咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1989 条 记 录,以下是541-550 订阅
排序:
Optimal-rate error estimates and a twice decoupled solver for a backward Euler finite element scheme of the Doyle-Fuller-Newman model of lithium-ion batteries
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Shu Cao, Liqun School of Mathematical Sciences Peking University Beijing100871 China Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Scientific and Engineering Computing Beijing100190 China National Center for Mathematics and Interdisciplinary Sciences Chinese Academy of Sciences Beijing100190 China
We investigate the convergence of a backward Euler finite element discretization applied to a multi-domain and multi-scale elliptic-parabolic system, derived from the Doyle-Fuller-Newman model for lithium-ion batterie... 详细信息
来源: 评论
Visual Class Incremental Learning with Textual Priors Guidance based on an Adapted Vision-Language Model
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zhang, Wentao Yu, Tong Wang, Ruixuan Xie, Jianhui Trucco, Emanuele Zheng, Wei-Shi Yang, Xiaobo Sun Yat-sen Univerisity School of Computer Science and Engineering Guangzhou510275 China Peng Cheng Laboratory Shenzhen518066 China MOE Key Laboratory of Machine Intelligence and Advanced Computing Guangzhou510275 China Second Affiliated Hospital Guangzhou University of Chinese Medicine State Key Laboratory of Dampness Syndrome of Chinese Medicine Guangzhou510260 China Guangdong Provincial Key Laboratory of Clinical Research on Traditional Chinese Medicine Syndrome Guangzhou510120 China University of Dundee School of Science and Engineering DundeeDD1 4HN United Kingdom
An ideal artificial intelligence (AI) system should have the capability to continually learn like humans. However, when learning new knowledge, AI systems often suffer from catastrophic forgetting of old knowledge. Al... 详细信息
来源: 评论
ARIW-Framework: Adaptive Robust Iterative Watermarking Framework
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Shaowu Lu, Wei Zeng, Liting Luo, Xiangyang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid rise of large models, copyright protection for generated image content has become a critical security challenge. Although deep learning watermarking techniques offer an effective solution for digital im... 详细信息
来源: 评论
Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Liqin Lu, Wei Hu, Qianyue Luo, Xiangyang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The success of face recognition (FR) systems has led to serious privacy concerns due to potential unauthorized surveillance and user tracking on social networks. Existing methods for enhancing privacy fail to generate... 详细信息
来源: 评论
A Security Sensitive Function Mining Approach Based on Precondition Pattern Analysis
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 1013-1029页
作者: Zhongxu Yin Yiran Song Huiqin Chen Yan Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Henan University of Animal Husbandry&Economy Zhengzhou450046China University of Michigan Transportation Research Institute Michigan48109-2150USA Zhengzhou University Zhengzhou450001China
Security-sensitive functions are the basis for building a taint-style vulnerability *** approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pattern analy... 详细信息
来源: 评论
A Novel Method for Detection of ECG with Deep Learning  7
A Novel Method for Detection of ECG with Deep Learning
收藏 引用
7th International Conference on Computer and Communications, ICCC 2021
作者: Wang, Haiyan Zhou, Yanjie Zhou, Bing Wang, Zongmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Simulation Experiment Centre Zhengzhou University of Aeronautics Zhengzhou China Collaborative Innovation Centre For Internet Healthcare Zhengzhou University Zhengzhou China School of Management Engineering Zhengzhou University Zhengzhou China School of Information Engineering Zhengzhou University Zhengzhou China
With the rapid development of machine learning and deep learning, ECG intelligent detection models lean more heavily on the labeled data. However, the development of ECG annotation cannot satisfy the development of an... 详细信息
来源: 评论
Real-Time Source-Independent Quantum Random Number Generator Based on a Cloud Superconducting Quantum Computer
Research Square
收藏 引用
Research Square 2021年
作者: Li, Yuanhao Fei, Yangyang Wang, Weilong Meng, Xiangdong Wang, Hong Duan, Qianheng Ma, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450001 China
Quantum random number generator (QRNG) relies on the intrinsic randomness of quantum mechanics to produce true random numbers which are important in information processing tasks. Due to the presence of the superpositi... 详细信息
来源: 评论
A RIEMANNIAN EXPONENTIAL AUGMENTED LAGRANGIAN METHOD FOR computing THE PROJECTION ROBUST WASSERSTEIN DISTANCE
arXiv
收藏 引用
arXiv 2022年
作者: Jiang, Bo Liu, Ya-Feng Key Laboratory for NSLSCS of Jiangsu Province School of Mathematical Sciences Nanjing Normal University Nanjing China State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China
Projecting the distance measures onto a low-dimensional space is an efficient way of mitigating the curse of dimensionality in the classical Wasserstein distance using optimal transport. The obtained maximized distanc... 详细信息
来源: 评论
LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks  19
LEFV: A Lightweight and Efficient System for Face Verificati...
收藏 引用
Proceedings of the 3rd International Conference on Video and Image Processing
作者: Ming Liu Ping Zhang Qingbao Li Jinjin Liu Zhifeng Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The emergence of deep learning has made great progress in face recognition. With the popularization of embedded devices, deploying the deep model on embedded devices has become a trend. Most high-precision models requ... 详细信息
来源: 评论
Progressive Multi-Stage Feature Mix for Person Re-Identification
Progressive Multi-Stage Feature Mix for Person Re-Identifica...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yan Zhang Binyu He Li Sun Qingli Li Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Image features from a small local region often give strong evidence in person re-identification task. However, CNN suffers from paying too much attention on the most salient local areas, thus ignoring other discrimina... 详细信息
来源: 评论