咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 779 篇 期刊文献

馆藏范围

  • 1,590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,035 篇 工学
    • 623 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 101 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 79 篇 材料科学与工程(可...
    • 77 篇 网络空间安全
    • 64 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 核科学与技术
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 750 篇 理学
    • 423 篇 物理学
    • 253 篇 数学
    • 96 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 186 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 25 篇 security
  • 25 篇 training
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 629 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,458 篇 英文
  • 98 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1590 条 记 录,以下是761-770 订阅
排序:
Fully secure decentralized ciphertext-policy attribute-based encryption in standard model  14th
Fully secure decentralized ciphertext-policy attribute-based...
收藏 引用
14th International Conference on Information Security and Cryptology, Inscrypt 2018
作者: Ma, Chuangui Ge, Aijun Zhang, Jie Army Aviation Institute Beijing China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we introduce a new multi-authority ciphertext policy attribute-based encryption (MA-CP-ABE) system. In our system, there are multiple central authorities (CAs) and attribute authorities (AAs). The CAs w... 详细信息
来源: 评论
Recurrent Neural Network Based Binary Code Vulnerability Detection
Recurrent Neural Network Based Binary Code Vulnerability Det...
收藏 引用
2019第二届算法、计算和人工智能国际会议
作者: Jianyun Zheng Jianmin Pang Xiaochuan Zhang Xin Zhou MingLiang Li Jun Wang State Key Laboratory of Mathematical Engineering and Advanced Computing
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network(RNN) b... 详细信息
来源: 评论
A Framework for Multi-Variant Execution Environment
A Framework for Multi-Variant Execution Environment
收藏 引用
作者: Wang Junchao Liu Zhenwu Liu Hao Pang Jianmin State key Laboratory of Mathematical Engineering and Advanced Computing
Software diversity has been proven to be an effective approach to enhance system *** make the best of the advantage brought by software diversity,a multi-variant execution environment is ***,although some MVEEs have b... 详细信息
来源: 评论
Summary of Large Scale Graph computing Models
Summary of Large Scale Graph Computing Models
收藏 引用
2019 2nd International Conference on Mechanical,Electronic and engineering Technology(MEET 2019)
作者: Sheng Yang State Key Laboratory of Mathematical Engineering and Advanced Computing
Large-scale graph data is a research hotspot in the processing of big data and is generally used in traffic management, analysis of social network and semantic web, etc., resulting in the emergence of a variety of lar... 详细信息
来源: 评论
Dynamic Nonreciprocity with a Kerr Nonlinear Resonator
arXiv
收藏 引用
arXiv 2022年
作者: Pan, Rui-Kai Tang, Lei Xia, keyu Nori, Franco College of Engineering and Applied Sciences National Laboratory of Solid State Microstructures Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing210093 China College of Physics and Electronic Engineering Sichuan Normal University Chengdu610101 China Jiangsu Key Laboratory of Artificial Functional Materials Nanjing University Nanjing210023 China Shishan Laboratory Suzhou Campus of Nanjing University Suzhou215000 China RIKEN Quantum Computing Center RIKEN Cluster for Pioneering Research Saitama Wako-shi351-0198 Japan Physics Department The University of Michigan Ann ArborMI48109-1040 United States
On-chip optical nonreciprocal devices are vital components for integrated photonic systems and scalable quantum information processing. Nonlinear optical isolators and circulators have attracted considerable attention... 详细信息
来源: 评论
Fair Efficiency Comparisons of Decoy-state Quantum key Distribution Protocols
收藏 引用
Chinese Journal of Electronics 2018年 第2期27卷 241-249页
作者: LI Hongxin GAO Ming YAN Xueping YAN Bao HAN Yu SHAN Ling MA Zhi Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing College of Animal Science and Technology Henan University of Science and Technology
Taking the schemes based on different formulas of secure key rate as examples, we give a fair comparison between typical protocols under Universal composable(UC) security frame. Through analyzing the relationship of s... 详细信息
来源: 评论
Upper Security Bounds for Coherent-One-Way Quantum key Distribution
收藏 引用
Physical Review Letters 2020年 第26期125卷 260510-260510页
作者: Javier González-Payo Róbert Trényi Weilong Wang Marcos Curty Escuela de Ingeniería de Telecomunicación Department of Signal Theory and Communications University of Vigo Vigo E-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan 450001 China
