咨询与建议

限定检索结果

文献类型

  • 6,572 篇 期刊文献
  • 516 篇 会议
  • 1 册 图书

馆藏范围

  • 7,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,642 篇 工学
    • 1,500 篇 计算机科学与技术...
    • 837 篇 软件工程
    • 644 篇 机械工程
    • 489 篇 材料科学与工程(可...
    • 433 篇 电子科学与技术(可...
    • 407 篇 仪器科学与技术
    • 405 篇 控制科学与工程
    • 267 篇 信息与通信工程
    • 198 篇 动力工程及工程热...
    • 196 篇 网络空间安全
    • 185 篇 化学工程与技术
    • 168 篇 电气工程
    • 146 篇 地质资源与地质工...
    • 146 篇 航空宇航科学与技...
    • 141 篇 交通运输工程
    • 138 篇 力学(可授工学、理...
    • 129 篇 土木工程
    • 121 篇 核科学与技术
    • 104 篇 光学工程
    • 97 篇 建筑学
  • 1,384 篇 理学
    • 427 篇 数学
    • 243 篇 物理学
    • 201 篇 生物学
    • 118 篇 化学
  • 1,159 篇 医学
    • 816 篇 临床医学
    • 112 篇 中西医结合
  • 621 篇 管理学
    • 532 篇 管理科学与工程(可...
  • 392 篇 农学
    • 138 篇 作物学
  • 141 篇 经济学
    • 136 篇 应用经济学
  • 87 篇 教育学
  • 77 篇 艺术学
  • 64 篇 军事学
  • 47 篇 文学
  • 35 篇 法学
  • 14 篇 哲学
  • 1 篇 历史学

主题

  • 131 篇 numerical simula...
  • 126 篇 simulation
  • 86 篇 deep learning
  • 76 篇 analysis
  • 74 篇 model
  • 63 篇 meta-analysis
  • 61 篇 and
  • 54 篇 optimization
  • 45 篇 network
  • 44 篇 software
  • 38 篇 control
  • 33 篇 system
  • 32 篇 systems
  • 32 篇 gis
  • 29 篇 design
  • 27 篇 internet of thin...
  • 27 篇 management
  • 27 篇 numerical
  • 27 篇 method
  • 26 篇 image

机构

  • 114 篇 university of ch...
  • 68 篇 university of ch...
  • 38 篇 state key labora...
  • 38 篇 state key labora...
  • 25 篇 institute of sof...
  • 23 篇 school of mechan...
  • 22 篇 institute of pla...
  • 22 篇 institute of sof...
  • 21 篇 ieee
  • 20 篇 institute of hig...
  • 19 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 trusted computin...
  • 18 篇 graduate univers...
  • 17 篇 institute of sof...
  • 16 篇 institute of com...
  • 15 篇 school of comput...
  • 14 篇 department of co...
  • 14 篇 shanghai institu...
  • 14 篇 graduate univers...

作者

  • 18 篇 wei sun
  • 18 篇 wei wang
  • 18 篇 vijay k. madiset...
  • 17 篇 wei li
  • 15 篇 yu zhang
  • 13 篇 lu zhang
  • 12 篇 rui wang
  • 12 篇 lei zhang
  • 11 篇 jun wang
  • 11 篇 wei liu
  • 10 篇 yuefei sui
  • 10 篇 yi zhang
  • 10 篇 arshdeep bahga
  • 9 篇 louis alberto gu...
  • 9 篇 feng tian
  • 9 篇 hao chen
  • 9 篇 yi liu
  • 8 篇 jidong ge
  • 8 篇 jing wang
  • 8 篇 hongan wang

