咨询与建议

限定检索结果

文献类型

  • 2,050 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,208 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 321 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 300 篇 电气工程
    • 255 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 194 篇 材料科学与工程(可...
    • 165 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 76 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,742 篇 理学
    • 844 篇 物理学
    • 771 篇 数学
    • 243 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 67 篇 feature extracti...
  • 56 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 28 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 616 篇 state key labora...
  • 165 篇 school of comput...
  • 125 篇 key laboratory o...
  • 118 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 98 篇 state key labora...
  • 93 篇 yunnan observato...
  • 88 篇 school of physic...
  • 87 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 institute of fro...
  • 78 篇 school of physic...
  • 77 篇 school of physic...
  • 73 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 80 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 66 篇 danzengluobu
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.

语言

  • 2,908 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3344 条 记 录,以下是351-360 订阅
排序:
Path planning of UAV base station based on deep reinforcement learning  12
Path planning of UAV base station based on deep reinforcemen...
收藏 引用
12th International Conference on Identification, Information and Knowledge in the internet of Things, IIKI 2021
作者: Yang, Siming Shan, Zheng Cao, Jiang Gao, Yuan Guo, Yang Wang, Ping Wang, Xiaonan Wang, Jing Zhang, Tingting Guo, Jiayu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China Academy of Military Science of the PLA Beijing100091 China Network Technology Research Center of the PLA Beijing100090 China
UAV base station platform has become the current research hotspot of assisting ground base station for wireless *** present, the most important issue is how to make path planning to provide the stable communication gu... 详细信息
来源: 评论
A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning  4th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
4th International Conference on Big Data and Security, ICBDS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Shi, Wenqi Guo, Jiashan School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
To solve the multi-platform user association problem of complex trajectory matching process and high time cost in cross-platform association positioning of instant messaging users, and at the same time make full use o... 详细信息
来源: 评论
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System  3
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
3rd International Conference on advanced Information Science and System, AISS 2021
作者: Liu, Jinjin Chen, Zhifeng Li, Xiaonan Wei, Tongxin School of Computer Science Zhongyuan University of Technology China and State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer Science Zhongyuan University of Technology China School of Cyberspace Security Zhengzhou University China
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
2021 IEEE Conference on Telecommunications, Optics and Computer Science, TOCS 2021
作者: Li, Zhuolun Kang, Fei Yu, Pu Shu, Hui Zhengzhou University School of Software Zhengzhou China Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论
An accurate identification method for network devices based on spatial attention mechanism
收藏 引用
Security and Safety 2023年 第2期2卷 13-29页
作者: Xiuting Wang Ruixiang Li Shaoyong Du Xiangyang Luo Henan Polytechnic Institute Nanyang 473000China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou 450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Institute of Information Engineering State Key Laboratory of Information SecurityBeijing 100093China
With the metaverse being the development direction of the next generation Internet,the popularity of intelligent devices,and the maturity of various emerging technologies,more and more intelligent devices try to conne... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
The use of an oxidized carbon nanotube film to control Zn deposition and eliminate dendrite formation in a Zn ion battery
收藏 引用
新型炭材料(中英文) 2025年 第1期40卷 154-166页
作者: LI Pin-xiang YI Zhe-han WANG Ye-xing HE Chang LIANG Ji HOU Feng Key Laboratory of Advanced Ceramics and Machining Technology of Ministry of Education School of Materials Science and Engineering Tianjin UniversityTianjin 300072China Interdisciplinary Graduate Programme-Collaborative Initiative Graduate CollegeNanyang Technological UniversitySingapore 637371Singapore School of Physical and Mathematical Sciences Nanyang Technological UniversitySingapore 637371Singapore Tianjin Key Laboratory of Low-dimensional Electronic Materials and Advanced Instrumentation Tianjin 300072China
Aqueous zinc ion batteries are regarded as one of the most promising candidates for large-scale energy stor-age due to their high safety,cost-effectiveness,and environ-mental ***,uncontrolled zinc dendrite growth and ... 详细信息
来源: 评论
Preparation and Simulation of Quantum States of Matrices  6
Preparation and Simulation of Quantum States of Matrices
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Liu, Zhengyu Liu, Xiaonan Xie, Haoshan Zhao, Chenyan School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450000 China National Supercomputing Center in Zhengzhou Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450000 China
A basic problem of quantum computing is how to effectively express classical data in quantum systems. This problem is called state preparation problem, and the process of preparing quantum states is called coding. In ... 详细信息
来源: 评论
BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks
BContext2Name: Naming Functions in Stripped Binaries with Mu...
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Bing Xia Yunxiang Ge Ruinan Yang Jiabin Yin Jianmin Pang Chongjun Tang Key Laboratory of Mathematical Engineering and Advanced Computing dept.ZhongYuan University of Technology Zhengzhou China Henan Key Laboratory on Public Opinion Intelligent Analysis dept.ZhongYuan University of Technology Zhengzhou China dept.ZhongYuan University of Technology Zhengzhou China dept.Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Conducting binary function naming helps reverse engineers understand the internal workings of the code and perform malicious code analysis without accessing the source code. However, the loss of debugging information ...
来源: 评论
Multi-image encryption combining four-dimensional chaotic systems and multi-layer embedding
收藏 引用
The European Physical Journal Special Topics 2024年 1-18页
作者: Zhou, Kai Zhang, Jiaxin Xiang, Jianhong Zhong, Yu College of Information and Communication Engineering Harbin Engineering University Harbin China Key Laboratory of Advanced Ship Communication and Information Technology Harbin Engineering University Harbin China Sichuan Key Laboratory of Agile Intelligent Computing Chengdu China
A multi-image encryption technique combining a four-dimensional chaotic system and multi-layer embedding is proposed because images are easily attacked from the outside during network transmission and that traditional...
来源: 评论