咨询与建议

限定检索结果

文献类型

  • 2,050 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,208 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 321 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 300 篇 电气工程
    • 255 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 194 篇 材料科学与工程(可...
    • 165 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 76 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,742 篇 理学
    • 844 篇 物理学
    • 771 篇 数学
    • 243 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 67 篇 feature extracti...
  • 56 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 28 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 616 篇 state key labora...
  • 165 篇 school of comput...
  • 125 篇 key laboratory o...
  • 118 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 98 篇 state key labora...
  • 93 篇 yunnan observato...
  • 88 篇 school of physic...
  • 87 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 institute of fro...
  • 78 篇 school of physic...
  • 77 篇 school of physic...
  • 73 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 80 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 66 篇 danzengluobu
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.

语言

  • 2,908 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3344 条 记 录,以下是391-400 订阅
排序:
Efficient Sparse Attention needs Adaptive Token Release
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Chaoran Zou, Lixin Luo, Dan Tang, Min Luo, Xiangyang Li, Zihao Li, Chenliang Wuhan University China Lehigh University United States Monash University Australia State Key Lab of Mathematical Engineering and Advanced Computing China
In recent years, Large Language Models (LLMs) have demonstrated remarkable capabilities across a wide array of text-centric tasks. However, their 'large' scale introduces significant computational and storage ... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  22
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer engineering
作者: Zejun Wu Li Lu Qiong Jia Zhihao Chen State Key Laboratory of Mathematical Engineering and advanced Computing China National Local Joint Engineering Laboratory of Network Space Security Technology China Beijing Institute of Computer Technology and Application China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Taking Myopic Best Response Against the Hedge Algorithm  42
Taking Myopic Best Response Against the Hedge Algorithm
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Guo, Xinxiang Mu, Yifen School of Mathematical Sciences University of Chinese Academy of Sciences Beijing China Academy of Mathematics and Systems Science The State Key Laboratory of Scientific and Engineering Computing Chinese Academy of Sciences Beijing China Academy of Mathematics and Systems Science The Key Laboratory of Systems and Control Chinese Academy of Sciences Beijing China
With the rapid development of artificial intelligence (AI), the game between the human and machine/AI becomes more and more common. The related theoretical analysis becomes significant and necessary, which however is ... 详细信息
来源: 评论
HHL Analysis and Simulation Verification Based on Origin Quantum Platform  4
HHL Analysis and Simulation Verification Based on Origin Qua...
收藏 引用
2021 4th International Conference on Mechatronics and Computer Technology engineering, MCTE 2021
作者: Liu, Xiaonan Jing, Lina Han, Lin Gao, Jie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Henan Supercomputing Center Zhengzhou University Zhengzhou450001 China
Solving large-scale linear equations is of great significance in many engineering fields, such as weather forecasting and bioengineering. The classical computer solves the linear equations, no matter adopting the elim... 详细信息
来源: 评论
A Cross-Platform Instant Messaging User Association Method Based on Spatio-temporal Trajectory  8th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Li, Lingling Yang, Yang Liu, Fenlin School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Intelligent Engineering Zhengzhou University of Aeronautics Zhengzhou450000 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore
The current research on cross-platform instant messaging user association is mainly divided into two categories: based on user attributes and based on user behavior. Methods based on user attributes mainly identify us... 详细信息
来源: 评论
Designing Uncorrelated Address Constrain for DNA Storage by DMVO Algorithm
收藏 引用
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2022年 第2期19卷 866-877页
作者: Cao, Ben Ii, Xue Zhang, Xiaokang Wang, Bin Zhang, Qiang Wei, Xiaopeng Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Ministry of Education School of Software Engineering Dalian University Dalian116622 China School of Computer Science and Technology Dalian University of Technology Dalian116024 China
At present, huge amounts of data are being produced every second, a situation that will gradually overwhelm current storage technology. DNA is a storage medium that features high storage density and long-term stabilit... 详细信息
来源: 评论
Image Electronic Evidence Screening Based on Improved SSD  6
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Liu, Yafei Jiang, Liehui Liu, Tieming Zhang, Youwei Zhengzhou University Zhongyuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论
Lightweight DCT-Like Domain Forensics Model for Adversarial Example  19th
Lightweight DCT-Like Domain Forensics Model for Adversarial ...
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Junjie Wang, Jinwei Nanjing University of Information Science and Technology Jiangsu210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
Since the emergence of adversarial examples brings great security threat to deep neural network which is widely used in various fields, their forensics become very important. In this paper, a lightweight model for the... 详细信息
来源: 评论
Attentive Hawkes Process Application for Sequential Recommendation  28th
Attentive Hawkes Process Application for Sequential Recomme...
收藏 引用
28th International Conference on Database Systems for advanced Applications, DASFAA 2023
作者: Yu, Shuodian Ma, Li Gao, Xiaofeng Guo, Jianxiong Chen, Guihai Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Advanced Institute of Natural Sciences Beijing Normal University Zhuhai519087 China
Sequential recommendation systems which aim to predict the users’ future clicking items are essential in both research and industry services. Based on the contextual characteristics of users, a large number of existi... 详细信息
来源: 评论
APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite
收藏 引用
Computers, Materials & Continua 2020年 第11期65卷 1795-1807页
作者: Tairan Hu Tianyang Zhou Yichao Zang Qingxian Wang Hang Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China School of Electrical Engineering and Telecommunications UNSW KensingtonNSW 2033Australia
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning und... 详细信息
来源: 评论