咨询与建议

限定检索结果

文献类型

  • 2,050 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,208 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 321 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 300 篇 电气工程
    • 255 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 194 篇 材料科学与工程(可...
    • 165 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 76 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,742 篇 理学
    • 844 篇 物理学
    • 771 篇 数学
    • 243 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 67 篇 feature extracti...
  • 56 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 28 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 616 篇 state key labora...
  • 165 篇 school of comput...
  • 125 篇 key laboratory o...
  • 118 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 98 篇 state key labora...
  • 93 篇 yunnan observato...
  • 88 篇 school of physic...
  • 87 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 institute of fro...
  • 78 篇 school of physic...
  • 77 篇 school of physic...
  • 73 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 80 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 66 篇 danzengluobu
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.

语言

  • 2,908 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3344 条 记 录,以下是461-470 订阅
排序:
Malware analysis platform based on software gene for cyberspace security practice teaching  2
Malware analysis platform based on software gene for cybersp...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Liu, Fudong Zhang, Ping Hou, Yifan Wang, Lixin Shan, Zheng Wang, Junchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r... 详细信息
来源: 评论
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Embedding Attribute and Relation Information for Person Entity Alignment  6
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Wang, Can Liu, Xiaonan Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
Attention-aligned mean-teacher learning for unsupervised domain adaptive person re-ID
收藏 引用
Science China Technological Sciences 2025年
作者: You LYU Zhen ZHANG Guoliang KANG Wei WEI Institute of Artificial Intelligence Beihang University Key Laboratory of Mathematics Informatics Behavioral Semantics Ministry of Education Beihang University State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University School of Automation Science and Electrical Engineering Beihang University AVICAS Generic Technology Co. Ltd Zhongguancun Laboratory School of Mathematics Sciences Beihang University
In recent years, artificial intelligence has fueled the development of numerous applications [1, 2]. Person re-identification (re-ID) is a typical artificial intelligence system designed to automatically retrieve imag...
来源: 评论
Over-the-RIS Modulation: A Reconfigurable Intelligent Surface Assisted Modulation Design  8
Over-the-RIS Modulation: A Reconfigurable Intelligent Surfac...
收藏 引用
8th International Conference on Communication, Image and Signal Processing, CCISP 2023
作者: Huang, Yiqian Zammit, Saviour Yang, Ping Xiao, Yue Zhang, Bo Chen, Jienan Xiang, Wei University of Electronic Science and Technology of China National Key Laboratory of Sciencec and Technology on Communications Sichuan China University of Malta Department of Communications and Computer Engineering Msida Malta 32806 Troops Beijing China School of Computing Engineering and Mathematical Sciences La Trobe University Melbourne Australia
This paper proposes an improved over the air modulation (OTAM) scheme by using the powerful reconfigurable intelligent surfaces (RISs), namely over-the-RIS modulation (ORM). In the design framework, we reconstruct mul... 详细信息
来源: 评论
New advanced computing Architecture for Cryptography Design and Analysis by D-Wave Quantum Annealer
收藏 引用
Tsinghua Science and Technology 2022年 第4期27卷 751-759页
作者: Xiangmin Ji Baonan Wang Feng Hu Chao Wang Huanguo Zhang College of Computer Information Science Fujian Agriculture and Forestry UniversityFuzhou 350002China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China College of Computer Science and Technology Shanghai University of Electric PowerShanghai 200090China International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai UniversityShanghai 200444 State Key Laboratory of Cryptology Beijing 100878China laboratory of Specialty Fiber Optics and Optical Access Networks Joint International Research Laboratory of Specialty Fiber Optics and Advanced CommunicationShanghai UniversityShanghai 200444 State Key Laboratory of Cryptology Beijing 100878and also with Center for Quantum ComputingPeng Cheng LaboratoryShenzhen 518000China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072
Universal quantum computers are far from achieving practical *** D-Wave quantum computer is initially designed for combinatorial ***,exploring the potential applications of the D-Wave device in the field of cryptograp... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Zuomin Lu, Wei Luo, Xiangyang Wang, Qian Cao, Xiaochun The School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Institute of Artificial Intelligence Sun Yat-sen University Guangzhou510006 China The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China The School of Cyber Science and Engineering Wuhan University Wuhan430072 China The School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen518107 China
—The misuse of deep learning-based facial manipulation poses a potential threat to civil rights. To prevent this fraud at its source, proactive defense technology was proposed to disrupt the manipulation process by a... 详细信息
来源: 评论
Generalized-Extended-State-Observer and Equivalent-Input-Disturbance Methods for Active Disturbance Rejection: Deep Observation and Comparison
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第4期10卷 957-968页
作者: Jinhua She Kou Miyamoto Qing-Long Han Min Wu Hiroshi Hashimoto Qing-Guo Wang School of Engineering Tokyo University of TechnologyHachiojiTokyo 192-0982Japan K.Miyamoto is with the Institute of Technology Shimizu CorporationKotoTokyo 135-0044Japan School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourneVIC 3122Australia School of Automation China University of GeosciencesWuhan 430074 Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of EducationWuhan 430074China School of Industrial Technology Advanced Institute of Industrial TechnologyTokyo 140-0011Japan Institute of Artificial Intelligence and Future Networks Beijing Normal UniversityZhuhai 519087 Guangdong Key Lab of AI and Multi-Modal Data Processing Guangdong Provincial Key Laboratory of Interdisciplinary Research and Application for Data Science BNUHKBU United International College Zhuhai 519087China
Active disturbance-rejection methods are effective in estimating and rejecting disturbances in both transient and steady-state *** paper presents a deep observation on and a comparison between two of those methods:the... 详细信息
来源: 评论
Positive-Unlabeled Learning with Field of View Consistency for Histology Image Segmentation  1
收藏 引用
13th International Conference on Frontier computing, FC 2023
作者: Jia, Xiaoqi Fu, Chong Hou, Jiaxin Qin, Wenjian School of Computer Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Shenzhen College of Advanced Technology University of Chinese Academy of Sciences Shenzhen518055 China
Histology image annotation is costly and time-consuming. Utilizing Positive and Unlabeled (PU) data for model training offers a more resource-efficient alternative. However, previous methods for PU learning suffer fro... 详细信息
来源: 评论