咨询与建议

限定检索结果

文献类型

  • 2,177 篇 期刊文献
  • 1,596 篇 会议
  • 1 册 图书

馆藏范围

  • 3,774 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,526 篇 工学
    • 1,355 篇 计算机科学与技术...
    • 1,098 篇 软件工程
    • 504 篇 信息与通信工程
    • 382 篇 电气工程
    • 310 篇 电子科学与技术(可...
    • 290 篇 控制科学与工程
    • 272 篇 生物工程
    • 265 篇 化学工程与技术
    • 215 篇 生物医学工程(可授...
    • 193 篇 光学工程
    • 179 篇 机械工程
    • 174 篇 材料科学与工程(可...
    • 151 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 96 篇 交通运输工程
    • 94 篇 土木工程
    • 81 篇 网络空间安全
    • 80 篇 建筑学
  • 1,630 篇 理学
    • 769 篇 数学
    • 551 篇 物理学
    • 322 篇 生物学
    • 246 篇 化学
    • 220 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 83 篇 地球物理学
  • 492 篇 管理学
    • 277 篇 管理科学与工程(可...
    • 237 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 163 篇 医学
    • 131 篇 临床医学
    • 113 篇 基础医学(可授医学...
  • 74 篇 农学
  • 53 篇 法学
  • 37 篇 经济学
  • 15 篇 教育学
  • 9 篇 军事学
  • 6 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 96 篇 semantics
  • 76 篇 feature extracti...
  • 58 篇 training
  • 56 篇 deep learning
  • 50 篇 accuracy
  • 49 篇 computational mo...
  • 43 篇 neural networks
  • 42 篇 optimization
  • 39 篇 machine learning
  • 37 篇 object detection
  • 35 篇 image segmentati...
  • 34 篇 data mining
  • 31 篇 predictive model...
  • 30 篇 simulation
  • 28 篇 correlation
  • 28 篇 privacy
  • 27 篇 visualization
  • 27 篇 federated learni...
  • 27 篇 measurement
  • 27 篇 data models

