咨询与建议

限定检索结果

文献类型

  • 812 篇 会议
  • 783 篇 期刊文献

馆藏范围

  • 1,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,026 篇 工学
    • 625 篇 计算机科学与技术...
    • 505 篇 软件工程
    • 153 篇 信息与通信工程
    • 136 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 88 篇 化学工程与技术
    • 80 篇 生物工程
    • 78 篇 材料科学与工程(可...
    • 77 篇 网络空间安全
    • 70 篇 光学工程
    • 54 篇 机械工程
    • 49 篇 仪器科学与技术
    • 44 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 750 篇 理学
    • 424 篇 物理学
    • 250 篇 数学
    • 96 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 87 篇 化学
    • 74 篇 地球物理学
    • 40 篇 系统科学
  • 187 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 30 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 28 篇 cosmic rays
  • 28 篇 network security
  • 26 篇 security
  • 26 篇 training
  • 25 篇 software
  • 24 篇 machine learning
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 632 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 79 篇 fang j.
  • 79 篇 feng c.f.
  • 79 篇 jiang k.
  • 78 篇 bastieri d.
  • 78 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 71 篇 guo y.q.
  • 70 篇 chen m.j.
  • 70 篇 bao y.w.
  • 69 篇 li cheng
  • 69 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 li xin
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 1,410 篇 英文
  • 151 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1595 条 记 录,以下是291-300 订阅
排序:
Publicly Verifiable Private Set Intersection from Homomorphic Encryption  8th
Publicly Verifiable Private Set Intersection from Homomorph...
收藏 引用
8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022
作者: Jiang, Yuting Wei, Jianghong Pan, Jing Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Guangzhou Institute of Technology Xidian University Guanzhou510555 China
Private Set Intersection (PSI) enables two mistrusting parties to securely evaluate the intersection of their private inputs, without revealing any additional information. With its wide application in privacy protecti... 详细信息
来源: 评论
A Note on "Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus"
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Fei Wang, Zilong Gong, Guang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada
In 2017, Zhang et al. proposed a question (not open problem) and two open problems in [IEEE TIT 63 (8): 5336–5349, 2017] about constructing bent functions by using Rothaus’ construction. In this note, we prove that ... 详细信息
来源: 评论
Adaptive Datum Points Location Optimization Method for Flexible Workpieces based on Centroid Characteristics
收藏 引用
Procedia CIRP 2024年 129卷 61-66页
作者: Jia Luo Yanlong Cao Fan Liu Junnan Zhi Jiangxin Yang Tukun Li Hongsheng Fu Key Laboratory of Advanced Manufacturing Technology of Zhejiang Province College of Mechanical Engineering Zhejiang University Hangzhou 310027 China State Key Laboratory of Fluid Power and Mechatronic Systems College of Mechanical Engineering Zhejiang University Hangzhou 310027 China School of Computing and Engineering University of Huddersfield Huddersfield HD1 3DH U.K.
This paper proposes a method for adapting the layout of flexible workpieces of various shapes, in order to reduce the difficulty of location design for personalized shapes. Different from the previous location design ... 详细信息
来源: 评论
MXenes@Te as a composite material for high-performance aluminum batteries
收藏 引用
Science China Materials 2022年 第1期65卷 85-94页
作者: Xiaogeng Huo Xiaoxu Wang Jianling Li Bao Zhang Yu Zhang Te Qin Feiyu Kang State Key Laboratory of Advanced Metallurgy School of Metallurgical and Ecological EngineeringUniversity of Science and Technology BeijingBeijing 100083China Beijing computing center Beijing Academy of Science and TechnologyBeijing 100094China Laboratory of Advanced Materials School of Materials Science and EngineeringTsinghua UniversityBeijing 100084China
The emerging two-dimensional(2D)materials,MXenes,play an important role in various fields of energy storage and exhibit excellent electrochemical ***,we prepared few-layered MXenes(F-Ti_(3)C_(2)T_(x))and loaded Te on ... 详细信息
来源: 评论
Modelization and analysis of dynamic heterogeneous redundant system
Modelization and analysis of dynamic heterogeneous redundant...
收藏 引用
