咨询与建议

限定检索结果

文献类型

  • 5,427 篇 期刊文献
  • 4,481 篇 会议
  • 38 册 图书

馆藏范围

  • 9,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,549 篇 工学
    • 3,169 篇 计算机科学与技术...
    • 2,522 篇 软件工程
    • 1,267 篇 信息与通信工程
    • 850 篇 控制科学与工程
    • 845 篇 电气工程
    • 718 篇 电子科学与技术(可...
    • 602 篇 生物工程
    • 599 篇 光学工程
    • 525 篇 生物医学工程(可授...
    • 441 篇 仪器科学与技术
    • 386 篇 化学工程与技术
    • 332 篇 核科学与技术
    • 329 篇 机械工程
    • 309 篇 动力工程及工程热...
    • 308 篇 网络空间安全
    • 297 篇 材料科学与工程(可...
  • 4,552 篇 理学
    • 2,428 篇 物理学
    • 1,364 篇 数学
    • 770 篇 生物学
    • 526 篇 化学
    • 498 篇 统计学(可授理学、...
    • 428 篇 地球物理学
  • 1,294 篇 管理学
    • 811 篇 管理科学与工程(可...
    • 494 篇 图书情报与档案管...
    • 334 篇 工商管理
  • 693 篇 医学
    • 514 篇 临床医学
    • 430 篇 基础医学(可授医学...
    • 293 篇 公共卫生与预防医...
    • 239 篇 药学(可授医学、理...
  • 278 篇 法学
    • 236 篇 社会学
  • 175 篇 农学
  • 129 篇 经济学
  • 74 篇 文学
  • 61 篇 教育学
  • 29 篇 军事学
  • 19 篇 艺术学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 297 篇 accuracy
  • 280 篇 deep learning
  • 233 篇 hadron colliders
  • 226 篇 machine learning
  • 197 篇 real-time system...
  • 193 篇 feature extracti...
  • 176 篇 internet of thin...
  • 157 篇 computational mo...
  • 137 篇 optimization
  • 134 篇 training
  • 131 篇 convolutional ne...
  • 128 篇 support vector m...
  • 127 篇 security
  • 119 篇 predictive model...
  • 101 篇 reliability
  • 101 篇 artificial intel...
  • 91 篇 semantics
  • 89 篇 hadrons
  • 87 篇 galaxies
  • 83 篇 higgs bosons

机构

  • 887 篇 department of ph...
  • 860 篇 cavendish labora...
  • 825 篇 physikalisches i...
  • 824 篇 oliver lodge lab...
  • 578 篇 school of physic...
  • 472 篇 infn laboratori ...
  • 469 篇 infn sezione di ...
  • 456 篇 fakultät physik ...
  • 446 篇 infn sezione di ...
  • 434 篇 university of ch...
  • 428 篇 infn sezione di ...
  • 414 篇 iccub universita...
  • 414 篇 horia hulubei na...
  • 411 篇 department of ph...
  • 394 篇 school of physic...
  • 389 篇 school of physic...
  • 381 篇 nikhef national ...
  • 379 篇 imperial college...
  • 378 篇 center for high ...
  • 371 篇 h.h. wills physi...

作者

  • 270 篇 a. gomes
  • 256 篇 c. alexa
  • 256 篇 j. m. izen
  • 245 篇 g. bella
  • 245 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 c. amelung
  • 242 篇 s. chen
  • 235 篇 g. spigo
  • 233 篇 f. siegert
  • 219 篇 r. ströhmer
  • 219 篇 j. wang
  • 216 篇 y. tayalati
  • 214 篇 m. rijssenbeek
  • 210 篇 s. jin
  • 205 篇 g. gaudio
  • 204 篇 m. gandelman
  • 203 篇 t. gershon
  • 200 篇 s. mohapatra
  • 197 篇 d. golubkov

