咨询与建议

限定检索结果

文献类型

  • 2,213 篇 期刊文献
  • 1,639 篇 会议
  • 1 册 图书

馆藏范围

  • 3,853 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,573 篇 工学
    • 1,384 篇 计算机科学与技术...
    • 1,113 篇 软件工程
    • 506 篇 信息与通信工程
    • 389 篇 电气工程
    • 315 篇 电子科学与技术(可...
    • 305 篇 控制科学与工程
    • 272 篇 生物工程
    • 267 篇 化学工程与技术
    • 214 篇 生物医学工程(可授...
    • 193 篇 光学工程
    • 181 篇 材料科学与工程(可...
    • 179 篇 机械工程
    • 153 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 96 篇 土木工程
    • 96 篇 交通运输工程
    • 83 篇 网络空间安全
    • 82 篇 建筑学
  • 1,653 篇 理学
    • 778 篇 数学
    • 563 篇 物理学
    • 325 篇 生物学
    • 248 篇 化学
    • 222 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 84 篇 地球物理学
  • 501 篇 管理学
    • 283 篇 管理科学与工程(可...
    • 239 篇 图书情报与档案管...
    • 107 篇 工商管理
  • 165 篇 医学
    • 132 篇 临床医学
    • 113 篇 基础医学(可授医学...
  • 76 篇 农学
  • 55 篇 法学
  • 37 篇 经济学
  • 15 篇 教育学
  • 9 篇 军事学
  • 6 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 96 篇 semantics
  • 78 篇 feature extracti...
  • 60 篇 training
  • 56 篇 deep learning
  • 53 篇 accuracy
  • 50 篇 computational mo...
  • 42 篇 neural networks
  • 41 篇 optimization
  • 40 篇 machine learning
  • 38 篇 object detection
  • 35 篇 image segmentati...
  • 35 篇 data mining
  • 32 篇 predictive model...
  • 30 篇 simulation
  • 29 篇 privacy
  • 28 篇 correlation
  • 28 篇 data models
  • 27 篇 cosmic rays
  • 27 篇 contrastive lear...
  • 27 篇 visualization

机构

  • 194 篇 key laboratory o...
  • 156 篇 school of comput...
  • 137 篇 key laboratory o...
  • 99 篇 university of sc...
  • 99 篇 university of ch...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 yunnan observato...
  • 94 篇 tianfu cosmic ra...
  • 87 篇 key laboratory o...
  • 87 篇 school of physic...
  • 86 篇 department of ph...
  • 86 篇 key laboratory f...
  • 85 篇 center for astro...
  • 85 篇 college of physi...
  • 84 篇 institute of fro...
  • 84 篇 school of physic...
  • 83 篇 school of physic...
  • 81 篇 national space s...
  • 79 篇 moscow institute...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 bastieri d.
  • 77 篇 jiang k.
  • 73 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 72 篇 liu d.
  • 71 篇 chen m.j.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li xin
  • 69 篇 bao y.w.
  • 68 篇 li cheng
  • 68 篇 liu b.
  • 67 篇 hu h.b.
  • 65 篇 min z.
  • 64 篇 zheng wei-shi

