咨询与建议

限定检索结果

文献类型

  • 845 篇 会议
  • 796 篇 期刊文献

馆藏范围

  • 1,641 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,075 篇 工学
    • 683 篇 计算机科学与技术...
    • 580 篇 软件工程
    • 231 篇 信息与通信工程
    • 135 篇 生物工程
    • 127 篇 控制科学与工程
    • 112 篇 电气工程
    • 106 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 90 篇 核科学与技术
    • 77 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 53 篇 仪器科学与技术
    • 47 篇 化学工程与技术
    • 42 篇 材料科学与工程(可...
    • 32 篇 动力工程及工程热...
    • 32 篇 网络空间安全
    • 30 篇 交通运输工程
  • 701 篇 理学
    • 329 篇 物理学
    • 277 篇 数学
    • 146 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 51 篇 化学
    • 41 篇 系统科学
  • 260 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 64 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 40 篇 法学
    • 34 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 45 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 21 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting
  • 15 篇 conferences

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,556 篇 英文
  • 53 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Application Technology"
1641 条 记 录,以下是381-390 订阅
排序:
AdvMap: Crafting Adversarial Maps to Counter AI Aimbot in First-Person Shooter Games
收藏 引用
IEEE Transactions on Games 2025年
作者: Yan, Kai Chen, Xianyi Cui, Qi Yuan, Haoqin Tan, Zhenshan Nanjing University of Information Science and Technology Engineering Research Center of Digital Forensics Ministry of Education the School of Computer Science Nanjing210044 China Beijing Jiaotong University Key Laboratory of Transport Industry of Big Data Application Technologies for Comprehensive Transport Beijing100044 China
AI-based automatic aiming cheats (a.k.a., AI aimbots) have proliferated in first-person shooter (FPS) games, which grant malicious users an unfair gameplay advantage. Since AI aimbots operate independently of game dat... 详细信息
来源: 评论
Zebra: A cluster-aware blockchain consensus algorithm
收藏 引用
Journal of Network and computer applications 2024年 232卷
作者: Wan, Ji Hu, Kai Li, Jie Guo, Yichen Su, Hao Li, Shenzhang Ye, Yafei School of Computer Science and Engineering Beihang University Beijing China Yunnan Power Grid Co Ltd China Southern Power Grid Co Ltd Kunming China Beihang Yunnan Innovation Institute Yunnan Key Laboratory of Blockchain Application Technology China
The Consensus algorithm is the core of the permissioned blockchain, it directly affects the performance and scalability of the system. Performance is limited by the computing power and network bandwidth of a single le... 详细信息
来源: 评论
The Optimal Implementation of Khudra Lightweight Block Cipher  9th
The Optimal Implementation of Khudra Lightweight Block Ciphe...
收藏 引用
9th International Conference on computer Engineering and Networks, CENet2019
作者: Huang, Xiantong Li, Lang Guo, Ying College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, we discuss the area and speed balance optimization of Khudra lightweight block cipher. There are three major ingredients. Firstly, because of the whole structure of the Khudra block cipher and its F-fun... 详细信息
来源: 评论
Kerr effect in ultra-compact hybrid plasmonic metal-insulator-metal nano-focusing structure
收藏 引用
Chinese Optics Letters 2022年 第3期20卷 106-110页
作者: Kejian Zhu Pengfei Sun F|engfei Xu Xingpeng Liu Tangyou Sun Haiou Li Zhiping Zhou State Key Laboratory of Advanced Optical Communication Systems and Networks Department of ElectronicsSchool of Electronics Engineering and Computer SciencePeking UniversityBeijing 100871China Guangxi Key Laboratory of Precision Navigation Technology and Application Guilin University of Electronic TechnologyGuilin 541004China Shanghai Institute of Optics and Fine Mechanics Chinese Academy of SciencesShanghai 201800China
Nano-focusing structures based on hybrid plasmonic waveguides are likely to play a key role in strong nonlinear optical *** the insertion loss is considerable,a significant nonlinear phase shift may be achieved by dec... 详细信息
来源: 评论
Constrained Multi-objective Optimization Based on Dynamic Priority and Cooperative Offspring Generation
收藏 引用
IEEE Transactions on Evolutionary Computation 2025年
作者: He, Zhihui Wang, Feng Li, Bingdong Zhou, Aimin Wuhan University School of Computer Science Hubei 430072 China East China Normal University Shanghai Frontiers Science Center of Molecule Intelligent Syntheses Shanghai Institute of AI for Education School of Computer Science and Technology Shanghai200062 China Ministry of Education Key Laboratory of Advanced Theory and Application in Statistics and Data Science China
As the number and complexity of constraints in constrained multi-objective optimization problems (CMOPs) increase, the performance of existing constrained multi-objective evolutionary algorithms (CMOEAs) declines sign... 详细信息
来源: 评论
A Novel AES Random Mask Scheme Against Correlation Power Analysis  9th
A Novel AES Random Mask Scheme Against Correlation Power Ana...
收藏 引用
9th International Conference on computer Engineering and Networks, CENet2019
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
With the wide application of smart card, people’s demand for the security of smart card is increasing. The Advanced Encryption Standard (AES) algorithm in smart card itself is safe enough, but the encryption algorith... 详细信息
来源: 评论
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries  10th
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Tian, Xiaomei Zhao, Huihuang College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems
Avoid attacks: A Federated Data Sanitization Defense in IoMT...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Chong Chen Ying Gao Siquan Huang Xingfu Yan School of Computer Science and Technology South China University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application China School of Computer Science South China Normal University Guangzhou China
Malicious falsification of medical data destroys the training process of the medical-aided diagnosis models and causes serious damage to Healthcare IoMT Systems. To solve this unsupervised problem, this paper finds a ...
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm  10th
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Wang, Ying Liu, Qingyun Sun, Yaqi Zhang, Feng Zhu, Yining College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, a handwritten digit recognition system based on K-nearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine lear... 详细信息
来源: 评论
Improved divergence-free smoothed particle hydrodynamics via priority of divergence-free solver and SOR
Improved divergence-free smoothed particle hydrodynamics via...
收藏 引用
作者: Wu, Maolin Liu, Shiguang Xu, Qing School of Computer Science and Technology College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University Tianjin China
Fluid simulation plays an important role in movie special effects, computer games, etc. In recent years, the Smoothed Particle Hydrodynamics (SPH) has become a popular fluid simulation method due to its simpler implem... 详细信息
来源: 评论