咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 779 篇 期刊文献

馆藏范围

  • 1,590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,035 篇 工学
    • 623 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 101 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 79 篇 材料科学与工程(可...
    • 77 篇 网络空间安全
    • 64 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 核科学与技术
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 750 篇 理学
    • 423 篇 物理学
    • 253 篇 数学
    • 96 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 186 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 25 篇 security
  • 25 篇 training
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 629 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,458 篇 英文
  • 98 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1590 条 记 录,以下是581-590 订阅
排序:
The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection
The Analysis of HTTPS Privacy Protection Based on Malicious ...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Zeyan Liu Jianshan Pen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th... 详细信息
来源: 评论
Deep Learning based Recommedation System: A Review of Recent Works
Deep Learning based Recommedation System: A Review of Recent...
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Meiling Wang Xiaonan Liu Lina Jing State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The research upsurge of recommendation system and deep learning makes the deep learning based recommendation system become an inevitable trend. Through the introduction of the latest research of deep learning based re... 详细信息
来源: 评论
The various graphs in graph computing  1
收藏 引用
22nd Annual Conference on Computer engineering and Technology, NCCET 2018
作者: Sun, Rujun Zhang, Lufei State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The world is full of relationships, and graph is the most evident representation for them. With the increasing of data scale, graphs become larger and have encountered a new world of analyzing. What can we learn from ... 详细信息
来源: 评论
An Efficient Sieve Algorithm with Evolutionary Technique
An Efficient Sieve Algorithm with Evolutionary Technique
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Zedong Sun Chunxiang Gu Yonghui Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t... 详细信息
来源: 评论
Software Deployment Strategy Based on Performance and Heterogeneity
Software Deployment Strategy Based on Performance and Hetero...
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Hao Liu Zheng Zhang Zhenwu Liu Gaofei Zhang Yufeng Zhao State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the current cyberspace field, the positions of offensive and defensive parties are extremely imbalanced. Aiming at the weakness of web virtual hosting in this paper, we combine software diversity technology to buil... 详细信息
来源: 评论
Network Topology Change Detection Based on Statistical Process Control  20
Network Topology Change Detection Based on Statistical Proce...
收藏 引用
4th High Performance computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020
作者: Liu, Yan Liu, Lian Yan, Yu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Investigation Technology Center PLCMC Beijing China First Affiliated Hospital of Chongqing Medical University Chongqing China
Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the tradition... 详细信息
来源: 评论
Embedding Attribute and Relation Information for Person Entity Alignment
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Can Wang Xiaonan Liu Meijuan Yin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
Pre-ictal causal connectivity reveals the epileptic network characteristics for deep brain stimulation
收藏 引用
Neuroscience 2025年 579卷 329-343页
作者: Yifan Wang Tao Yu Yulan Ma Weigang Cui Xueyuan Wang Liankun Ren Yang Li Department of Automation Science and Electrical Engineering Beihang University Beijing 100191 China. Beijing Institute of Functional Neurosurgery Department of Functional Neurosurgery Xuanwu Hospital Capital Medical University Beijing 100053 China. School of Engineering Medicine Beihang University Beijing 100191 China. Department of Neurology Xuanwu Hospital Capital Medical University Beijing 100053 China. Beijing Advanced Innovation Center for Big Data and Brain Computing State Key Laboratory of Virtual Reality Technology and Systems Department of Automation Science and Electrical Engineering Beihang University Beijing 100191 China. Electronic address: liyang@***.
Deep brain stimulation of anterior nucleus of the thalamus (ANT-DBS) is an effective clinical treatment for drug-resistant focal epilepsy. However, the complex epileptic network characteristics underlying ANT-stimulat... 详细信息
来源: 评论
Optimal Strategy Selection of Dynamic Protocol Stack Based on Game Theory
Optimal Strategy Selection of Dynamic Protocol Stack Based o...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Zhengke He Bin Lu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Mobile target defense technology not only protects system security, but also increases the cost of system operation. How to reduce the defense cost as much as possible while achieving the defense function is a current... 详细信息
来源: 评论
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Ling Chen Wenwen Liu Daofu Gong Yan Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论