咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是291-300 订阅
排序:
A Relation-Oriented Method for Joint Entity and Relation Extraction Based on Neural Network  21
A Relation-Oriented Method for Joint Entity and Relation Ext...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Hu, Hongwei Yin, Meijuan Liu, Xiaonan Key Laboratory of Cyberspace Situation Awareness of Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Entity and relation extraction is a basic task of information extraction in natural language processing. At present, Entity and relation extraction based on artificial intelligence has been widely studied, but most me... 详细信息
来源: 评论
Two-Stage Submodular Maximization Under Knapsack Problem
收藏 引用
Tsinghua Science and Technology 2024年 第6期29卷 1703-1708页
作者: Zhicheng Liu Jing Jin Donglei Du Xiaoyan Zhang Beijing Institute for Scientific and Engineering Computing Beijing University of TechnologyBeijing 100124China College of Taizhou Nanjing Normal UniversityTaizhou 225300China Faculty of Management University of New BrunswickFrederictonE3B 5A3Canada School of Mathematical Science Institute of Mathematicsand Ministry of Education Key Laboratory of NSLSCSNanjing Normal UniversityNanjing 210023China
Two-stage submodular maximization problem under cardinality constraint has been widely studied in machine learning and combinatorial *** this paper,we consider knapsack *** this problem,we give n articles and m catego... 详细信息
来源: 评论
SoK: A Survey on Redundant Execution Technology
SoK: A Survey on Redundant Execution Technology
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zijing Liu Zheng Zhang Ruicheng Xi Pengzhe Zhu Bolin Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
International Conference on Communications, Information System and Computer engineering (CISCE)
作者: Zhe Xiong Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
Memory-Guided Contrastive and Triplet Separation for Weakly-Supervised Disease Detection
Memory-Guided Contrastive and Triplet Separation for Weakly-...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: She, Jinwen Li, Qiong Ma, Andy J. Sun Yat-sen University Cancer Center Guangzhou China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Ministry of Education Guangdong Province Key Laboratory of Information Security Technology Key Laboratory of Machine Intelligence and Advanced Computing China
Weakly-supervised disease detection has the great potential to alleviate the time-consuming and labor-intensive burden of manual annotations in instance level. While existing methods extract normality prototypes encod... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  6
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Wu, Zejun Lu, Li Jia, Qiong Chen, Zhihao State Key Laboratory of Mathematical Engineering and advanced Computing Zheng zhou China National Local Joint Engineering Laboratory of Network Space Security Technology Zheng zhou China Beijing Institute of Computer Technology and Application BeiJing China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
Consumer Electronics and Computer engineering (ICCECE), 2021 IEEE International Conference on
作者: Jiang Lin Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address...
来源: 评论
A Software/Hardware Co-design Local Irregular Sparsity Method for Accelerating CNNs on FPGA  22
A Software/Hardware Co-design Local Irregular Sparsity Metho...
收藏 引用
Workshop Proceedings of the 51st International Conference on Parallel Processing
作者: Jiangwei Shang Zhan Zhang Chuanyou Li Kun Zhang Lei Qian Hongwei Liu Harbin Institute of Technology China Southeast University China State Key Laboratory of Mathematical Engineering and Advanced Computing China
Convolutional neural networks (CNNs) have been widely used in different areas. The success of CNNs comes with a huge amount of parameters and computations, and nowaday CNNs still keep moving toward larger structures. ... 详细信息
来源: 评论
Quantum integrable model for the quantum cohomology/K-theory of flag varieties and the double β-Grothendieck polynomials
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Jirui School of Mathematical Sciences Institute for Advanced Study Key Laboratory of Intelligent Computing and Applications Tongji University Shanghai200092 China
A GL(n) quantum integrable system generalizing the asymmetric five vertex spin chain is shown to encode the ring relations of the equivariant quantum cohomology and equivariant quantum K-theory ring of flag varieties.... 详细信息
来源: 评论
Performance Verification of Smith Predictor Control Using IMC Scheme via Chemical Reaction Networks and DNA Strand Displacement Reaction  9
Performance Verification of Smith Predictor Control Using IM...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Yao, Jingwang Lv, Hui Xiao, Yijun Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110004 China
Biochemical process control is often achieved through feedback control strategies for theoretical analysis and optimization of biochemical reaction processes. Here, the design improves the robustness of the biochemica... 详细信息
来源: 评论