咨询与建议

限定检索结果

文献类型

  • 2,231 篇 期刊文献
  • 1,657 篇 会议
  • 1 册 图书

馆藏范围

  • 3,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,580 篇 工学
    • 1,379 篇 计算机科学与技术...
    • 1,106 篇 软件工程
    • 504 篇 信息与通信工程
    • 381 篇 电气工程
    • 316 篇 电子科学与技术(可...
    • 303 篇 控制科学与工程
    • 273 篇 生物工程
    • 265 篇 化学工程与技术
    • 214 篇 生物医学工程(可授...
    • 194 篇 光学工程
    • 186 篇 材料科学与工程(可...
    • 181 篇 机械工程
    • 152 篇 仪器科学与技术
    • 127 篇 动力工程及工程热...
    • 97 篇 土木工程
    • 96 篇 交通运输工程
    • 83 篇 网络空间安全
    • 82 篇 建筑学
  • 1,651 篇 理学
    • 782 篇 数学
    • 560 篇 物理学
    • 326 篇 生物学
    • 243 篇 化学
    • 224 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 83 篇 地球物理学
  • 500 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 240 篇 图书情报与档案管...
    • 106 篇 工商管理
  • 164 篇 医学
    • 132 篇 临床医学
    • 112 篇 基础医学(可授医学...
  • 80 篇 农学
  • 56 篇 法学
  • 38 篇 经济学
  • 15 篇 教育学
  • 9 篇 军事学
  • 6 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 100 篇 semantics
  • 80 篇 feature extracti...
  • 60 篇 training
  • 59 篇 accuracy
  • 57 篇 deep learning
  • 53 篇 computational mo...
  • 44 篇 neural networks
  • 43 篇 optimization
  • 41 篇 machine learning
  • 37 篇 federated learni...
  • 36 篇 object detection
  • 34 篇 image segmentati...
  • 34 篇 data mining
  • 31 篇 simulation
  • 31 篇 predictive model...
  • 31 篇 privacy
  • 30 篇 contrastive lear...
  • 30 篇 measurement
  • 29 篇 visualization
  • 28 篇 cosmic rays

机构

  • 196 篇 key laboratory o...
  • 157 篇 school of comput...
  • 138 篇 key laboratory o...
  • 103 篇 university of ch...
  • 102 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 yunnan observato...
  • 90 篇 school of physic...
  • 89 篇 key laboratory f...
  • 88 篇 center for astro...
  • 88 篇 college of physi...
  • 86 篇 department of ph...
  • 86 篇 key laboratory o...
  • 86 篇 institute of fro...
  • 86 篇 school of physic...
  • 86 篇 school of physic...
  • 84 篇 national space s...
  • 82 篇 moscow institute...

作者

  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 bastieri d.
  • 77 篇 jiang k.
  • 73 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 72 篇 liu d.
  • 71 篇 chen m.j.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li xin
  • 69 篇 bao y.w.
  • 68 篇 li cheng
  • 68 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 min z.
  • 64 篇 zheng wei-shi

