咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是191-200 订阅
排序:
MEVTR: A Multilingual Model Enhanced With Visual Text Representations  30
MEVTR: A Multilingual Model Enhanced With Visual Text Repres...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Wang, Xiaohua Fei, Wenlong Hu, Min Zhang, Qingyu Zhu, Aoqiang School of Computer Science and Information Engineering HeFei University of Technology China Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine China
The goal of multilingual modelling is to generate multilingual text representations for various downstream tasks in different languages. However, some state-of-the-art pre-trained multilingual models perform poorly on... 详细信息
来源: 评论
SCFNet: A Spatial-Channel Features Network Based on Heterocentric Sample Loss for Visible-Infrared Person Re-identification  16th
SCFNet: A Spatial-Channel Features Network Based on Heteroc...
收藏 引用
16th Asian Conference on Computer Vision, ACCV 2022
作者: Su, Peng Liu, Rui Dong, Jing Yi, Pengfei Zhou, Dongsheng Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China
Cross-modality person re-identification between visible and infrared images has become a research hotspot in the image retrieval field due to its potential application scenarios. Existing research usually designs loss... 详细信息
来源: 评论
Semantic Understanding of Source and Binary Code based on Natural Language Processing  4
Semantic Understanding of Source and Binary Code based on Na...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Zhang, Zhongtang Liu, Shengli Yang, Qichao Guo, Shichen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op... 详细信息
来源: 评论
Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier  2021
Inter-domain Link Inference with Confidence Using Naïve Bay...
收藏 引用
2021 13th International Conference on Machine Learning and computing, ICMLC 2021
作者: Zhao, Yi Liu, Yan Guo, XiaoYu Sui, ZhongHang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Inter-domain link inference is not only important for network security and fault diagnosis, but also helps to conduct research on inter-domain congestion detection and network resilience assessment. Current researches... 详细信息
来源: 评论
Deep neural network-enabled battery open-circuit voltage estimation based on partial charging data
收藏 引用
Journal of Energy Chemistry 2024年 第3期90卷 120-132,I0005页
作者: Ziyou Zhou Yonggang Liu Chengming Zhang Weixiang Shen Rui Xiong State Key Laboratory of Mechanical Transmission for Advanced Equipment&College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing 400000China Department of Vehicle Engineering School of Mechanical EngineeringBeijing Institute of TechnologyBeijing 100081China Department of Electrical Engineering Harbin Institute of TechnologyHarbin 150000HeilongjiangChina School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyHawthornVictoria 3122Australia
Battery management systems(BMSs) play a vital role in ensuring efficient and reliable operations of lithium-ion *** main function of the BMSs is to estimate battery states and diagnose battery health using battery ope... 详细信息
来源: 评论
Dynamic Instrumentation Framework Based on Entity Equipment  6
Dynamic Instrumentation Framework Based on Entity Equipment
收藏 引用
6th IEEE International Conference on Computer and Communication Systems, ICCCS 2021
作者: Jiangtao, Zhao Dong, Weiyu Zhang, Haotian Lin, Jian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic binary analysis is an important way of program analysis. Most of the existing dynamic analysis tools are based on dynamic binary instrumentation platforms. The existing gdb tool, which is often used for debugg... 详细信息
来源: 评论
Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness  24
Advancing Quantization Steps Estimation: A Two-Stream Networ...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Cheng, Xin Wang, Hao Wang, Jinwei Luo, Xiangyang Ma, Bin Nanjing University of Information Science and Technology Nanjing China Huaiyin Institute of Technology Huai'an China Nankai University Tianjin China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Qilu University of Technology Jinan China
In Joint Photographic Experts Group (JPEG) image steganalysis and forensics, the quantization step can reveal the history of image operations. Several methods for estimating the quantization step have been proposed by... 详细信息
来源: 评论
Research on security assessment based on big data and multi-entity profile  5
Research on security assessment based on big data and multi-...
收藏 引用
5th IEEE advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Liu, Wenfu Pang, Jianmin Yang, Shudan Li, Nan Du, Qiming Sun, Daozhu Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties"(entities in this paper) have interna... 详细信息
来源: 评论
SROBR: Semantic Representation of Obfuscation-Resilient Binary Code
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Tang, Ke Shan, Zheng Liu, Fudong Huang, Yizhao Sun, Rongbo Qiao, Meng Zhang, Chunyan Wang, Jue Gui, Hairen State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software p... 详细信息
来源: 评论
An anonymous key agreement protocol with robust authentication for smart grid infrastructure
收藏 引用
Science China(Information Sciences) 2022年 第09期65卷 291-293页
作者: Ting CHEN Qingfeng CHENG Xinghua LI School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart device... 详细信息
来源: 评论