咨询与建议

限定检索结果

文献类型

  • 2,050 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,208 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 321 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 300 篇 电气工程
    • 255 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 194 篇 材料科学与工程(可...
    • 165 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 76 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,742 篇 理学
    • 844 篇 物理学
    • 771 篇 数学
    • 243 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 67 篇 feature extracti...
  • 56 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 28 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 616 篇 state key labora...
  • 165 篇 school of comput...
  • 125 篇 key laboratory o...
  • 118 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 98 篇 state key labora...
  • 93 篇 yunnan observato...
  • 88 篇 school of physic...
  • 87 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 institute of fro...
  • 78 篇 school of physic...
  • 77 篇 school of physic...
  • 73 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 80 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 66 篇 danzengluobu
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.

语言

  • 2,908 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3344 条 记 录,以下是361-370 订阅
排序:
A pretrained transformer model for decoding individual glucose dynamics from continuous glucose monitoring data
收藏 引用
National Science Review 2025年 第5期12卷 362-381页
作者: Yurun Lu Dan Liu Zhongming Liang Rui Liu Pei Chen Yitong Liu Jiachen Li Zhanying Feng Lei M.Li Bin Sheng Weiping Jia Luonan Chen Huating Li Yong Wang Center for Excellence in Mathematical Sciences National Center for Mathematics and Interdisciplinary Sciences Hua Loo-Keng Center for Mathematical Sciences Key Laboratory of Management Decision and Information System Academy of Mathematics and Systems ScienceChinese Academy of Sciences School of Mathematics University of Chinese Academy of SciencesChinese Academy of Sciences Department of Endocrinology and Metabolism Shanghai Sixth People's Hospital Affiliated to Shanghai Jiao Tong University School of MedicineShanghai Diabetes InstituteShanghai Clinical Center for Diabetes Shanghai Key Laboratory of Diabetes Mellitus Key Laboratory of Systems Health Science of Zhejiang Province School of Life ScienceHangzhou Institute for Advanced StudyUniversity of Chinese Academy of Sciences BGI-Research School of Mathematics South China University of Technology Department of Statistics Department of Biomedical Data Science Bio-X ProgramStanford University Department of Computer Science and Engineering Shanghai Jiao Tong University State Key Laboratory of Cell Biology Center for Excellence in Molecular Cell Science Shanghai Institute of Biochemistry and Cell Biology Chinese Academy of Sciences Guangdong Institute of Intelligence Science and Technology Pazhou Laboratory (Huangpu)
Continuous glucose monitoring(CGM) technology has grown rapidly to track real-time blood glucose levels and trends with improved sensor accuracy. The ease of use and wide availability of CGM will facilitate safe and e... 详细信息
来源: 评论
A Review on IoT Botnet  2021
A Review on IoT Botnet
收藏 引用
2nd International Conference on computing and Data Science, CONF-CDS 2021
作者: Zhao, Hao Shu, Hui Xing, Ying State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China
The rapid development of the Internet of Things (IoT) also generates security threats that cannot be ignored. This paper lists the development history of botnets, introduces representative IoT botnets, and reveals the... 详细信息
来源: 评论
Optimal Tracking Performance of Networked Control Systems Under DoS and Its Applications
Optimal Tracking Performance of Networked Control Systems Un...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Ren, Xinyu Li, Bo Zhao, Feng Chen, Xiangyong Zhang, Xianhe Jiang, Xiaowei School of Automation China University of Geosciences Hubei Key Laboratory of Advanced Control and Intelligent Automation of Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China School of Finance Anhui University of Finance and Economics Bengbu China Key Laboratory of Complex systems and Intelligent Computing in Universities of Shandong Linyi University Linyi China School of Automation and Electrical Engineering Key Laboratory of Complex systems and Intelligent Computing in Universities of Shandong Linyi University Linyi China School of Electrical Engineering and Automation Hubei Normal University Huangshi China
This paper investigates the optimal tracking performance (OTP) of multiple-input multiple-output (MIMO) discrete networked control systems (NCSs) under the influence of Denial of Service (DoS) attack, channel noise, a... 详细信息
来源: 评论
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Jinwei Wu, Hao Wang, Haihua Zhang, Jiawei Luo, Xiangyang Ma, Bin Nanjing University of Information Science and Technology China State Key Laboratory of Mathematical Engineering and Advanced Computing China Qilu University of Technology China
