咨询与建议

限定检索结果

文献类型

  • 2,076 篇 期刊文献
  • 1,296 篇 会议
  • 3 册 图书

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,198 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 987 篇 软件工程
    • 328 篇 信息与通信工程
    • 300 篇 电气工程
    • 292 篇 电子科学与技术(可...
    • 262 篇 控制科学与工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 178 篇 材料科学与工程(可...
    • 174 篇 光学工程
    • 142 篇 机械工程
    • 137 篇 生物医学工程(可授...
    • 109 篇 力学(可授工学、理...
    • 101 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 63 篇 交通运输工程
    • 54 篇 安全科学与工程
  • 1,751 篇 理学
    • 849 篇 物理学
    • 764 篇 数学
    • 243 篇 生物学
    • 229 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 94 篇 地球物理学
  • 393 篇 管理学
    • 244 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 95 篇 医学
    • 77 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 52 篇 training
  • 50 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 26 篇 computational mo...
  • 24 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting

机构

  • 623 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 76 篇 school of physic...
  • 73 篇 national space s...
  • 71 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,791 篇 英文
  • 523 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3375 条 记 录,以下是671-680 订阅
排序:
Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance  23
Research on Intelligent Joint Detection Technology for Appli...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in computing and Communications, TrustCom 2024
作者: Zhang, Ruoding Liu, Tao Shi, Qifeng Zhang, Yan Song, Xiaoyi Geng, Xinrui Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Miit Chinese Academy of Information and Communications Technologys Key Laboratory of Mobile Application Innovation and Governance Technology Beijing China Xi'an Jiaotong-Liverpool University School of Ai and Advanced Computing Suzhou China
The surge in mobile applications has introduced substantial challenges in protecting user privacy. Despite the global enactment of privacy protection laws, ensuring compliance in mobile applications remains complex. W... 详细信息
来源: 评论
A Heuristic Sparsification Method to Improve the Performance of Neural Networks on Autism Spectrum Disorder Identification Tasks  13
A Heuristic Sparsification Method to Improve the Performance...
收藏 引用
13th International Conference on Information Science and Technology, ICIST 2023
作者: Zhang, Fangyu Wei, Yanjie Lin, Zhenli Pan, Yi Liu, Jin Centre for High Performance Computing Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Department of Ophthalmology Shenzhen University General Hospital Shenzhen China Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China School of Computer Science and Engineering Central South University Changsha China
Deep learning (DL) has been widely used in the detection of neurological diseases such as Autism spectrum disorder (ASD). Most studies in this field manually designed and adjusted the hyperparameters of DL models, but... 详细信息
来源: 评论
Image encryption based on 2D-SAHM chaotic system and a novel DNA operation rule
收藏 引用
The European Physical Journal Special Topics 2023年 第6期233卷 1311-1330页
作者: Huang, Lilian Ye, Youxin Liu, Yang College of Information and Communication Engineering Harbin Engineering University Harbin China Key Laboratory of Advanced Marine Communication and Information Technology Harbin Engineering University Ministry of Industry and Information Technology Harbin China National Key Laboratory of Underwater Acoustic Technology Harbin Engineering University Harbin China Sichuan Key Laboratory of Agile Intelligent Computing Southwest China Institute of Electronic Technology Chengdu China
With the continuous development of information technology, ensuring information security has become an important issue. As a widely used multimedia tool, images often face the risk of leakage. Therefore, this paper pr...
来源: 评论
Single-View Scene Point Cloud Human Grasp Generation
Single-View Scene Point Cloud Human Grasp Generation
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Yan-Kang Wang Chengyi Xing Yi-Lin Wei Xiao-Ming Wu Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China Stanford University Stanford CA Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
In this work, we explore a novel task of generating human grasps based on single-view scene point clouds, which more accurately mirrors the typical real-world situation of observing objects from a single viewpoint. Du... 详细信息
来源: 评论
ODCP: Optimizing Data Caching and Placement in Distributed File System Using Erasure Coding  17th
ODCP: Optimizing Data Caching and Placement in Distributed F...
收藏 引用
17th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2020
作者: Wu, Shuhan Li, Yunchun Yang, Hailong Luan, Zerong Li, Wei School of Computer Science and Engineering Beihang University Beijing100191 China College of Life Sciences and Bioengineering Beijing University of Technology Beijing100083 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Many current distributed file systems use erasure-coding based data redundancy techniques to improve the reliability of data storage. Such techniques can significantly improve the effective storage utilization. Howeve... 详细信息
来源: 评论
swRodinia: A Benchmark Suite for Exploiting Architecture Properties of Sunway Processor  3rd
swRodinia: A Benchmark Suite for Exploiting Architecture Pr...
收藏 引用
3rd BenchCouncil International Symposium on Benchmarking, Measuring, and Optimizing, Bench 2020
作者: Chen, Bangduo Li, Mingzhen Yang, Hailong Luan, Zhongzhi Gan, Lin Yang, Guangwen Qian, Depei School of Computer Science and Engineering Beihang University Beijing100191 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu214125 China Department of Computer Science and Technology Tsinghua University Beijing100084 China
The Sunway processor has been demonstrated with superior performance by various scientific applications, domain specific frameworks and numerical algorithms. However, the optimization techniques that can fully exploit... 详细信息
来源: 评论
Collision attack framework on RIPEMD-128  2
Collision attack framework on RIPEMD-128
收藏 引用
2nd International Conference on Artificial Intelligence and advanced Manufacture, AIAM 2020
作者: Li, Jingyu Zeng, Guang Yang, Yang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Force Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In th... 详细信息
来源: 评论
Selective Hourglass Mapping for Universal Image Restoration Based on Diffusion Model
Selective Hourglass Mapping for Universal Image Restoration ...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Dian Zheng Xiao-Ming Wu Shuzhou Yang Jian Zhang Jian-Fang Hu Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China School of Electronic and Computer Engineering Peking University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Universal image restoration is a practical and poten-tial computer vision task for real-world applications. The main challenge of this task is handling the different degra-dation distributions at once. Existing method... 详细信息
来源: 评论
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks  34
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
34th General Assembly and Scientific Symposium of the International Union of Radio Science, URSI GASS 2021
作者: Gao, Yuan Cao, Jiang Guo, Yang Wang, Ping Yang, Siming Wang, Jing Lu, Weidang Si, Peiyuan Zhao, Ming Wu, Xiao Academy of Military Science of the PLA 100091 China College of Information Engineering Zhejiang University of Technology Hangzhou China Tsinghua University Beijing100084 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
Semivortex solitons and their excited states in spin-orbit-coupled binary bosonic condensates
收藏 引用
Physical Review E 2024年 第6期109卷 064201-064201页
作者: Haiming Deng Jinqing Li Zhaopin Chen Yaohui Liu Dong Liu Chunzhi Jiang Chao Kong Boris A. Malomed School of Physics and Electronic-Electrical Engineering Microelectronics and Optoelectronics Technology Key Laboratory of Hunan Higher Education Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems Physics Department and Solid-State Institute Department of Physical Electronics School of Electrical Engineering Faculty of Engineering Instituto de Alta Investigación
It is known that two-dimensional two-component fundamental solitons of the semivortex (SV) type, with vorticities (s+,s−)=(0,1) in their components, are stable ground states (GSs) in the spin-orbit-coupled (SOC) binar... 详细信息
来源: 评论