咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是301-310 订阅
排序:
ProtoMix: Learnable Data Augmentation on Few-Shot Features with Vector Quantization in CTR Prediction  9th
ProtoMix: Learnable Data Augmentation on Few-Shot Features ...
收藏 引用
19th International Conference on advanced Data Mining and Applications, ADMA 2023
作者: Zhao, Haijun Xu, Ronghai Wang, Chang-Dong Jiang, Ying School of Computer Science and Engineering Sun Yat-sen University Guangdong Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
Click-Through Rate (CTR) prediction is a critical problem in recommendation systems since it involves enormous business interest. Most deep CTR model follows an Embedding & Feature Interaction paradigm. However, t... 详细信息
来源: 评论
Edge-Driven Industrial computing Power Networks: Digital Twin-Empowered Service Provisioning by Hybrid Soft Actor-Critic
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8095-8109页
作者: Zhang, Long Song, Deng-Ao Zhang, Hongliang Tian, Ni Zhuang, Zirui Niyato, Dusit Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
With the proliferation of data-intensive industrial applications, the collaboration of computing powers among standalone edge servers is vital to provision such services for smart devices. In this paper, we propose an... 详细信息
来源: 评论
ALGCN: Accelerated Light Graph Convolution Network for Recommendation  28th
ALGCN: Accelerated Light Graph Convolution Network for Reco...
收藏 引用
28th International Conference on Database Systems for advanced Applications, DASFAA 2023
作者: Xu, Ronghai Zhao, Haijun Li, Zhi-Yuan Wang, Chang-Dong School of Computer Science and Engineering Sun Yat-sen University Guangdong Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Beijing China
Recently, Graph Convolutional Network (GCN) has been widely applied in the field of collaborative filtering (CF) with tremendous success, since its message-passing mechanism can efficiently aggregate neighborhood info... 详细信息
来源: 评论
Obtaining Electromagnetic Properties of Multi-Type Media in Realistic Environments:State-of-the-Art and Prospects
收藏 引用
China Communications 2025年 第1期22卷 25-40页
作者: Guo Lantu Guan Ke Liu Ting He Danping Zhang Haixia Zhu Qiuming Lu Jun Zhang Minggao China Research Institute of Radiowave Propagation Qingdao 266107China State Key Laboratory of Advanced Rail Autonomous Operation Beijing Jiaotong UniversityBeijing 100044China School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China School of Control Science and Engineering Shandong UniversityJinan 250061China Shandong Key Laboratory of Intelligent Communication and Sensing-Computing Integration Jinan 250061China College of Electronic and Information Engineering Nanjing University of Aeronautics and AstronauticsNanjing 210016China Jiaxing University Jiaxing 314001China
To meet the requirements of electromagnetic(EM)theory and applied physics,this study presents an overview of the state-of-the-art research on obtaining the EM properties of media and points out potential solutions tha... 详细信息
来源: 评论
Similarity Measure for Smart Contract Bytecode Based on CFG Feature Extraction  4
Similarity Measure for Smart Contract Bytecode Based on CFG ...
收藏 引用
4th International Conference on Computer Information Science and Artificial Intelligence, CISAI 2021
作者: Zhu, DI Pang, Jianmin Zhou, Xin Han, Wenjie Zhengzhou University Zhengzhou450002 China Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
As the mainstream of smart contract research, most Ethereum smart contracts do not open their source code, and the bytecode of smart contracts has attracted the attention of researchers. Based on the similarity measur... 详细信息
来源: 评论
Pixel+ and Pixel++: compact and efficient forward-secure multi-signatures for PoS blockchain consensus  24
Pixel+ and Pixel++: compact and efficient forward-secure mul...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Jianghong Wei Guohua Tian Ding Wang Fuchun Guo Willy Susilo Xiaofeng Chen State Key Laboratory of Integrated Service Networks (ISN) Xidian University and State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Integrated Service Networks (ISN) Xidian University College of Cyber Science Nankai University School of Computing and Information Technology University of Wollongong
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se...
来源: 评论
Pruned-F1DCN: A lightweight network model for traffic classification  22
Pruned-F1DCN: A lightweight network model for traffic classi...
收藏 引用
Proceedings of the 2022 International Conference on Cyber Security
作者: Ruo nan Wang Jin long Fei Rong kai Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China China
With the continuous development of deep learning, deep neural networks are gradually applied to traffic classification problems. However, the large network structure and parameter number of deep neural networks hinder... 详细信息
来源: 评论
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection
arXiv
收藏 引用
arXiv 2024年
作者: Song, Chengyu Ma, Linru Zheng, Jianming Liao, Jinzhi Kuang, Hongyu Yang, Lin Systems Engineering Institute Academy of Military Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China National University of Defense Technology National Key Laboratory of Information Systems Engineering Changsha China
Log-based insider threat detection (ITD) detects malicious user activities by auditing log entries. Recently, Large Language Models (LLMs) with strong common sense knowledge are emerging in the domain of ITD. Neverthe... 详细信息
来源: 评论
Disentangling Ensemble Models on Adversarial Generalization in Image Classification
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
International Conference on Electronic engineering and Informatics (EEI)
作者: Chenwei Li Mengyuan Pan Bo Yang Hengwei Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp...
来源: 评论
A Binary Function Name Prediction Method Based on Variable Alignment and Translation Model  23
A Binary Function Name Prediction Method Based on Variable A...
收藏 引用
Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application
作者: Bing Xia Jiabin Yin Yunxiang Ge Ruinan Yang Key Laboratory of Mathematical Engineering and Advanced Computing ZhongYuan University of Technology China Henan Key Laboratory on Public Opinion Intelligent Analysis ZhongYuan University of Technology China ZhongYuan University of Technology China
Binary function naming is a code analysis task that generates functional descriptions of functions, and its results can be applied in the fields of malicious code analysis, vulnerability causation analysis, and algori...
来源: 评论