咨询与建议

限定检索结果

文献类型

  • 2,076 篇 期刊文献
  • 1,296 篇 会议
  • 3 册 图书

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,198 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 987 篇 软件工程
    • 328 篇 信息与通信工程
    • 300 篇 电气工程
    • 292 篇 电子科学与技术(可...
    • 262 篇 控制科学与工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 178 篇 材料科学与工程(可...
    • 174 篇 光学工程
    • 142 篇 机械工程
    • 137 篇 生物医学工程(可授...
    • 109 篇 力学(可授工学、理...
    • 101 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 63 篇 交通运输工程
    • 54 篇 安全科学与工程
  • 1,751 篇 理学
    • 849 篇 物理学
    • 764 篇 数学
    • 243 篇 生物学
    • 229 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 94 篇 地球物理学
  • 393 篇 管理学
    • 244 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 95 篇 医学
    • 77 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 52 篇 training
  • 50 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 26 篇 computational mo...
  • 24 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting

机构

  • 623 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 76 篇 school of physic...
  • 73 篇 national space s...
  • 71 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,791 篇 英文
  • 523 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3375 条 记 录,以下是581-590 订阅
排序:
Integrating KNN and Gradient Boosting Decision Tree for Recommendation
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Qiming Du Nan Li Shudan Yang Daozhu Sun Wenfu Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论
An overview on the designs of distributed observers in LTI multi-agent systems
收藏 引用
Science China(Technological Sciences) 2021年 第11期64卷 2337-2346页
作者: PEI YingQing GU HaiBo LIU KeXin LU JinHu Key Laboratory of Systems and Control Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain ComputingBeihang UniversityBeijing 100191China
With the rapid development of information technologies and cloud computing, sensor networks play an increasingly important role in our society. Over the past few decades, distributed observer theory has attracted unpr... 详细信息
来源: 评论
Research on Security Protocol Analysis Tool SmartVerif
Research on Security Protocol Analysis Tool SmartVerif
收藏 引用
2021 International Conference on Computer Technology, Information engineering and Electron Materials, CTIEEM 2021
作者: Lu, Siqi Han, Qingdi Miao, Xuyang Liu, Yubo State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450000 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450000 China Department of Information Science and Engineering Ocean University of China Shandong Qingdao266100 China
Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol... 详细信息
来源: 评论
Progressive Pretext Task Learning for Human Trajectory Prediction
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Xiaotong Liang, Tianming Lai, Jianhuang Hu, Jian-Fang School of Computer Science and Engineering Sun Yat-sen University China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Human trajectory prediction is a practical task of predicting the future positions of pedestrians on the road, which typically covers all temporal ranges from short-term to long-term within a trajectory. However, exis... 详细信息
来源: 评论
Differentiable Gated Autoencoders for Unsupervised Feature Selection
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Zebin Bian, Jintang Qiao, Bo Xie, Xiaohua School of Computer Science and Engineering Sun Yat-sen University China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Unsupervised feature selection (UFS) aims to identify a subset of the most informative features from high-dimensional data without labels. However, most existing UFS methods cannot adequately capture the intricate non... 详细信息
来源: 评论
Dendritic integration inspired artificial neural networks capture data correlation  24
Dendritic integration inspired artificial neural networks ca...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Chongming Liu Jingyang Ma Songting Li Douglas Zhou School of Mathematical Sciences and Institute of Natural Sciences Shanghai Jiao Tong University Shanghai China School of Mathematical Sciences and Institute of Natural Sciences and Ministry of Education Key Laboratory of Scientific and Engineering Computing Shanghai Jiao Tong University Shanghai China School of Mathematical Sciences and Institute of Natural Sciences and Ministry of Education Key Laboratory of Scientific and Engineering Computing and Shanghai Frontier Science Center of Modern Analysis Shanghai Jiao Tong University Shanghai China
Incorporating biological neuronal properties into Artificial Neural Networks (ANNs) to enhance computational capabilities is under active investigation in the field of deep learning. Inspired by recent findings indica...
来源: 评论
Siamese Learning with Joint Alignment and Regression for Weakly-Supervised Video Paragraph Grounding
Siamese Learning with Joint Alignment and Regression for Wea...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Chaolei Tan Jianhuang Lai Wei-Shi Zheng Jian-Fang Hu School of Computer Science and Engineering Sun Yat-sen University China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Video Paragraph Grounding (VPG) is an emerging task in video-language understanding, which aims at localizing multiple sentences with semantic relations and temporal or-der from an untrimmed video. However, existing V... 详细信息
来源: 评论
Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 273-295页
作者: Yan Liu Wenyuan Fang Qiang Wei Yuan Zhao Liang Wang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China The School of Computing Newcastle UniversityNewcastle upon TyneNE45TGUK
Code defects can lead to software vulnerability and even produce vulnerability *** research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to som... 详细信息
来源: 评论
Circular Decomposition and Cross-Modal Recombination for Multimodal Sentiment Analysis
Circular Decomposition and Cross-Modal Recombination for Mul...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haijian Liang Weicheng Xie Xilin He Siyang Song Linlin Shen School of Computer Science & Software Engineering Computer Vision Institue Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University School of Computing and Mathematical Sciences University of Leicester National Engineering Laboratory for Big Data System Computing Technology Shenzhen University
Multimodal Sentiment Analysis is a burgeoning research area, leveraging various modalities to predict the sentiment score. Nevertheless, previous studies have disregarded the impact of noise interference on specific m...
来源: 评论
Learning a Coordinated Network for Detail-Refinement Multiexposure Image Fusion
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2023年 第2期33卷 713-727页
作者: Li, Jiawei Liu, Jinyuan Zhou, Shihua Zhang, Qiang Kasabov, Nikola K. Ministry of Education School of Software Engineering Dalian University Key Laboratory of Advanced Design and Intelligent Computing Dalian116622 China Dalian University of Technology School of Software Technology Dalian116024 China Auckland University of Technology Knowledge Engineering and Discovery Research Institute Auckland1010 New Zealand Ulster University Intelligent Systems Research Center LondonderryBT52 1SA United Kingdom
Nowadays, deep learning has made rapid progress in the field of multi-exposure image fusion. However, it is still challenging to extract available features while retaining texture details and color. To address this di... 详细信息
来源: 评论