作者: Wang, Wei Li, Guangsong Gai, Keke Tang, Yazhe Yang, Benchao Si, Xueming State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Xi'an Jiaotong University Xi'an China Shanghai Key Laboratory of Data Science Fudan University Shanghai China
With the development and popularization of Internet technology, network security has become the focus of attention. Vulnerabilities and back doors are regarded as two of the main reasons of network security problems. ... 详细信息
来源: 评论
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Jinwei Wu, Hao Wang, Haihua Zhang, Jiawei Luo, Xiangyang Ma, Bin Nanjing University of Information Science and Technology China State Key Laboratory of Mathematical Engineering and Advanced Computing China Qilu University of Technology China
The vulnerability of Deep Neural Networks (DNNs) to adversarial examples has been confirmed. Existing adversarial defenses primarily aim at preventing adversarial examples from attacking DNNs successfully, rather than... 详细信息
来源: 评论
A Channel-Augmented Multi-Domain Graph Convolutional Network for Fatigue Driving Detection  4
A Channel-Augmented Multi-Domain Graph Convolutional Network...
收藏 引用
4th International Conference on Industrial Automation, Robotics and Control engineering, IARCE 2024
作者: Sun, Mingyi Cui, Weigang Li, Yang Beihang University Department of Automation Science and Electrical Engineering Beijing China School of Engineering Medicine Beihang University Beijing China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University State Key Laboratory of Virtual Reality Technology and Systems Department of Automation Science and Electrical Engineering Beijing China
Electroencephalography (EEG) has emerged as a crucial cornerstone within the realm of brain-computer interface (BCI) applications, with its significance notably pronounced in the field of fatigue detection. However, t... 详细信息
来源: 评论
A novel hyperchaotic multistable heterogeneous neural network with hidden attractors and its application in image encryption
收藏 引用
Chinese Journal of Physics 2025年 96卷 851-874页
作者: Zhi Huang Zhen Li Qiao Wang Weijie Tan Xianming Wu College of Big Data and Information Engineering Guizhou University Guiyang 550025 China State Key Laboratory of Public Big Data Guizhou University Guiyang 550025 China Guizhou Key Laboratory of Artificial Intelligence and Brain-inspired Computing College of Mathematics and Big Data Guizhou Education University Guiyang 550018 China State Key Laboratory of Public Big Data Key Laboratory of Advanced Manufacturing Technology of Ministry of Education Guizhou University Guiyang 550025 China School of Mechanical and Electrical Engineering Guizhou Normal University Guiyang 550025 China
By simulating the unique properties of different types of neurons and their interconnecting patterns, heterogeneous neural networks can more accurately reflect the structural and functional characteristics of biologic...
来源: 评论
Neural Manifold Learning Based on 40 nm Dual-Mode PCM Compute-in-Memory Chip with Hardware Adaptive Drift Compensation
Neural Manifold Learning Based on 40 nm Dual-Mode PCM Comput...
收藏 引用
2024 IEEE International Electron Devices Meeting, IEDM 2024
作者: Yan, Longhao Li, Yuqi Li, Xi Pan, Zelun Wang, Zeyu Wang, Xile Wang, Bowen Zhan, Zhe Tang, Xiyuan Tao, Yaoyu Ge, Woo-Ping Song, Zhitang Huang, Ru Yang, Yuchao Beijing Advanced Innovation Center for Integrated Circuits School of Integrate Circuits Peking University Beijing China Beijing China Center for Brain Inspired Chips Institute for Artificial Intelligence Peking University Beijing China Guangdong Provincial Key Laboratory of In-Memory Computing Chips School of Electronic and Computer Engineering Peking University Shenzhen China State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences China
Neural manifold learning (NML), as a significant research topic in the field of neuroscience, plays a vital role in the realization of intelligent brain-computer interface (BCI) at the edge. However, traditional edge ... 详细信息
来源: 评论
nnTaint: An Optimized Dynamic Taint Analysis Method Based on Neural Network
nnTaint: An Optimized Dynamic Taint Analysis Method Based on...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Yuming Zhu Weiyu Dong Cyber Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction ... 详细信息
来源: 评论