咨询与建议

限定检索结果

文献类型

  • 2,076 篇 期刊文献
  • 1,296 篇 会议
  • 3 册 图书

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,198 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 987 篇 软件工程
    • 328 篇 信息与通信工程
    • 300 篇 电气工程
    • 292 篇 电子科学与技术(可...
    • 262 篇 控制科学与工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 178 篇 材料科学与工程(可...
    • 174 篇 光学工程
    • 142 篇 机械工程
    • 137 篇 生物医学工程(可授...
    • 109 篇 力学(可授工学、理...
    • 101 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 63 篇 交通运输工程
    • 54 篇 安全科学与工程
  • 1,751 篇 理学
    • 849 篇 物理学
    • 764 篇 数学
    • 243 篇 生物学
    • 229 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 94 篇 地球物理学
  • 393 篇 管理学
    • 244 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 95 篇 医学
    • 77 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 52 篇 training
  • 50 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 26 篇 computational mo...
  • 24 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting

机构

  • 623 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 76 篇 school of physic...
  • 73 篇 national space s...
  • 71 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,791 篇 英文
  • 523 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and advanced computing"
3375 条 记 录,以下是31-40 订阅
排序:
Methods for solving equations with errors based on the HHL algorithm
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第4期29卷 9-20页
作者: LüLihui Wang Hong Ma Zhi Duan Qianheng Fei Yangyang Meng Xiangdong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Di... 详细信息
来源: 评论
A survey on federated learning:a perspective from multi-party computation
收藏 引用
Frontiers of Computer Science 2024年 第1期18卷 93-103页
作者: Fengxia LIU Zhiming ZHENG Yexuan SHI Yongxin TONG Yi ZHANG Institute of Artificial Intelligence and Key Laboratory of Mathematics Informatics Behavioral Semantics Beihang UniversityBeijing 100191China State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang UniversityBeijing 100191China Pengcheng Laboratory Shenzhen 518055China Zhongguancun Laboratory Beijing 100190China Institute for Mathematical Sciences and Engineering Research Center of Financial Computing and Digital Engineering Renmin University of ChinaBeijing 100872China
Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw *** enhance privacy in federated learning,multi-party computation ... 详细信息
来源: 评论
Network traffic classification based on multi-head attention and deep metric learning  8
Network traffic classification based on multi-head attention...
收藏 引用
8th International Conference on Electronic Technology and Information Science, ICETIS 2023
作者: Lv, Zhuo Lu, Bin Li, Xue Qi, Zan State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China
Network traffic classification plays an important role in network resource management and security. The application of encryption techniques and the rapid increase in the size of network traffic have placed higher dem... 详细信息
来源: 评论
Color Image Restoration via Quaternion-based Hybrid Regularization Method
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第11期54卷 2176-2182页
作者: Ma, Mingxi The College of Science Key Laboratory of Engineering Mathematics and Advanced Computing Nanchang Institute of Technology Jiangxi Nanchang330099 China
Color image restoration is a crucial task in imaging science. Many existing methods treat color channels independently, disregarding inherent color structures within the channels. To address this, pure quaternion matr... 详细信息
来源: 评论
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Pi, Qiankun Lu, Jicang Sun, Yepeng Fan, Qinlong Zhou, Xukun Shang, Shouxin State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
LENSER: A Channel State Information Based Indoor Localization Scheme for Malicious Devices  20
LENSER: A Channel State Information Based Indoor Localizatio...
收藏 引用
20th IEEE International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023
作者: Ma, Yongqiang Luo, Xiangyang Li, Ruixiang Du, Shaoyong Liu, Wenyan State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to e... 详细信息
来源: 评论
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing  23
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023
作者: Li, Shun-Hang Zhou, Gang Li, Zhi-Bo Lu, Ji-Cang Huang, Ning-Bo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod... 详细信息
来源: 评论
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions  25th
Towards Efficient and Privacy-Preserving Anomaly Detection ...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Song, Yuhan Zhu, Yuefei Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha... 详细信息
来源: 评论
Resolving Anonymous Nodes Based on "Watermelon Patterns" Towards Constructing Router-Level Topology in Mesh Network  29th
Resolving Anonymous Nodes Based on "Watermelon Patterns" Tow...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Li, Ruixiang Feng, Xinzhu Liu, Chong Yuan, Fuxiang Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China Sichuan University Chengdu China
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr... 详细信息
来源: 评论
Packet Modification and Utilization Technology of SOHO Router  2
Packet Modification and Utilization Technology of SOHO Route...
收藏 引用
2nd International Conference on advanced Manufacturing Technology and Manufacturing Systems, ICAMTMS 2023
作者: Gai, Xianzhe Cai, Ruijie Jia, Fan Chen, Hongwei Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing 62 Science Ave. Zhengzhou450001 China
As a gateway to handle all intranet terminal traffic, SOHO router plays an important role in the network. In this paper, we introduced the security threats faced by SOHO routers, and on this basis, we propose a packet... 详细信息
来源: 评论