机构

  • 193 篇 key laboratory o...
  • 155 篇 school of comput...
  • 137 篇 key laboratory o...
  • 98 篇 university of sc...
  • 98 篇 university of ch...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 yunnan observato...
  • 93 篇 tianfu cosmic ra...
  • 87 篇 key laboratory o...
  • 86 篇 key laboratory f...
  • 86 篇 school of physic...
  • 85 篇 department of ph...
  • 84 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 institute of fro...
  • 83 篇 school of physic...
  • 82 篇 school of physic...
  • 81 篇 national space s...
  • 80 篇 moscow institute...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 bastieri d.
  • 76 篇 jiang k.
  • 74 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 71 篇 liu d.
  • 70 篇 chen m.j.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li xin
  • 68 篇 bao y.w.
  • 67 篇 li cheng
  • 67 篇 liu b.
  • 66 篇 hu h.b.
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 3,511 篇 英文
  • 193 篇 其他
  • 80 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3774 条 记 录,以下是131-140 订阅
排序:
NetPrompt: Neural Network Prompting Enhances Event Extraction in Large Language Models
收藏 引用
IEEE Transactions on Big Data 2025年
作者: Mu, Lin Cheng, Yide Shen, Jun Zhang, Yiwen Zhong, Hong School of Computer Science and Technology Anhui University Anhui Hefei230601 China The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education the Anhui Engineering Laboratory of IoT Security Technologies the School of Computer Science and Technology the Institute of Physical Science and Information Technology Anhui University Hefei230039 China
Event Extraction involves extracting event-related information such as event types and event arguments from context, which has long been tackled through well-designed neural networks or fine-tuned pre-trained language... 详细信息
来源: 评论
Homophily Induced Contrastive Attributed Graph Clustering
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Chen, Man-Sheng Lai, Pei-Yuan Liao, De-Zhang Wang, Chang-Dong Lai, Jian-Huang Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Guangxi Zhuang Autonomous Region Information Center Guangxi Key Laboratory of Digital Infrastructure Nanning China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China South China Technology Commercialization Center Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China
Attributed graph clustering, aiming to discover the underlying graph structure and partition the graph nodes into several disjoint categories, is a basic task in graph data analysis. Although recent efforts over graph... 详细信息
来源: 评论
Carbon diffusion mechanism as an effective stability enhancement strategy:The case study of Ni-based catalyst for photothermal catalytic dry reforming of methane
收藏 引用
Chinese Journal of Catalysis 2025年 第3期70卷 399-409页
作者: Dezheng Li Huimin Liu Xuewen Xiao Manqi Zhao Dehua He Yiming Lei School of Chemical and Environmental Engineering Liaoning University of TechnologyJinzhou 121000LiaoningChina Institute of Molecular Sciences of Orsay(ISMO) University Paris-Saclay and National Centre for Scientific Research(CNRS)Orsay91400France Key Laboratory of Organic Optoelectronics and Molecular Engineering of Ministry of Education Department of ChemistryTsinghua UniversityBeijing 100084China Department of Chemistry(Inorganic Chemistry) Faculty of SciencesAutonomous University of Barcelona(UAB)Cerdanyola del VallesBarcelona 08193Spain
Photothermal catalytic methane dry reforming(DRM)technology can convert greenhouse gases(***_(4)and CO_(2))into syngas(i.e.H_(2)and CO),providing more opportunities for reducing the greenhouse effect and achieving car... 详细信息
来源: 评论
From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning
arXiv
收藏 引用
arXiv 2025年
作者: Li, Ziang Zhang, Hongguang Wang, Juan Chen, Meihui Hu, Hongxin Yi, Wenzhe Xu, Xiaoyang Yang, Mengda Ma, Chenjun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Shanghai Innovation Institute China Ant Group China Department of Computer Science and Engineering University at Buffalo SUNY United States
Model Inversion Attacks (MIAs) aim to reconstruct private training data from models, leading to privacy leakage, particularly in facial recognition systems. Although many studies have enhanced the effectiveness of whi... 详细信息
来源: 评论
CPST-GAN: Conditional Probabilistic State Transition Generative Adversarial Network With the Biomedical Large Foundation Models
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2025年 PP卷 PP页
作者: Wang, Qiong Xu, Luyun Shan, Yinglu Shen, Wenzhuo Li, Lou Bi, Xia-An Liu, Zhonghua Hunan Normal University Key Laboratory of Computing and Stochastic Mathematics Ministry of Education School of Mathematics and Statistics College of Information Science and Engineering Changsha410081 China Hunan Normal University College of Business Changsha410081 China Hunan Normal University College of Information Science and Engineering Changsha410081 China
The risk prediction of Alzheimer's disease (AD) is crucial for its early prevention and treatment. However, current risk prediction methods face challenges in effectively extracting and fusing multiomics features,... 详细信息
来源: 评论
Joint DNN Partition and Thread Allocation Optimization for Energy-Harvesting MEC Systems
Joint DNN Partition and Thread Allocation Optimization for E...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Yizhou Shi Liying Li Yue Zeng Peijin Cong Junlong Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education Shanghai China
Deep neural networks (DNNs) have demonstrated exceptional performance, leading to diverse applications across various mobile devices (MDs). Considering factors like portability and environmental sustainability, an inc... 详细信息
来源: 评论
Progressive Human Motion Generation Based on Text and Few Motion Frames
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Zeng, Ling-An Wu, Gaojie Wu, Ancong Hu, Jian-Fang Zheng, Wei-Shi Sun Yat-sen University School of Artificial Intelligence Guangdong Zhuhai519082 China Sun Yat-sen University School of Computer Science and Engineering Guangdong Guangzhou510275 China Sun Yat-sen University School of Computer Science and Engineering China Guangdong Key Laboratory of Information Security Technology China Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing China Peng Cheng Laboratory China
Although existing text-to-motion (T2M) methods can produce realistic human motion from text description, it is still difficult to align the generated motion with the desired postures since using text alone is insuffic... 详细信息
来源: 评论
Dipole Antenna Arrays with Inherently High Port Isolation Levels
收藏 引用
IEEE Antennas and Wireless Propagation Letters 2025年
作者: Chen, Zhiyuan Lu, Dacheng Tang, Ming-Chun Hu, Kun-Zhi Li, Dajiang Liu, Heng Yi, Da Chongqing University of Posts and Telecommunications Key Laboratory of Industrial Internet of Things and Networked Control College of Automation Chongqing400065 China Chongqing University of Posts and Telecommunications Institute of Industrial Internet Chongqing China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education School of Microelectronics and Communication Engineering Chongqing400044 China
In this letter, the dipole antenna arrays with self-decoupling characteristics are developed. In comparison with the traditional electric dipole antennas, the developed dipole antenna can be considered as comprising a... 详细信息
来源: 评论
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Shenyi Zhai, Yuchen Guo, keyan Hu, Hongxin Guo, Shengnan Fang, Zheng Zhao, Lingchen Shen, Chao Wang, Cong Wang, Qian Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China University at Buffalo United States Xi’an Jiaotong University China City University of Hong Kong Hong Kong
Despite the implementation of safety alignment strategies, large language models (LLMs) remain vulnerable to jailbreak attacks, which undermine these safety guardrails and pose significant security threats. Some defen... 详细信息
来源: 评论
Optimal Flying Location for Unmanned Aerial Vehicle Equipped with MF-RIS assisted Covert Wireless on Communication
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Jie Li, Yunxiang Tian, Wen Dai, Yuewei Liu, Yinqiu Niyato, Dusit Nanjing University of Posts and Telecommunications School of Communications and Information Engineering Nanjing China Nanjing University of Information Science and Technology School of Electronic and Information Engineering Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Nanyang Technological University College of Computing and Data Science Singapore
In the current information age, covert communication holds significant value owing to its advantages, such as heightened security, enhanced flexibility, and improved concealment, surpassing those of traditional commun... 详细信息
来源: 评论