语言

  • 6,345 篇 英文
  • 743 篇 中文
  • 1 篇 法文
检索条件"机构=1. Institute of Software"
7089 条 记 录,以下是1-10 订阅
排序:
A buffer overflow detection and defense method based on RiSC-V instruction set extension
收藏 引用
Cybersecurity 2024年 第2期7卷 28-43页
作者: Chang Liu Yan-Jun Wu Jing-Zheng Wu Chen Zhao Intelligent software Research Center Institute of SoftwareChinese Academy of SciencesBejingChina University of Chinese Academy of Sciences BeijingChina State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijingChina
Buffer overflow poses a serious threat to the memory security of modern operating *** overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Dynamic adaptive spatio-temporal graph network for COVID-1. forecasting
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第3期9卷 769-786页
作者: Xiaojun Pu Jiaqi Zhu Yunkun Wu Chang Leng Zitong Bo Hongan Wang institute of {1. Chinese Academy of Sciences BeijingChina Ecovacs Robotics Co. Ltd.SuzhouJiangsuChina Automotive software Innovation Center ChongqingChina
Appropriately characterising the mixed space-time relations of the contagion process caused by hybrid space and time factors remains the primary challenge in COVID-1. ***,in previous deep learning models for epidemic ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A survey on facial image deblurring
收藏 引用
Computational Visual Media 2024年 第1期10卷 3-25页
作者: Bingnan Wang Fanjiang Xu Quan Zheng institute of {1. Chinese Academy of SciencesBeijing100190China University of Chinese Academy of Sciences Beijing100049China
When a facial image is blurred,it significantly affects high-level vision tasks such as face *** purpose of facial image deblurring is to recover a clear image from a blurry input image,which can improve the recogniti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TULAM:trajectory-user linking via attention mechanism
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 51-68页
作者: Hao LI Shuyu CAO Yaqing CHEN Min ZHANG Dengguo FENG Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences University of Chinese Academy of Sciences
Recently,the application of location-based services(LBS) has become a prevalent means to provide convenience in customers’ everyday ***,because massive volumes of location information are collected by LBS application... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Categorizing methods for integrating machine learning with executable specifications
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 5-19页
作者: David HAREL Raz YERUSHALMI Assaf MARRON Achiya ELYASAF Department of Computer Science and Applied Mathematics Weizmann Institute of Science Department of software and Information Systems Engineering Ben-Gurion University of the Negev
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive r... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control
收藏 引用
Frontiers of Computer Science 2024年 第3期18卷 231-233页
作者: Haifeng QIAN Cheng LIN Qiaohan CHU Jie CHEN Shanghai Key Laboratory of Trustworthy Computing Software Engineering InstituteEast China Normal UniversityShanghai 200062China
1.Introduction Boneh et al.[1.first systematically introduce the concept of Functional Encryption(FE)which overcomes all-or-nothing limitation of traditional public key ***,FE hides a potential problem:even if the sec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Application of sparse S transform network with knowledge distillation in seismic attenuation delineation
收藏 引用
Petroleum Science 2024年 第4期21卷 2345-2355页
作者: Nai-Hao Liu Yu-Xin Zhang Yang Yang Rong-Chang Liu Jing-Huai Gao Nan Zhang School of Information and Communications Engineering Xi'an Jiaotong University School of software Engineering Xi'an Jiaotong University PetroChina Research institute of Petroleum Exploration and Development (RIPED) CNPC Research institute of Exploration and Development Yumen Oilfield Company CNPC
Time-frequency analysis is a successfully used tool for analyzing the local features of seismic ***, it suffers from several inevitable limitations, such as the restricted time-frequency resolution,the difficulty in s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Exploring the effect of fingertip aero-haptic feedforward cues in directing eyes-free target acquisition in VR
收藏 引用
虚拟现实与智能硬件(中英文) 2024年 第2期6卷 113-131页
作者: Xiaofei REN Jian HE Teng HAN Songxian LIU Mengfei LV Rui ZHOU Faculty of Information Technology Beijing University of TechnologyBeijing 100124China institute of {1. Chinese Academy of SciencesBeijing 100190China Beijing Engineering Research Center for IoT software and Systems Beijing University of TechnologyBeijing 100124China
Background The sense of touch plays a crucial role in interactive behavior within virtual spaces,particularly when visual attention is *** haptic feedback has been widely used to compensate for the lack of visual cues... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evolutionary Variational YOLOv8 Network for Fault Detection in Wind Turbines
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 625-642页
作者: Hongjiang Wang Qingze Shen Qin Dai Yingcai Gao Jing Gao Tian Zhang College of Information Shenyang Institute of EngineeringShenyang110136China Graduate School Shenyang Institute of EngineeringShenyang110136China College of software Northeastern UniversityShenyang110169China
Deep learning has emerged in many practical applications,such as image classification,fault diagnosis,and object *** recently,convolutional neural networks(CNNs),representative models of deep learning,have been used t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3535-3563页
作者: Younghoon Ban Myeonghyun Kim Haehyun Cho School of software Soongsil UniversitySeoul06978Korea
Antivirus vendors and the research community employ Machine Learning(ML)or Deep Learning(DL)-based static analysis techniques for efficient identification of new threats,given the continual emergence of novel malware ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论