咨询与建议

限定检索结果

文献类型

  • 812 篇 会议
  • 796 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,609 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,045 篇 工学
    • 632 篇 计算机科学与技术...
    • 515 篇 软件工程
    • 158 篇 信息与通信工程
    • 137 篇 电子科学与技术(可...
    • 129 篇 电气工程
    • 104 篇 控制科学与工程
    • 89 篇 化学工程与技术
    • 81 篇 网络空间安全
    • 80 篇 材料科学与工程(可...
    • 80 篇 生物工程
    • 70 篇 光学工程
    • 56 篇 机械工程
    • 51 篇 仪器科学与技术
    • 45 篇 生物医学工程(可授...
    • 36 篇 动力工程及工程热...
    • 28 篇 力学(可授工学、理...
    • 28 篇 冶金工程
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
  • 758 篇 理学
    • 426 篇 物理学
    • 254 篇 数学
    • 97 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 89 篇 化学
    • 74 篇 地球物理学
    • 40 篇 系统科学
  • 191 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 32 篇 法学
    • 26 篇 社会学
  • 31 篇 医学
  • 16 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 deep learning
  • 31 篇 semantics
  • 28 篇 cosmic rays
  • 28 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 25 篇 software
  • 24 篇 machine learning
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 computational mo...
  • 19 篇 cryptography
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 633 篇 state key labora...
  • 109 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 82 篇 school of physic...
  • 82 篇 moscow institute...
  • 82 篇 school of astron...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 81 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 79 篇 fang j.
  • 79 篇 feng c.f.
  • 79 篇 jiang k.
  • 78 篇 bastieri d.
  • 77 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 71 篇 guo y.q.
  • 70 篇 chen m.j.
  • 70 篇 bao y.w.
  • 69 篇 li cheng
  • 69 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 li xin
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 1,482 篇 英文
  • 93 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1609 条 记 录,以下是311-320 订阅
Semivortex solitons and their excited states in spin-orbit-coupled binary bosonic condensates
收藏 引用
Physical Review E 2024年 第6期109卷 064201-064201页
作者: Haiming Deng Jinqing Li Zhaopin Chen Yaohui Liu Dong Liu Chunzhi Jiang Chao Kong Boris A. Malomed School of Physics and Electronic-Electrical Engineering Microelectronics and Optoelectronics Technology Key Laboratory of Hunan Higher Education Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems Physics Department and Solid-State Institute Department of Physical Electronics School of Electrical Engineering Faculty of Engineering Instituto de Alta Investigación
It is known that two-dimensional two-component fundamental solitons of the semivortex (SV) type, with vorticities (s+,s−)=(0,1) in their components, are stable ground states (GSs) in the spin-orbit-coupled (SOC) binar... 详细信息
来源: 评论
A review of cryptographic algorithm recognition technology for binary code
A review of cryptographic algorithm recognition technology f...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Zhao, Chenxia Kang, Fei Yang, Ju Shu, Hui Zhengzhou University Zhengzhou Henan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback  2
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
2nd International Conference on Computer Communication and Network Security, CCNS 2021
作者: Yuwen, Shao Zheng, Zhang Bingzheng, Li Xinsheng, Ji State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering Technological RD Center Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
Brain Functional Network Generation Using Distribution-Regularized Adversarial Graph Autoencoder with Transformer for Dementia Diagnosis
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第12期137卷 2129-2147页
作者: Qiankun Zuo Junhua Hu Yudong Zhang Junren Pan Changhong Jing Xuhang Chen Xiaobo Meng Jin Hong School of Information Engineering Hubei University of EconomicsWuhan430205China State Key Laboratory of Simulation and Regulation of Water Cycle in River Basin China Institute of Water Resources and Hydropower ResearchBeijing100038China School of Computing and Mathematic Sciences University of LeicesterLeicesterLE17RHUK Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518055China Faculty of Science and Technology University of MacaoMacao999078China School of Geophysics Chengdu University of TechnologyChengdu610059China Laboratory of Artificial Intelligence and 3D Technologies for Cardiovascular Diseases Guangdong Provincial Key Laboratory of South China Structural Heart DiseaseGuangdong Provincial People’s Hospital(Guangdong Academy of Medical Sciences)Southern Medical UniversityGuangzhou519041China Medical Research Institute Guangdong Provincial People’s Hospital(Guangdong Academy of Medical Sciences)Southern Medical UniversityGuangzhou519041China
The topological connectivity information derived from the brain functional network can bring new insights for diagnosing and analyzing dementia *** brain functional network is suitable to bridge the correlation betwee... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  22
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer engineering
作者: Zejun Wu Li Lu Qiong Jia Zhihao Chen State Key Laboratory of Mathematical Engineering and advanced Computing China National Local Joint Engineering Laboratory of Network Space Security Technology China Beijing Institute of Computer Technology and Application China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Defense Against Adversarial Faces at the Source: Strengthened Faces Based on Hidden Disturbances
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第7期6卷 1761-1775页
作者: Li, Shuangliang Wang, Jinwei Wu, Hao Zhang, Jiawei Cheng, Xin Luo, Xiangyang Ma, Bin School of Software Nanjing Universityof Information Science and Technology Nanjing210044 China College of Cryptology and Cyber Science Nankai University Tianjing300073 China State Key Laboratory of Mathemat-ical Engineering and Advanced Computing Zhengzhou450002 China School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China School of Cyber Security Qilu University of Technology Shandong Academy of Sciences Shandong250353 China
Face Recognition (FR) systems, while widely used across various sectors, are vulnerable to adversarial attacks, particularly those based on deep neural networks. Despite existing efforts to enhance the robustness of F... 详细信息
来源: 评论
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 249-251页
作者: Ting CHEN Xinghua LI Qingfeng CHENG School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist... 详细信息
来源: 评论
Interaction-Aware Cut-In Trajectory Prediction and Risk Assessment in Mixed Traffic
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1752-1762页
作者: Xianglei Zhu Wen Hu Zejian Deng Jinwei Zhang Fengqing Hu Rui Zhou Keqiu Li Fei-Yue Wang the College of Intelligence and Computing Tianjin UniversityTianjin 300350 the China Automotive Technology and Research Center Co.Ltd. Tianjin 300300China the State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body College of Mechanical and Vehicle EngineeringHunan UniversityChangsha 410082China the Department of Mechanical and Mechatronics Engineering University of WaterlooWaterlooON N2L3G1Canada the School of Mechanical Engineering Beijing Institute of TechnologyBeijing 100081China the Macao University of Science and Technology MacaoChina the Waytous Inc. Qingdao 266000China IEEE the State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China
Accurately predicting the trajectories of surrounding vehicles and assessing the collision risks are essential to avoid side and rear-end collisions caused by *** improve the safety of autonomous vehicles in the mixed... 详细信息
来源: 评论
HHL Analysis and Simulation Verification Based on Origin Quantum Platform  4
HHL Analysis and Simulation Verification Based on Origin Qua...
收藏 引用
2021 4th International Conference on Mechatronics and Computer Technology engineering, MCTE 2021
作者: Liu, Xiaonan Jing, Lina Han, Lin Gao, Jie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Henan Supercomputing Center Zhengzhou University Zhengzhou450001 China
Solving large-scale linear equations is of great significance in many engineering fields, such as weather forecasting and bioengineering. The classical computer solves the linear equations, no matter adopting the elim... 详细信息
来源: 评论
Image Electronic Evidence Screening Based on Improved SSD  6
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Liu, Yafei Jiang, Liehui Liu, Tieming Zhang, Youwei Zhengzhou University Zhongyuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论