咨询与建议

限定检索结果

文献类型

  • 2,058 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,203 篇 工学
    • 1,189 篇 计算机科学与技术...
    • 980 篇 软件工程
    • 321 篇 信息与通信工程
    • 297 篇 电子科学与技术(可...
    • 296 篇 电气工程
    • 257 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 187 篇 材料科学与工程(可...
    • 166 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 74 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,741 篇 理学
    • 843 篇 物理学
    • 769 篇 数学
    • 243 篇 生物学
    • 235 篇 统计学(可授理学、...
    • 222 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 387 篇 管理学
    • 240 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 619 篇 state key labora...
  • 174 篇 school of comput...
  • 128 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 school of physic...
  • 74 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,916 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3352 条 记 录,以下是541-550 订阅
排序:
MaintaAvatar: A Maintainable Avatar Based on Neural Radiance Fields by Continual Learning  39
MaintaAvatar: A Maintainable Avatar Based on Neural Radiance...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Gu, Shengbo Qiu, Yu-Kun Tang, Yu-Ming Wu, Ancong Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Peng Cheng Laboratory Shenzhen China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
The generation of a virtual digital avatar is a crucial research topic in the field of computer vision. Many existing works utilize Neural Radiance Fields (NeRF) to address this issue and have achieved impressive resu... 详细信息
来源: 评论
Estimating Multiple Socioeconomic Attributes via Home Location-A Case Study in China
收藏 引用
Journal of Social computing 2021年 第1期2卷 71-88页
作者: Shichang Ding Xin Gao Yufan Dong Yiwei Tong Xiaoming Fu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 276800China Department of Sociology Tsinghua UniversityBeijing 100085China Institute of Computer Science University of GottingenGottingen 37077Germany Shanghai Hejin Information Technology Company Shanghai 200100China
Inferring people’s Socioeconomic Attributes(SEAs),including income,occupation,and education level,is an important problem for both social sciences and many networked applications like targeted advertising and persona... 详细信息
来源: 评论
RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Xinquan Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China State Key Laboratory of Internet of Things for Smart City The Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 China
Multimodal fake news detection aims to automatically identify real or fake news, thereby mitigating the adverse effects caused by such misinformation. Although prevailing approaches have demonstrated their effectivene... 详细信息
来源: 评论
Adversarial Example Attacks Against Intelligent Malware Detection: A Survey
Adversarial Example Attacks Against Intelligent Malware Dete...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xuyan Qi Yonghe Tang Huanwei Wang Tieming Liu Jing Jing State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin... 详细信息
来源: 评论
An Instance-Level Motion-Aware Graph Model for Multi-target Multi-camera Tracking
An Instance-Level Motion-Aware Graph Model for Multi-target ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xiaotong Fan Huicheng Zheng School of Computer Science and Engineering Sun Yat-sen University China Guangdong Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Multi-target multi-camera tracking (MTMCT), focusing on inferring trajectory across multiple surveillance videos, is holding significant practical utility. While numerous studies aim to learn visual features robust to... 详细信息
来源: 评论
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by Distributed Ledger Technology and Internet of Things  23
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gao, Haoyu Li, Leixiao Lin, Hao Chang, Xiangyang Wan, Jianxiong Li, Jie Zhu, Fangyuan College of Data Science and Application Inner Mongolia University of Technology China Inner Mongolia Autonomous Reg. Eng. and Technol. Research Center of Big Data Based Software Service China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
P2P Botnet is famous for the resilience against termination. However, its dependence on Neighbor List (NL) makes it susceptible to infiltration and poison, also leading to a dearth of adequate protection of Botmaster&... 详细信息
来源: 评论
Exploring light-cone distribution amplitudes from quantum computing
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2023年 第8期66卷 57-65页
作者: Tianyin Li Xingyu Guo Wai Kin Lai Xiaohui Liu Enke Wang Hongxi Xing Dan-Bo Zhang Shi-Liang Zhu Guangdong Provincial Key Laboratory of Nuclear Science Institute of Quantum MatterSouth China Normal UniversityGuangzhou 510006China Guangdong-Hong Kong Joint Laboratory of Quantum Matter Southern Nuclear Science Computing Center South China Normal University.Guangzhou 510006China Department of Physics and Astronomy University of CaliforniaLos Angeles 90095USA Center of Advanced Quantum Studies Department of PhysicsBeijing Normal UniversityBejing 100875China Center for High Energy Physics Peking UniversityBeijing 100871China Guangdong-Hong Kong Joint Laboratory of Quantum Matter Frontier Research Institute for PhysicsSouth China Normal UniversityGuangzhou 510006China Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials School of Physics and Telecommunication EngineeringSouth China Normal UniversityGuangzhou 510006China
Light-cone distribution amplitudes(LCDAs)are essential nonperturbative quantities for theoretical predictions of exclusive highenergy processes in quantum chromodynamics(QCD).We demonstrate the prospect of calculating... 详细信息
来源: 评论
Machine learning study on time-temperature-transformation diagram of carbon and low-alloy steel
收藏 引用
Journal of Iron and Steel Research International 2023年 第5期30卷 1032-1041页
作者: Xiao-ya Huang Biao Zhang Qiang Tian Hong-hui Wu Bin Gan Zhong-nan Bi Wei-hua Xue Asad Ullah Hao Wang School of Materials Science and Engineering University of Science and Technology BeijingBeijing 100083China School of Materials Science and Engineering Beihang UniversityBeijing 100191China High Temperature Materials Research Division Central Iron and Steel Research InstituteBeijing 100081China Beijing Advanced Innovation Center for Materials Genome Engineering Collaborative Innovation Center of Steel TechnologyUniversity of Science and Technology BeijingBeijing 100083China Beijing Key Laboratory of Advanced High Temperature Materials Central Iron and Steel Research InstituteBeijing 100081China School of Materials Science and Engineering Liaoning Technical UniversityFuxin 123099LiaoningChina Department of Mathematical Sciences Karakoram International UniversityGilgit-Baltistan 15100Pakistan
Time-temperature-transformation(TTT)diagram plays a critical role in designing appropriate heat treatment process of steels by describing the relationship among holding time,temperature,and quantities of phase *** pre... 详细信息
来源: 评论
MDFA: A Malware Detection Framework Based on Attention Mechanism with Bi-LSTM
MDFA: A Malware Detection Framework Based on Attention Mecha...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xuyan Qi Huanwei Wang Yonghe Tang Wei Liu Jiangtao Xie State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
As the existing malware intelligent detection methods have shortcomings and low accuracy of manual feature extraction and feature processing, a Malware Detection Framework with Attention mechanism based on Bi-directio... 详细信息
来源: 评论
Exploration and research of blended learning in the "principles of computer organization"  2
Exploration and research of blended learning in the "princip...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Hou, Yifan Wang, Wei Liu, Fudong Shan, Zheng Wang, Junchao Wang, Lixin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
The'Principles of Computer Organization' is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the 'Principles of Computer Organizati... 详细信息
来源: 评论