语言

  • 9,093 篇 英文
  • 756 篇 其他
  • 97 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Cyberspace Research and College of Computer Science and Technology"
9946 条 记 录,以下是31-40 订阅
排序:
Physical information-enhanced graph neural network for predicting phase separation
收藏 引用
Chinese Physics B 2024年 第7期33卷 278-283页
作者: 张亚强 王煦文 王雅楠 郑文 Institute of Public-Safety and Big Data College of Computer Science and Technology(College of Data Science)Taiyuan University of TechnologyJinzhong 030600China Shanxi Engineering Research Centre for Intelligent Data Assisted Treatment Changzhi Medical CollegeChangzhi 046000China Innovation Academy for Microsatellites of Chinese Academy of Sciences Shanghai 200050China
Although phase separation is a ubiquitous phenomenon, the interactions between multiple components make it difficult to accurately model and predict. In recent years, machine learning has been widely used in physics s... 详细信息
来源: 评论
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
收藏 引用
Frontiers of computer science 2024年 第2期18卷 251-253页
作者: Yongxin ZHANG Hong LEI Bin WANG Qinghao WANG Ning LU Wenbo SHI Bangdao CHEN Qiuling YUE R&D Department SSC Holding CompanyLtd.Chengmai 571924China School of Cyberspace Security(School of Cryptography) Hainan UniversityHaikou 570228China College of Computer Science and Engineering Northeastern UniversityShenyang 110819China School of Computer Science and Technology Xidian UniversityXi'an 710071China Blockchain Research Group Oxford-Hainan Blockchain Research InstituteChengmai 571924China
1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their d... 详细信息
来源: 评论
Robust asymmetric Cherenkov radiation in tilted anisotropic medium
收藏 引用
science China(Physics,Mechanics & Astronomy) 2024年 第1期67卷 46-51页
作者: Shuwen Xue Yadong Xu Linkang Han Zhi Ning Chen Qiaoliang Bao Shan Zhu Huanyang Chen Institute of Electromagnetics and Acoustics and Department of Physics College of Physical Science and TechnologyJiujiang Research InstituteXiamen UniversityXiamen 361005China School of Physical Science and Technology Institute of Theoretical and Applied PhysicsSoochow UniversitySuzhou 215006China Department of Electrical and Computer Engineering National University of SingaporeSingapore 8117583Singapore Institute of Energy Materials Science(IEMS) University of Shanghai for Science and TechnologyShanghai 200093China
Cherenkov radiation(CR)is available for a wide variety of terahertz(THz)radiation sources,but its efficiency is deeply affected by intrinsic *** find that if the tilted angle(α)of anisotropic material and radiation a... 详细信息
来源: 评论
APWF: A Parallel Website Fingerprinting Attack with Attention Mechanism
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2027-2041页
作者: Dawei Xu Min Wang Yue Lv Moxuan Fu Yi Wu Jian Zhao College of Computer Science and Technology Changchun UniversityChangchun130022China School of Cyberspace Science and Technology Beijing Institute of TechnologyBeijing100081China Key Laboratory of Intelligent Rehabilitation and Barrier-Free for the Disabled Changchun UniversityChangchun130022China China Academy of Information and Communications Technology Beijing100083China Key Laboratory of Mobile Application Innovation and Governance Technology Ministry of Industry and Information TechnologyBeijing100846China
Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial fea... 详细信息
来源: 评论
Optimisation of sparse deep autoencoders for dynamic network embedding
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1361-1376页
作者: Huimei Tang Yutao Zhang Lijia Ma Qiuzhen Lin Liping Huang Jianqiang Li Maoguo Gong College of Computer Science and Software Engineering Shenzhen UniversityShenzhenChina Institute for Infocomm Research Agency for Science Technology and ResearchSingaporeSingapore Key Laboratory of Collaborative Intelligence Systems Ministry of EducationXidian UniversityXi'anChina
Network embedding(NE)tries to learn the potential properties of complex networks represented in a low-dimensional feature ***,the existing deep learningbased NE methods are time-consuming as they need to train a dense... 详细信息
来源: 评论
Service Application of Knowledge Graph in the Hotspot of Network Public Opinion research  11
Service Application of Knowledge Graph in the Hotspot of Net...
收藏 引用
11th Joint International Information technology and Artificial Intelligence Conference, ITAIC 2023
作者: Liu, Huanpeng Meng, Qingchuan Hu, Dayong Dong, Yiran Zhu, Yulin Meng, Ge HeiLongJiang Province Cyberspace Research Center Harbin China College of Computer Science and Technology Harbin Engineering University Harbin China
Along with the development of the study of Internet public opinion, it is a hotspot to analyze the Internet under the circumstance of large data. Under such background, article drew out the hotspots of Internet public... 详细信息
来源: 评论
Target Detection-Oriented RGCN Inference Enhancement Method
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1219-1237页
作者: Lijuan Zhang Xiaoyu Wang Songtao Zhang Yutong Jiang Dongming Li Weichen Sun School of Internet of Things Engineering Wuxi UniversityWuxi214105China College of Computer Science and Engineering Changchun University of TechnologyChangchun130012China Computer Science and Technology at Guohao Academy Tongji UniversityShanghai200092China China North Vehicle Research Institute Beijing100072China
In this paper,a reasoning enhancement method based on RGCN(Relational Graph Convolutional Network)is proposed to improve the detection capability of UAV(Unmanned Aerial Vehicle)on fast-moving military targets in urban... 详细信息
来源: 评论
JANE: Joint Angle Networks Assisting 3D Human Pose Estimation
JANE: Joint Angle Networks Assisting 3D Human Pose Estimatio...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Jinhuan Zhao, Yuzhen Song, Xujie Chen, Wenzhou Xuan, Qi Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology HangZhou China Department of Computer Science and Technology Hangzhou Dianzi University HangZhou China
3D human pose estimation (HPE) is crucial due to its extensive applications. While current 3D HPE methods focus on human skeleton topology for accuracy, they often overlook joint angle information, which is vital in 2... 详细信息
来源: 评论
An energy constraint position-based dynamics with corrected SPH kernel
收藏 引用
science China(Information sciences) 2023年 第1期66卷 144-157页
作者: Wei CAO Luan LYU Zhixin YANG Enhua WU College of Computer Science and Technology China University of Petroleum Faculty of Science and Technology University of Macau State Key Laboratory of Internet of Things for Smart City University of Macau State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Guangzhou Greater Bay Area Virtual Reality Research Institute
We introduce an improved position-based dynamics method with corrected smoothed particle hydrodynamics(SPH) kernel to simulate deformable solids. Using a strain energy constraint that follows the continuum mechanics, ... 详细信息
来源: 评论
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023年 第2期2023卷 519-542页
作者: Zhang, Fan Huang, Run Feng, Tianxiang Gong, Xue Tao, Yulong Ren, Kui Zhao, Xinjie Guo, Shize School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou310027 China Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies Hangzhou310027 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou310027 China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001 China Shanghai Institute of Satellite Engineering Shanghai201109 China
In 2018, Zhang et al. introduced the Persistent Fault Analysis (PFA) for the first time, which uses statistical features of ciphertexts caused by faulty Sbox to recover the key of block ciphers. However, for most of t... 详细信息
来源: 评论