimento di fisica Astronomia dell’Universita di padova PaduaItaly State Key Laboratory of Radiation Medicine and Protection School of Radiation Medicine and ProtectionSoochow UniversitySuzhou 215123China China Institute of Atomic Energy Beijing 102413China The Key Laboratory of Beam Technology and Material Modification of Ministry of Education College of Nuclear Science and TechnologyBeijing Normal UniversityBeijing 100875China Laboratori Nazionali di Legnaro INFN35020 LegnaroItaly INFN Sezione di Napoli80126 NaplesItaly Dipartimento di Farmacia Universitàdi Napoli“Federico II”80131 NaplesItaly Department of Natural and Mathematical Sciences Faculty of EngineeringTarsus University33480 MersinTurkey Physics Division Argonne National LaboratoryLemontILUSA Department of Physics Sivas Cumhuriyet UniversitySivasTurkey Instituto de Física Universidade Federal do Rio de JaneiroRio de Janeiro CP 6852821941-972Brazil
One-neutron stripping process between^(6)Li and^(209)Bi was studied at 28,30,and 34 MeV using the in-beamγ-ray spectroscopy ***γ-γcoincident analysis clearly identified twoγ-rays feeding the ground and long-li... 详细信息
来源: 评论
Design and Implementation of Variable Precision Algorithm for Transcendental Functions
Design and Implementation of Variable Precision Algorithm fo...
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Jiangwei, Hao Jinchen, Xu Shaozhong, Guo Yuanyuan, Xia Dan, Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most... 详细信息
来源: 评论
Median Filtering Detection Based on Quaternion Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 929-943页
作者: Jinwei Wang Qiye Ni Yang Zhang Xiangyang Luo Yunqing Shi Jiangtao Zhai Sunil Kr Jha Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing100093China Department of Electrical Computer Engineering New Jersey Institute of TechnologyNew JerseyNJ07102USA
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m... 详细信息
来源: 评论
Defense strategy selection method for Stackelberg security game based on incomplete information  2019
Defense strategy selection method for Stackelberg security g...
收藏 引用
2019 International Conference on Artificial Intelligence and Computer Science, AICS 2019
作者: Ge, Xiaoyue Zhou, Tianyang Zang, Yichao State Key Laboratory of Mathematical Engineering and Advanced Computing Information and Engineering University Zhengzhou China
Network attack and defense confrontation is essentially a game process between unequal subjects on both sides of attack and defense. There are some defects in the prior hypothesis that the subject status of both sides... 详细信息
来源: 评论
Exploration and Research of Blended Learning in the“ Principles of Computer Organization”
Exploration and Research of Blended Learning in the“ Princi...
收藏 引用
IEEE International Conference on Computer Science and Educational Informatization (CSEI)
作者: Yifan Hou Wei Wang Fudong Liu Zheng Shan Junchao Wang Lixin Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
The“Principles of Computer Organization” is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the “Principles of Computer Organization “Aimi... 详细信息
来源: 评论