咨询与建议

限定检索结果

文献类型

  • 1,107 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,288 篇 工学
    • 701 篇 计算机科学与技术...
    • 571 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 172 篇 电气工程
    • 124 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 112 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 86 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,018 篇 理学
    • 553 篇 物理学
    • 386 篇 数学
    • 124 篇 统计学(可授理学、...
    • 120 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 220 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 622 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,800 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1993 条 记 录,以下是241-250 订阅
排序:
Clause-level Relationship-aware Math Word Problems Solver
收藏 引用
Machine Intelligence Research 2022年 第5期19卷 425-438页
作者: Chang-Yang Wu Xin Lin Zhen-Ya Huang Yu Yin Jia-Yu Liu Qi Liu Gang Zhou Anhui Province Key Laboratory of Big Data Analysis and Application School of Data ScienceUniversity of Science and Technology of ChinaHefei 230026China Institute of Artificial Intelligence Hefei Comprehensive National Science CenterHefei 230088China Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou 450001China
Automatically solving math word problems,which involves comprehension,cognition,and reasoning,is a crucial issue in artificial intelligence *** math word problem solvers mainly work on word-level relationship extracti... 详细信息
来源: 评论
A Software/Hardware Co-design Local Irregular Sparsity Method for Accelerating CNNs on FPGA  22
A Software/Hardware Co-design Local Irregular Sparsity Metho...
收藏 引用
Workshop Proceedings of the 51st International Conference on Parallel Processing
作者: Jiangwei Shang Zhan Zhang Chuanyou Li Kun Zhang Lei Qian Hongwei Liu Harbin Institute of Technology China Southeast University China State Key Laboratory of Mathematical Engineering and Advanced Computing China
Convolutional neural networks (CNNs) have been widely used in different areas. The success of CNNs comes with a huge amount of parameters and computations, and nowaday CNNs still keep moving toward larger structures. ... 详细信息
来源: 评论
A Relation-Oriented Method for Joint Entity and Relation Extraction Based on Neural Network  21
A Relation-Oriented Method for Joint Entity and Relation Ext...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Hu, Hongwei Yin, Meijuan Liu, Xiaonan Key Laboratory of Cyberspace Situation Awareness of Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Entity and relation extraction is a basic task of information extraction in natural language processing. At present, Entity and relation extraction based on artificial intelligence has been widely studied, but most me... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
International Conference on Communications, Information System and Computer engineering (CISCE)
作者: Zhe Xiong Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
Consumer Electronics and Computer engineering (ICCECE), 2021 IEEE International Conference on
作者: Jiang Lin Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address...
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  6
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Wu, Zejun Lu, Li Jia, Qiong Chen, Zhihao State Key Laboratory of Mathematical Engineering and advanced Computing Zheng zhou China National Local Joint Engineering Laboratory of Network Space Security Technology Zheng zhou China Beijing Institute of Computer Technology and Application BeiJing China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Ultra-low power MoS2 optoelectronic synapse with wavelength sensitivity for color target recognition
收藏 引用
Science China(Information Sciences) 2025年 第4期68卷 187-196页
作者: Bo WEI Yabo CHEN Xiaotong HAN Yan KANG Bujia LIANG Cheng LI Xiaokuo YANG Liang FANG Yuanxi PENG Institute for Quantum Information & State Key Laboratory of High Performance Computing College of ComputerNational University of Defense Technology Fundamentals Department Air Force Engineering University College of Advanced Interdisciplinary Studies National University of Defense Technology Institute of Quantum Information Science and Technology College of ScienceNational University of Defense Technology College of Computer National University of Defense Technology
Optoelectronic synapses that integrate visual perception and pre-processing hold significant potential for neuromorphic vision systems(NVSs). However, due to a lack of wavelength sensitivity, existing NVS mainly foc... 详细信息
来源: 评论
Can We Half the Work with Double Results: Rethinking Machine Learning Algorithms for Network Intrusion Detection System  9
Can We Half the Work with Double Results: Rethinking Machine...
收藏 引用
9th International Conference on advanced Cloud and Big Data, CBD 2021
作者: Li, Shuren Lu, Yifei Li, Jingqi Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Machine Learning algorithms have been wildly applied in the intrusion detection system(IDS). However, in the IoT environment where the resources are limited and the flow data is of huge amount, we need more efficient ... 详细信息
来源: 评论
Pruned-F1DCN: A lightweight network model for traffic classification  22
Pruned-F1DCN: A lightweight network model for traffic classi...
收藏 引用
Proceedings of the 2022 International Conference on Cyber Security
作者: Ruo nan Wang Jin long Fei Rong kai Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China China
With the continuous development of deep learning, deep neural networks are gradually applied to traffic classification problems. However, the large network structure and parameter number of deep neural networks hinder... 详细信息
来源: 评论
Tailor : Datacenter Load Balancing for Accelerating Distributed Deep Learning  9
Tailor : Datacenter Load Balancing for Accelerating Distribu...
收藏 引用
9th International Conference on advanced Cloud and Big Data, CBD 2021
作者: Xu, Zhengzhi Lu, Yifei Li, Jingqi Ma, Xu Qian, Lei Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Accelerating Distributed Deep Learning draws increasing attention recently. Existing solutions like gradient compression, pipelining computation/communication, flow scheduling based on gradient disparities, neglect lo... 详细信息
来源: 评论