语言

  • 3,499 篇 英文
  • 284 篇 其他
  • 79 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3853 条 记 录,以下是951-960 订阅
排序:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
arXiv
收藏 引用
arXiv 2024年
作者: Xiao, Yue He, Yi Zhang, Xiaoli Wang, Qian Xie, Renjie Sun, Kun Xu, Ke Li, Qi Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Tsinghua University China Zhejiang University of Technology China George Mason University United States
The proliferation of consumer IoT products in our daily lives has raised the need for secure device authentication and access control. Unfortunately, these resource-constrained devices typically use token-based authen... 详细信息
来源: 评论
Joint Squared-Sine Function and ANM DOA Estimation for RIS-Based Sensing Systems
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Li, Yingsong Yu, Canping Li, Liping Huang, Zhixiang Wu, Qingqing The Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui Hefei230601 China The Department of Electronic Engineering Shanghai Jiao Tong University 200240 China
Reconfigurable intelligent surface (RIS) is an emerging technology for improving the performance of wireless communications. In this letter, a joint Squared-Sine function and atomic norm minimization (ANM), denoted as... 详细信息
来源: 评论
ECQED: Emotion-Cause Quadruple Extraction in Dialogs
arXiv
收藏 引用
arXiv 2023年
作者: Zheng, Li Ji, Donghong Li, Fei Fei, Hao Wu, Shengqiong Li, Jingye Li, Bobo Teng, Chong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Sea-NExT Joint Lab School of Computing National University of Singapore Brazil
The existing emotion-cause pair extraction (ECPE) task, unfortunately, ignores extracting the emotion type and cause type, while these fine-grained meta-information can be practically useful in real-world applications... 详细信息
来源: 评论
Can Encrypted Images Still Train Neural Networks? Investigating Image Information and Random Vortex Transformation
arXiv
收藏 引用
arXiv 2024年
作者: Cao, Xiao-Kai Mo, Wen-Jin Wang, Chang-Dong Lai, Jian-Huang Huang, Qiong School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China College of Mathematics and Informatics South China Agricultural University Guangzhou China
Vision is one of the essential sources through which humans acquire information. To simulate this biological characteristic, researchers have proposed models such as Convolutional Neural Networks and Vision Transforme...
来源: 评论
A Time-Efficient Distributed Constant Conditional Functional Dependency Discovery Algorithm for Data Consistency
A Time-Efficient Distributed Constant Conditional Functional...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Junchao Chen Jian-tao Zhou Xinyu Hao Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology College of Computer Science Inner Mongolia University Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China
The accuracy of data analysis depends on data quality, and addressing data consistency issues is a key challenge to improve it. Constant Conditional Functional Dependency (CCFD) is an effective approach that ensures d... 详细信息
来源: 评论
Towards Time-Variant-Aware Link Prediction in Dynamic Graph Through Self-supervised Learning  9th
Towards Time-Variant-Aware Link Prediction in Dynamic Graph...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Wen, Guangqi Cao, Peng Jin, Zhiyong Song, Ruoxian Liu, Xiaoli Yang, Jinzhu Zaiane, Osmar R. Computer Science and Engineering Northeastern University Shenyang China Key Laboratory of Intelligent Computing in Medical Image of Ministry of Education Northeastern University Shenyang China National Frontiers Science Center for Industrial Intelligence and Systems Optimization Shenyang110819 China DAMO Academy Alibaba Group Hangzhou China Alberta Machine Intelligence Institute University of Alberta EdmontonAB Canada
Dynamic graph link prediction is a challenging problem because the graph topology and node attributes vary at different times. A purely supervised learning scheme for the dynamic graph data usually leads to poor gener... 详细信息
来源: 评论
FedWNS: Data Distribution-Wise Node Selection in Federated Learning via Reinforcement Learning
FedWNS: Data Distribution-Wise Node Selection in Federated L...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Chengwu Tu Shengjie Zhao Hao Deng School of Software Engineering Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Shanghai China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of Education Shanghai China
To deal with the discrepancy between global and local objectives in the federated learning invoked by the non-independent, identically distributed (non-IID) data and mitigate the impact of catastrophic forgetting in t...
来源: 评论
A Simple Broadband Slotted Circularly Polarization Antenna
A Simple Broadband Slotted Circularly Polarization Antenna
收藏 引用
IEEE International Workshop on Electromagnetics, Applications and Student Innovation (iWEM)
作者: Lihua Wang Yingsong Li Zhixiang Huang Tian Hong Loh College of Information and Communication Engineering Harbin Engineering University Harbin China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University China Electromagnetic and Eletrochemical Technologies Department National Physical Laboratory Middlesex UK
A simple broadband slotted circularly-polarized (CP) antenna (SBS-CP) is presented, which mainly consists of a ground structure with a modified slot and an asymmetric feeding structure. The two structures can give dif...
来源: 评论
Phase behavior of symmetric diblock copolymers under 3D soft confinement
arXiv
收藏 引用
arXiv 2024年
作者: He, Zhijuan Huang, Jin Jiang, Kai Shi, An-Chang School of Mathematics and Computational Science Xiangtan University Hunan Key Laboratory for Computation and Simulation in Science and Engineering Key Laboratory of Intelligent Computing and Information Processing Ministry of Education 411105 China Laboratory of Mathematics and Complex Systems Ministry of Education School of Mathematical Sciences Beijing Normal University Beijing100875 China Department of Physics and Astronomy McMaster University HamiltonONL8S 4M1 Canada
The phase behavior of symmetric diblock copolymers under three-dimensional (3D) soft confinement is investigated using the self-consistent field theory. The soft confinement is realized in binary blends composed AB di... 详细信息
来源: 评论
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Shenyi Zhai, Yuchen Guo, keyan Hu, Hongxin Guo, Shengnan Fang, Zheng Zhao, Lingchen Shen, Chao Wang, Cong Wang, Qian Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China University at Buffalo United States Xi’an Jiaotong University China City University of Hong Kong Hong Kong
Despite the implementation of safety alignment strategies, large language models (LLMs) remain vulnerable to jailbreak attacks, which undermine these safety guardrails and pose significant security threats. Some defen... 详细信息
来源: 评论