The vulnerability of Deep Neural Networks (DNNs) to adversarial examples has been confirmed. Existing adversarial defenses primarily aim at preventing adversarial examples from attacking DNNs successfully, rather than... 详细信息
来源: 评论
On tuning of ADRC with competing design indices:a quantitative study
收藏 引用
Control Theory and Technology 2023年 第1期21卷 16-33页
作者: Yutao Zhao Yi Huang Zhiqiang Gao Key Laboratory of Systems and Control Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China Department of Electrical Engineering and Computer Science Center for Advanced Control TechnologiesCleveland State UniversityClevelandOH 44115USA
Controller optimization has mostly been done by minimizing a certain single cost *** practice,however,engineers must contend with multiple and conflicting considerations,denoted as design indices(DIs)in this *** to ac... 详细信息
来源: 评论
Rotation Transformation: A Method to Improve the Transferability of Adversarial Examples
Rotation Transformation: A Method to Improve the Transferabi...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Li, Zheming Zhang, Hengwei Ma, Junqiang Yang, Bo Li, Chenwei Li, Jingwen Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China PLA Army Staff Department Beijing China
Convolutional neural network models are fragile to adversarial examples. Adding disturbances that humans cannot observe in clean images can make the model classification error. Among the adversarial attack methods, wh... 详细信息
来源: 评论
Publicly Verifiable Private Set Intersection from Homomorphic Encryption  8th
Publicly Verifiable Private Set Intersection from Homomorph...
收藏 引用
8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022
作者: Jiang, Yuting Wei, Jianghong Pan, Jing Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Guangzhou Institute of Technology Xidian University Guanzhou510555 China
Private Set Intersection (PSI) enables two mistrusting parties to securely evaluate the intersection of their private inputs, without revealing any additional information. With its wide application in privacy protecti... 详细信息
来源: 评论
A Formal Verification Method for Security Protocol Implementations Based on Model Learning and Tamarin  6
A Formal Verification Method for Security Protocol Implement...
收藏 引用
2021 6th International Symposium on Advances in Electrical, Electronics and Computer engineering, ISAEECE 2021
作者: Zhang, Xieli Zhu, Yuefei Gu, Chunxiang Miao, Xuyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan450002 China
The verification of security protocol implementations is notoriously difficult and important. In this paper, combining with the model learning using Tamarin, a formal verification tool of protocol specification, a for... 详细信息
来源: 评论
Versatility of π-d Conjugated Coordination Nickel Metal-Organic Frameworks as Electrode Materials of Metal-Ion Batteries
收藏 引用
Energy Material Advances 2024年 第1期5卷 120-132页
作者: Zaohong Zhang Kaihui Xu Jing Yang Zhuoyu Ji Yunchen Ge Zhicong Shi Yongwei Zhang Kai Zhang Chuan Wu Jia Hong Pan State Key Laboratory of Featured Metal Materials and Life-Cycle Safety for Composite Structures School of ResourcesEnvironments and MaterialsGuangxi UniversityNanning 530004China Low Carbon Energy Process Intensification Research Institute and MOE Key Laboratory of Resources and Environmental Systems Optimization North China Electric Power UniversityBeijing 102206China Institute of High Performance Computing Agency for ScienceTechnology and Research(A*STAR)Singapore 138632Singapore Guangxi Key Laboratory of Manufacturing Systems and Advanced Manufacturing Technology Guilin University of Electronic TechnologyGuilin 541004China School of Materials Science and Engineering Beijing Institute of TechnologyBeijing 100081China Beijing Key Laboratory of Environmental Science and Engineering School of Materials Science and EngineeringBeijing Institute of TechnologyBeijing 100081China Yangtze Delta Region Academy of Beijing Institute of Technology Jiaxing 314019China
Metal-organic frameworks have emerged as promising electrode materials for metal-ion batteries due to their superior structural ***,they face challenges such as poor reversibility and easy degradation during electroch... 详细信息
来源: 评论
Medical image registration and its application in retinal images:a review
收藏 引用
Visual computing for Industry,Biomedicine,and Art 2024年 第1期7卷 142-164页
作者: Qiushi Nie Xiaoqing Zhang Yan Hu Mingdao Gong Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Center for High Performance Computing and Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Singapore Eye Research Institute Singapore 169856Singapore State Key Laboratory of Ophthalmology Optometry and Visual ScienceEye HospitalWenzhou Medical UniversityWenzhou 325027China
Medical image registration is vital for disease diagnosis and treatment with its ability to merge diverse informa-tion of images,which may be captured under different times,angles,or *** several surveys have reviewed ... 详细信息
来源: 评论