咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是161-170 订阅
排序:
Research progress of quantum artificial intelligence in smart city
收藏 引用
Intelligent and Converged Networks 2024年 第2期5卷 116-133页
作者: Sumin Wang Ning Wang Tongyu Ji Yiyun Shi Chao Wang the Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai UniversityShanghai 200444China School of Information Engineering Ganzhou Key Laboratory of Cloud Computing and Big Data ResearchGannan University of Science and TechnologyGanzhou 341000China
The rapid accumulation of big data in the Internet era has gradually decelerated the progress of Artificial Intelligence(AI).As Moore’s Law approaches its limit,it is imperative to break the constraints that are hold... 详细信息
来源: 评论
Real-to-Sim Grasp: Rethinking the Gap between Simulation and Real World in Grasp Detection  8
Real-to-Sim Grasp: Rethinking the Gap between Simulation and...
收藏 引用
8th Conference on Robot Learning, CoRL 2024
作者: Cai, Jia-Feng Chen, Zibo Wu, Xiao-Ming Jiang, Jian-Jian Wei, Yi-Lin Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
For 6-DoF grasp detection, simulated data is expandable to train more powerful model, but it faces the challenge of the large gap between simulation and real world. Previous works bridge this gap with a sim-to-real wa... 详细信息
来源: 评论
Revealing Distribution Discrepancy by Sampling Transfer in Unlabeled Data  38
Revealing Distribution Discrepancy by Sampling Transfer in U...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhao, Zhilin Cao, Longbing Fan, Xuhui Zheng, Wei-Shi School of Computing Macquarie University Australia School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
There are increasing cases where the class labels of test samples are unavailable, creating a significant need and challenge in measuring the discrepancy between training and test distributions. This distribution disc...
来源: 评论
A Highly Secure C2C-PAKE Cross-domain Protocol
A Highly Secure C2C-PAKE Cross-domain Protocol
收藏 引用
2021 International Conference on Network Communication and Information Security, ICNCIS 2021
作者: Wang, Xiangyang Gu, Chunxiang Lu, Siqi Chen, Xi Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
This paper studies the password-based strong authentication key exchange protocol in the cross-domain scenario, and gives an end-to-end highly secure C2C-PAKE protocol, in which the server shares a password with the c... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
Adversarial Example Attacks Against Intelligent Malware Detection: A Survey  4
Adversarial Example Attacks Against Intelligent Malware Dete...
收藏 引用
4th International Conference on Applied Machine Learning, ICAML 2022
作者: Qi, Xuyan Tang, Yonghe Wang, Huanwei Liu, Tieming Jing, Jing State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin... 详细信息
来源: 评论
MDFA: A Malware Detection Framework Based on Attention Mechanism with Bi-LSTM  4
MDFA: A Malware Detection Framework Based on Attention Mecha...
收藏 引用
4th International Conference on Applied Machine Learning, ICAML 2022
作者: Qi, Xuyan Wang, Huanwei Tang, Yonghe Liu, Wei Xie, Jiangtao State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
As the existing malware intelligent detection methods have shortcomings and low accuracy of manual feature extraction and feature processing, a Malware Detection Framework with Attention mechanism based on Bi-directio... 详细信息
来源: 评论
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system
A malware detection method using satisfiability modulo theor...
收藏 引用
作者: Xie, Yaobin Chang, Rui Jiang, Liehui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Nowadays programmable logic controllers (PLCs) are suffering increasing cyberattacks. Attackers could reprogram PLCs to inject malware that would cause physical damages and economic losses. These PLC malwares are high... 详细信息
来源: 评论
Improvement and optimization of consensus algorithm based on PBFT  4
Improvement and optimization of consensus algorithm based on...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Zhao, Liang Li, Bin Zhou, Qinglei Chen, Xiaojie Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper proposes an improved consensus algorithm based on PBFT(EBCR-PBFT). Firstly, The Modified Random Select(MRS) function is used to perform preliminary screening of network nodes, so as to solve the problem of ... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  22
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer engineering
作者: Chenwei Li Zheming Li Bo Yang Hengwei Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论