咨询与建议

限定检索结果

文献类型

  • 2,254 篇 期刊文献
  • 1,596 篇 会议
  • 1 册 图书

馆藏范围

  • 3,851 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,594 篇 工学
    • 1,385 篇 计算机科学与技术...
    • 1,114 篇 软件工程
    • 527 篇 信息与通信工程
    • 414 篇 电气工程
    • 322 篇 电子科学与技术(可...
    • 301 篇 控制科学与工程
    • 274 篇 化学工程与技术
    • 271 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 198 篇 光学工程
    • 184 篇 机械工程
    • 184 篇 材料科学与工程(可...
    • 151 篇 仪器科学与技术
    • 133 篇 动力工程及工程热...
    • 100 篇 土木工程
    • 98 篇 交通运输工程
    • 86 篇 建筑学
    • 86 篇 网络空间安全
  • 1,665 篇 理学
    • 778 篇 数学
    • 568 篇 物理学
    • 328 篇 生物学
    • 256 篇 化学
    • 223 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 86 篇 地球物理学
  • 504 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 172 篇 医学
    • 137 篇 临床医学
    • 122 篇 基础医学(可授医学...
  • 77 篇 农学
  • 55 篇 法学
  • 40 篇 经济学
  • 19 篇 教育学
  • 10 篇 军事学
  • 8 篇 艺术学
  • 3 篇 文学
  • 2 篇 历史学

主题

  • 96 篇 semantics
  • 76 篇 feature extracti...
  • 58 篇 training
  • 55 篇 deep learning
  • 51 篇 accuracy
  • 49 篇 computational mo...
  • 44 篇 neural networks
  • 43 篇 optimization
  • 40 篇 machine learning
  • 39 篇 object detection
  • 35 篇 image segmentati...
  • 34 篇 data mining
  • 31 篇 predictive model...
  • 30 篇 simulation
  • 29 篇 correlation
  • 28 篇 privacy
  • 27 篇 visualization
  • 27 篇 federated learni...
  • 27 篇 measurement
  • 27 篇 data models

机构

  • 195 篇 key laboratory o...
  • 155 篇 school of comput...
  • 138 篇 key laboratory o...
  • 99 篇 university of ch...
  • 98 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 yunnan observato...
  • 93 篇 tianfu cosmic ra...
  • 87 篇 key laboratory o...
  • 86 篇 key laboratory f...
  • 86 篇 school of physic...
  • 85 篇 department of ph...
  • 84 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 institute of fro...
  • 82 篇 school of physic...
  • 82 篇 school of physic...
  • 81 篇 national space s...
  • 80 篇 moscow institute...

