咨询与建议

限定检索结果

文献类型

  • 812 篇 会议
  • 796 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,609 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,045 篇 工学
    • 632 篇 计算机科学与技术...
    • 515 篇 软件工程
    • 158 篇 信息与通信工程
    • 137 篇 电子科学与技术(可...
    • 129 篇 电气工程
    • 104 篇 控制科学与工程
    • 89 篇 化学工程与技术
    • 81 篇 网络空间安全
    • 80 篇 材料科学与工程(可...
    • 80 篇 生物工程
    • 70 篇 光学工程
    • 56 篇 机械工程
    • 51 篇 仪器科学与技术
    • 45 篇 生物医学工程(可授...
    • 36 篇 动力工程及工程热...
    • 28 篇 力学(可授工学、理...
    • 28 篇 冶金工程
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
  • 758 篇 理学
    • 426 篇 物理学
    • 254 篇 数学
    • 97 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 89 篇 化学
    • 74 篇 地球物理学
    • 40 篇 系统科学
  • 191 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 32 篇 法学
    • 26 篇 社会学
  • 31 篇 医学
  • 16 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 deep learning
  • 31 篇 semantics
  • 28 篇 cosmic rays
  • 28 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 25 篇 software
  • 24 篇 machine learning
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 computational mo...
  • 19 篇 cryptography
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 633 篇 state key labora...
  • 109 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 82 篇 school of physic...
  • 82 篇 moscow institute...
  • 82 篇 school of astron...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 81 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 79 篇 fang j.
  • 79 篇 feng c.f.
  • 79 篇 jiang k.
  • 78 篇 bastieri d.
  • 77 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 71 篇 guo y.q.
  • 70 篇 chen m.j.
  • 70 篇 bao y.w.
  • 69 篇 li cheng
  • 69 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 li xin
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 1,482 篇 英文
  • 93 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1609 条 记 录,以下是481-490 订阅
CRNet:3D Face Reconstruction with Contour Map Regression Network  6
CRNet:3D Face Reconstruction with Contour Map Regression Net...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Wei, Tongxin Li, Qingbao Liu, Jinjin School of Software Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing China
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D... 详细信息
来源: 评论
GUEST EDITORIAL
收藏 引用
China Communications 2023年 第2期 3-6页
作者: Yuan Wu Xu Chen Feng Lyu Xianfu Chen Xumin Huang Jie Gao Yueyue Dai Tony Q.S.Quek Yan Zhang the State Key Laboratory of Internet of Things for Smart City University of Macau the Department of Computer and Information Science University of Macau Sun Yat-sen University Sun Yat-sen University Institute of Advanced Networking and Computing Systems Sun Yat-sen University National and Local Joint Engineering Laboratory the School of Computer Science and Engineering Central South University the VTT Technical Research Centre of Finland the School of Automation Guangdong University of Technology the School of Information Technology Carleton University Huazhong University of Science and Technology Singapore University of Technology and Design(SUTD) the IEEE Communications Society Technical Committee on Green Communications and Computing(TCGCC)
With the growing maturity of the advanced edge-cloud collaboration and integrated sensing-communication-computing systems, edge intelligence has been envisioned as one of the enabling technologies for ubiquitous and l...
来源: 评论
Performance Verification of state Feedback H∞ state Molecular Controller Via Chemical Reaction Networks
Performance Verification of State Feedback H∞ State Molecul...
收藏 引用
International Conference on Industrial Artificial Intelligence (IAI)
作者: Jingwang Yao Xing'An Wang Hui Lv Yang Li Wujie Zhang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China College of Environmental and Chemical Engineering Dalian University Dalian China Dalian Chivy Biotechnology Co. Ltd Dalian PR China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang China
An important goal in synthetic biology is in the design and implementation of control strategies embedded in biochemical reaction systems to enable control of the process at the molecular level. The problem of set-poi...
来源: 评论
Web Service Active Defense Mechanism Based on Automated Software Diversity
Web Service Active Defense Mechanism Based on Automated Soft...
收藏 引用
2020 International Conference on Computer engineering and Application, ICCEA 2020
作者: Liu, Zhenwu Zhang, Zheng Liu, Hao Ma, Bolin PLA Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Aiming at the problems of limited number and diversity in existing web server software, an active defense mechanism for web services based on automated software diversity is proposed, and the system framework and impl... 详细信息
来源: 评论