语言

  • 3,310 篇 英文
  • 511 篇 其他
  • 81 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3889 条 记 录,以下是1091-1100 订阅
排序:
Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion
Seeing the Attack Paths: Improved Flow Correlation Scheme in...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Zixuan Chen Chao Zheng Zhao Li Jinqiao Shi Zeyu Li School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Geedge Networks Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Stepping-stones are widely used by attackers to conceal their identities and gain unauthorized access to restricted targets. Numerous strategies have been suggested to identify stepping-stones and counteract evasive b... 详细信息
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qianqian Chang Lin Xu Lei Zhang Shanghai Key Laboratory of Trustworthy Computing East China Normal University China Science and Technology on Communication Security Laboratory Chengdu China Ministry of Education Engineering Research Center of Software/Hardware Co-Design Technology and Application China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony...
来源: 评论
Dam regulation on extreme streamflow-sediment relationships along the Yangtze River Basin
收藏 引用
Science Bulletin 2025年 第6期70卷 866-870页
作者: Guangyao Gao Anqi Huang Lishan Ran Dongfeng Li Hong Zhang Yadu Pokhrel Liqiang Yao Bojie Fu State Key Laboratory of Urban and Regional Ecology Research Center for Eco-Environmental SciencesChinese Academy of SciencesBeijing 100085China State Key Laboratory of Environmental Aquatic Chemistry Research Center for Eco-Environmental SciencesChinese Academy of SciencesBeijing 100085China University of Chinese Academy of Sciences Beijing 100049China Department of Geography The University of Hong KongHong Kong 999077China Key Laboratory for Water and Sediment Sciences Ministry of EducationCollege of Environmental Sciences and EngineeringPeking UniversityBeijing 100871China Department of Civil and Environmental Engineering Michigan State UniversityEast Lansing MI 48824USA Water Resources Department Yangtze River Scientific Research InstituteWuhan 430010China
Streamflow and sediment transport in river ecosystems are crit-ical processes for material movement and energy conversion,intri-cately linked to socioeconomic and riverine biophysical processes such as hydropower deve... 详细信息
来源: 评论
Efficient Meta Neural Heuristic for Multi-Objective Combinatorial Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Jinbiao Wang, Jiahai Zhang, Zizhen Cao, Zhiguang Ye, Te Chen, Siyuan School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Sun Yat-sen University China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China School of Computing and Information Systems Singapore Management University Singapore
Recently, neural heuristics based on deep reinforcement learning have exhibited promise in solving multi-objective combinatorial optimization problems (MOCOPs). However, they are still struggling to achieve high learn... 详细信息
来源: 评论
Community-Aware Heterogeneous Graph Contrastive Learning  19th
Community-Aware Heterogeneous Graph Contrastive Learning
收藏 引用
19th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2024
作者: Li, Xinying Wu, Ling Guo, Kun College of Computer and Data Science Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China
Recently, heterogeneous graph contrastive learning, which can mine supervision signals from the data, has attracted widespread attention. However, most existing methods employ random data augmentation strategies to co... 详细信息
来源: 评论
A Novel DDoS Detection Model for SDN Using Single-Class Cluster Oversampling and Weighted Ensemble Method
A Novel DDoS Detection Model for SDN Using Single-Class Clus...
收藏 引用
International Conference on Network Protocols
作者: Hao Zhang Shuqi Wu Jie Pan Zhi Wang Xiaolong Sun College of Computer and Data Science Fuzhou University Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Engineering Research Center of Big Data Intelligence Chinese Ministry of Education Fuzhou China
The centralized control plane characteristic of Software Defined Networking (SDN) makes it a prime target for Distributed Denial of Service (DDoS) attacks. A significant issue in network traffic data is the severe imb... 详细信息
来源: 评论
Research on Secure Communication Methods for High-Speed Cross-Network Data Exchange
Research on Secure Communication Methods for High-Speed Cros...
收藏 引用
Electronic Information engineering and Computer Communication (EIECC), International Conference on
作者: Yao Zhang Yitao Chen Jiujiang Fei Guojun Peng Rong Su Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Wuhan Maritime Communication Research Institute Wuhan China Wuhan Railway Vocational College of Technology Wuhan China
This paper introduces the application requirements for high-speed secure communication across networks, the fundamental principles of cross-network data exchange, and its implementation. Based on high-speed switch tec... 详细信息
来源: 评论
D-FGNAE: Decentralized Federated Graph Normalized AutoEncoder  19th
D-FGNAE: Decentralized Federated Graph Normalized AutoEncode...
收藏 引用
19th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2024
作者: Liang, Yuting Cai, Weixin Guo, Kun College of Computer and Data Science Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China
Graphs widely exist in real-world, and Graph Neural Networks (GNNs) have exhibited exceptional efficacy in graph learning in diverse fields. With the strengthening of data privacy protection worldwide in recent years,... 详细信息
来源: 评论
LCW: A Lightweight Recommendation Framework for Non-profit Crowdfunding Projects  21
LCW: A Lightweight Recommendation Framework for Non-profit C...
收藏 引用
4th International Conference on Computer Science and Software engineering, CSSE 2021
作者: Liu, Jinxin Xiao, Yingyuan Zheng, Wenguang Engineering Research Center of Learning-BasedIntelligent System Ministry of Education Tianjin University of Technology China Tianjin Key Laboratory OfIntelligence Computing and Novel Software Technology Tianjin University of Technology China
In recent years, crowdfunding platform has gradually emerged as a new economic model, and more and more people choose crowdfunding to obtain the initial funds needed by the project. However, with the increasing number... 详细信息
来源: 评论
Community Evolution Tracking Based on High-Order Neighbor Consideration and Node Change Identification  19th
Community Evolution Tracking Based on High-Order Neighbor C...
收藏 引用
19th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2024
作者: Zhang, Yunan Wang, Chaohui Wu, Ling Guo, Kun College of Computer and Data Science Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China
Community evolution tracking is widely used in complex network analysis, which analyzes and identifies how communities evolve over time based on dynamic community detection. However, the current incremental dynamic co... 详细信息
来源: 评论