作者

  • 84 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 danzengluobu
  • 76 篇 bastieri d.
  • 76 篇 jiang k.
  • 71 篇 kuleshov d.
  • 71 篇 liu d.
  • 70 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 li xin
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 li cheng
  • 67 篇 liu b.
  • 66 篇 guo y.q.
  • 65 篇 bao y.w.
  • 65 篇 hu h.b.
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 3,583 篇 英文
  • 198 篇 其他
  • 80 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3851 条 记 录,以下是171-180 订阅
排序:
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Shenyi Zhai, Yuchen Guo, keyan Hu, Hongxin Guo, Shengnan Fang, Zheng Zhao, Lingchen Shen, Chao Wang, Cong Wang, Qian Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China University at Buffalo United States Xi’an Jiaotong University China City University of Hong Kong Hong Kong
Despite the implementation of safety alignment strategies, large language models (LLMs) remain vulnerable to jailbreak attacks, which undermine these safety guardrails and pose significant security threats. Some defen... 详细信息
来源: 评论
Optimal Flying Location for Unmanned Aerial Vehicle Equipped with MF-RIS assisted Covert Wireless on Communication
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Jie Li, Yunxiang Tian, Wen Dai, Yuewei Liu, Yinqiu Niyato, Dusit Nanjing University of Posts and Telecommunications School of Communications and Information Engineering Nanjing China Nanjing University of Information Science and Technology School of Electronic and Information Engineering Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Nanyang Technological University College of Computing and Data Science Singapore
In the current information age, covert communication holds significant value owing to its advantages, such as heightened security, enhanced flexibility, and improved concealment, surpassing those of traditional commun... 详细信息
来源: 评论
Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph
收藏 引用
ACM Transactions on Software engineering and Methodology 2025年 第4期34卷
作者: Liang, Ruichao Chen, Jing Wu, Cong He, Kun Wu, Yueming Sun, Weisong Du, Ruiying Zhao, Qingchuan Liu, Yang Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Nanyang Technological University Singapore Singapore School of Computer Science and Engineering Nanyang Technological University Singapore Singapore City University of Hong Kong Hong Kong Hong Kong
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent years, causing massive financial losses. Existing detection methods primarily focus on rule-based approaches and machine learni... 详细信息
来源: 评论
TDiffSal: Text-Guided Diffusion Saliency Prediction Model for Images  27th
TDiffSal: Text-Guided Diffusion Saliency Prediction Model fo...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhang, Nana Xiong, Min Zhu, Dandan Zhu, Kun Zhai, Guangtao School of Computer Science and Technology Donghua University No. 2999 Renmin North Road Songjiang District Shanghai201620 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China Institute of AI Education Shanghai East China Normal University No. 3663 Zhongshan North Road Putuo District Shanghai200333 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University No. 4800 Cao’an Highway Jiading District Shanghai201804 China Institute of Image Communication and Network Engineering Shanghai Jiao Tong University No. 800 Dongchuan Road Minhang District Shanghai200240 China
Existing visual saliency prediction methods mainly focus on single-modal visual saliency prediction, while ignoring the significant impact of text on visual saliency. To more comprehensively explore the influence of t... 详细信息
来源: 评论
Modeling of self-pressurization process with low flow supply of carbon dioxide
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) 2025年 第4期56卷 1628-1638页
作者: Xiong, Yu Lu, Zhaijun Gan, Ning School of Transportation Engineering Central South University Changsha 410075 China Center of Advanced Scientific Research on Extreme Fluid Power Central South University Changsha 410075 China Key Laboratory of Traffic Safety on the Track of Ministry of Education Central South University Changsha 410075 China
To study the self-pressurization process with low flow supply of carbon dioxide, a new non-thermal equilibrium self-pressurization mathematical model based on the quality to characterize gasification rate of liquid-ph... 详细信息
来源: 评论
DAT: Dual-branch Adapter-Tuning for Few-shot Recognition
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Chen, Junxi Wu, Guangxing Li, Hongxiang Chen, Jiankang Zhang, Wentao Zheng, Weishi Wang, Ruixuan Sun Yat-sen Univerisity College of Computer Science and Engineering Guangzhou510275 China Peking University School of Electronic and Computer Engineering Shenzhen518055 China Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Guangzhou510275 China Sun Yat-sen Univerisity School of Computer Science and Engineering Guangzhou510275 China Peng Cheng Laboratory Shenzhen518066 China
Parameter-Efficient Fine-Tuning methods based on vision-language models (such as CLIP) for few-shot learning have recently received considerable attention. However, previous works only fine-tune either the image or te... 详细信息
来源: 评论
Incorporating edge sharpening and covariance attention for named entity recognition
收藏 引用
Neurocomputing 2025年 643卷
作者: Yang, Caiwei Chen, Yanping Yu, Shuai Huang, Ruizhang Qin, Yongbin Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education Guizhou University Guizhou Guiyang550025 China State Key Laboratory of Public Big Data Guizhou university Guizhou Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China
Named Entity Recognition (NER) is a key application in the field of Artificial Intelligence and Natural Language Processing, which automatically identifies and categorizes entities in text by intelligent algorithms. I... 详细信息
来源: 评论
Subband Adaptive Filtering Based on the Squared Sine Error Criterion: Analysis and Applications
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 1949-1959页
作者: Zhikai Gong Yingsong Li Xinqi Huang Liping Li Zhixiang Huang Rodrigo. C. de Lamare Yingying Zhu College of Information and Communication Engineering Harbin Engineering University Harbin China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China Centre for Telecommunications Research (CETUC) Pontifical Catholic University of Rio de Janeiro (PUC-Rio) Gávea Brazil School of Physics Engineering and Technology University of York York U.K.
In this work, we present a subband adaptive filtering (SAF) algorithm with good robustness for impulsive noise environments. The proposed squared sine normalized SAF (SS-NSAF) algorithm employs a squared sine function... 详细信息
来源: 评论
CMCache: An Adaptive Cross-Level Data Placement Method for Multi-Level Cache
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Zeng, Zhaoyang Tan, Yujuan Ma, Zhulin Li, Jiali Zhao, Sanle Liu, Duo Chen, Xianzhang Ren, Ao Chongqing University College of Computer Science Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing400044 China Chongqing Universityof Posts and Telecommunications College of Software Engineering China Chongqing University College of Big Data and Software Engineering Chongqing China
Multi-level cache systems enhance I/O performance by optimizing data placement across various cache levels from a global perspective. However, existing methods often struggle to place data at the optimal cache level p... 详细信息
来源: 评论
MODFuzz: A Multi-Objective Directed Fuzzer for USB Drivers
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhou, Yilin Peng, Guojun Wang, Xingliang Wang, Chenyang Li, Zichuan Liu, Side Wang, Yanhao Yang, Xiuzhang Fu, Jianming Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Indiana University Bloomington BloomingtonIN United States Nio Inc Beijing China Guizhou University Guizhou Big Data Academy Guiyang China
USB interfaces have become ubiquitous in various Internet of Things (IoT) devices, all adhering to the same USB protocol. While enhancing convenience, they also widen the potential attack surface. Fuzzing is a proacti... 详细信息
来源: 评论