The performance of quantum key distribution (QKD) is severely limited by multiphoton pulses emitted by laser sources due to the photon-number splitting attack. Coherent-one-way (COW) QKD has been introduced as a promi... 详细信息
来源: 评论
Model-Based Reinforcement Learning for Quantized Federated Learning Performance Optimization
Model-Based Reinforcement Learning for Quantized Federated L...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Nuocheng Yang Sihua Wang Mingzhe Chen Christopher G. Brinton Changchuan Yin Walid Saad Shuguang Cui Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China State Key Laboratory Of Networking And Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA School of Electrical and Computer Engineering Purdue University West Lafayette IN USA Bradley Department of Electrical and Computer Engineering Virginia Tech Arlington VA USA Shenzhen Research Institute of Big Data (SRIBD) and the Future Network of Intelligence Institute (FNii) Chinese University of Hong Kong Shenzhen China
This paper considers improving wireless communication and computation efficiency in federated learning (FL) via model quantization. In the proposed bitwidth FL scheme, edge devices train and transmit quantized version... 详细信息
来源: 评论
Automated identification and quantification of myocardial inflammatory infiltration in digital histological images to diagnose myocarditis
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Yanyun Hua, Xiumeng Zhu, Shouping Wang, Congrui Chen, Xiao Shi, Yu Song, Jiangping Zhou, Weihua School of Life Science and Technology Xidian University Engineering Research Center of Molecular and Neuro Imaging Ministry of Education Shaanxi Xi'An China Xi'an Key Laboratory of Intelligent Sensing and Regulation of Trans-Scale Life Information International Joint Research Center for Advanced Medical Imaging and Intelligent Diagnosis and Treatment School of Life Science and Technology Xidian University Shaanxi Xi'An China Innovation Center for Advanced Medical Imaging and Intelligent Medicine Guangzhou Institute of Technology Xidian University Guangdong Guangzhou China Beijing Key Laboratory of Preclinical Research and Evaluation for Cardiovascular Implant Materials Animal Experimental Centre Fuwai Hospital National Centre for Cardiovascular Disease Chinese Academy of Medical Sciences Peking Union Medical College Beijing China State Key Laboratory of Cardiovascular Disease Fuwai Hospital National Center for Cardiovascular Diseases Chinese Academy of Medical Sciences Peking Union Medical College 167A Beilishi Road Xi Cheng District Beijing China Department of Cardiovascular Surgery Fuwai Hospital National Center for Cardiovascular Diseases National Clinical Research Center of Cardiovascular Diseases State Key Laboratory of Cardiovascular Disease Chinese Academy of Medical Sciences Peking Union Medical College Beijing China The Cardiomyopathy Research Group Fuwai Hospital Beijing China Department of Applied Computing Michigan Technological University HoughtonMI United States Center for Biocomputing and Digital Health Institute of Computing and Cybersystems Health Research Institute Michigan Technological University HoughtonMI United States
Background Given the dimensionality of WSIs and the increase in the number of potential cases, the manual histological diagnosis of myocarditis based on Dallas Criteria is time-consuming, experience-dependent. Objecti... 详细信息
来源: 评论
Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter  7th
Multi-sensor Fusion Detection Method for Vehicle Target Base...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Duan, Xuting Sun, Chengming Tian, Daxin Zheng, Kunxian Zhou, Gang E, Wenjuan Zhang, Yundong Beijing Advanced Innovation Center for Big Data and Brain Computing School of Transpotation Science and Engineering Beihang University Beijing100191 China Research Institute of Highway Ministry of Transport of the People’s Republic of China Beijing100088 China School of Rail Transportation Soochow University Suzhou215000 China Suzhou Automotive Research Institute Tsinghua University Suzhou215000 China State Key Laboratory of Digital Multimedia Chip Technology Chongqing Vimicro AI Chip Technology Co. Ltd. Chongqing400722 China
Multi-sensor data fusion is an emerging technology, which has been widely used in medical diagnosis, remote sensing, inertial navigation and many other fields. What’s more, the implementation and application of autom... 详细信息
来源: 评论