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Junyan Lu, Wei Luo, Xiangyang Yang, Rui Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen China
MSC Codes 68T07, 68T10Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. Howeve... 详细信息
来源: 评论
Revocable Broadcast Encryption with Constant Ciphertext and Private key Size
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 690-697页
作者: JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei Zhengzhou University State Key Laboratory of Mathematical Engineering and Advanced Computing Nanjing University of Post and Communications
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo... 详细信息
来源: 评论
Angle-resolved magneto-chiral anisotropy in a non-centrosymmetric atomic layer superlattice
收藏 引用
Science Bulletin 2025年 第9期70卷 1406-1409页
作者: Long Cheng Mingrui Bao Xue Zhang Jingxian Zhang Qun Yang Qiang Li Hui Cao Dawei Qiu Hui Li Guanglei Cheng Hua Zhou Jian-Min Zuo Xiaodong Zhou Jian Shen Zhifeng Zhu Wenbo Wang Xiaofang Zhai School of Physical Science and Technology ShanghaiTech UniversityShanghai 201210China CAS Key Laboratory of Microscale Magnetic Resonance and School of Physical Sciences University of Science and Technology of ChinaHefei 230026China School of Information Science and Technology ShanghaiTech UniversityShanghai 201210China State Key Laboratory of Surface Physics and Institute for Nanoelectronic Devices and Quantum Computing Fudan UniversityShanghai 200433China X-ray Science Division Advanced Photon SourceArgonne National LaboratoryLemontIL 60439USA Institutes of Physical Science and Information Technology Anhui UniversityHefei 230601China Department of Materials Science and Engineering and Materials Research Laboratory University of Illinois Urbana–ChampaignUrbanaIL 61801USA ShanghaiTech Laboratory for Topological Physics ShanghaiTech UniversityShanghai 201210China
Chirality is a widespread phenomenon in nature,where two non-superimposable enantiomers exist with one being the mirror image of the *** interplay between chirality and magnetism has recently drawn intensive interest ... 详细信息
来源: 评论
Co‑packaged optics(CPO):status,challenges,and solutions
收藏 引用
Frontiers of Optoelectronics 2023年 第1期16卷 1-40页
作者: Min Tan Jiang Xu Siyang Liu Junbo Feng Hua Zhang Chaonan Yao Shixi Chen Hangyu Guo Gengshi Han Zhanhao Wen Bao Chen Yu He Xuqiang Zheng Da Ming Yaowen Tu Qiang Fu Nan Qi Dan Li Li Geng Song Wen Fenghe Yang Huimin He Fengman Liu Haiyun Xue Yuhang Wang Ciyuan Qiu Guangcan Mi Yanbo Li Tianhai Chang Mingche Lai Luo Zhang Qinfen Hao Mengyuan Qin School of Optical and Electronic Information Huazhong University of Science and TechnologyWuhan 430074China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China Department of Electronic and Computer Engineering The Hong Kong University of Science and TechnologyHong KongChina HKUST Fok Ying Tung Research Institute Guangzhou 511462China The Hong Kong University of Science and Technology(Guangzhou) Guangzhou 511462China Chongqing United Micro-Electronics Center(CUMEC) Chongqing 401332China Hisense Broadband Multimedia Technologies Co. Ltd.Qingdao 266000China Institute of Microelectronics Chinese Academy of SciencesBeijing 100029China State Key Laboratory of Superlattices and Microstructures Institute of SemiconductorsChinese Academy of SciencesBeijing 100083China School of Microelectronics Xi’an Jiaotong UniversityXi’an 710049China Zhangjiang Laboratory Shanghai 201210China The State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronic EngineeringShanghai Jiao Tong UniversityShanghai 200240China Huawei Technologies Co. Ltd.Shenzhen 440307China College of Computer National University of Defense TechnologyChangsha 410073China Institute of Computing Technology Chinese Academy of SciencesBeijing 100086China
Due to the rise of 5G,IoT,AI,and high-performance computing applications,datacenter trafc has grown at a compound annual growth rate of nearly 30%.Furthermore,nearly three-fourths of the datacenter trafc resides withi... 详细信息
来源: 评论
Virtual Sample Generation for Retraining the Malicious PDF Detection Model  4
Virtual Sample Generation for Retraining the Malicious PDF D...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: He, Kang Liu, Long Lu, Dong-Zhe Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative vulnerabilities. Machine learning algorithms are developed to detect the maliciousness of PDF files. A... 详细信息
来源: 评论
Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node  4
Anti-reconnaissance Model of Host Fingerprint Based on Virtu...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Zhang, Tao Lu, Bin Li, Ding He, Kang Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable vir... 详细信息
来源: 评论