咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是371-380 订阅
排序:
Graph Contrastive Learning with Adaptive Augmentation for Knowledge Concept Recommendation
Graph Contrastive Learning with Adaptive Augmentation for Kn...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Mei Yu Zhaoyuan Ding Jian Yu Wenbin Zhang Ming Yang Mankun Zhao College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Advanced Networking(TANK Lab) Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Information and Network Center Tianjin University Tianjin China College of Computing and Software Engineering Kennesaw State University Marietta GA USA
Knowledge concept recommendation is a kind of fine-grained recommendation in massive open online courses (MOOCs) scenario, user interaction data has the characteristics of strong collaborative signals and imbalanced i...
来源: 评论
Combination of Translation and Rotation in Dual Quaternion Space for Temporal Knowledge Graph Completion
Combination of Translation and Rotation in Dual Quaternion S...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Ruiguo Yu Tao Liu Jian Yu Wenbin Zhang Yue Zhao Ming Yang Mankun Zhao Jiujiang Guo College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Advanced Networking(TANK Lab) Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Information and Network Center Tianjin University Tianjin China College of Computing and Software Engineering Kennesaw State University Marietta GA USA
Compared with static knowledge graphs (KGs) temporal KGs record the dynamic relations between entities over time, therefore, research on temporal Knowledge Graph Completion (KGC) attracts much attention. Temporal KGs ...
来源: 评论
MASZSL: A Multi-Block Attention-Based Description Generative Adversarial Network for Knowledge Graph Zero-Shot Relational Learning
MASZSL: A Multi-Block Attention-Based Description Generative...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Mei Yu Pengtao Fan Mankun Zhao Wenbin Zhang Yue Zhao Ming Yang Jian Yu College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Advanced Networking(TANK Lab) Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Information and Network Center Tianjin University Tianjin China College of Computing and Software Engineering Kennesaw State University Marietta GA USA
In the real world, the Knowledge Graph(KG) is dynamic and new entities are added at any time. Therefore, open-world Knowledge Graph Completion(KGC) was proposed to approach new-added entities, but previous approaches ...
来源: 评论
A Software Diversity-Based Lab in Operating System for Cyber Security Students  3
A Software Diversity-Based Lab in Operating System for Cyber...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Wang, Junchao Pang, Jianmin Shan, Zheng Wei, Jin Yao, Jinyang Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zheng Zhou China School of Computer Science Data Arena Institute Fudan University Zheng Zhou China
The course of operating system's labs usually fall behind the state of art technology. In this paper, we propose a Software Diversity-Assisted Defense (SDAD) lab based on software diversity, mainly targeting for s... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model  7th
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Zhang, Wenning Zhou, Qinglei Jiao, Chongyang Xu, Ting State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China Zhongyuan University of Technology Zhengzhou450000 China Zhengzhou University Zhengzhou450000 China
To solve the emerging complex optimization problems, multi objective optimization algorithms are needed. By introducing the surrogate model for approximate fitness calculation, the multi objective firefly algorithm wi... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System  21
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
Proceedings of the 3rd International Conference on advanced Information Science and System
作者: Jinjin Liu Zhifeng Chen Xiaonan Li Tongxin Wei School of Computer Science Zhongyuan University of Technology China and State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer Science Zhongyuan University of Technology China School of Cyberspace Security Zhengzhou University China
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
A software upgrade security analysis method on network traffic classification using deep learning
A software upgrade security analysis method on network traff...
收藏 引用
2020 International Conference on Urban engineering and Management Science, ICUEMS 2020
作者: Zhang, Bing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论
The Executors Scheduling Algorithm for the Web Server Based on the Attack Surface
The Executors Scheduling Algorithm for the Web Server Based ...
收藏 引用
2020 IEEE International Conference on Advances in Electrical engineering and Computer Applications, AEECA 2020
作者: Nie, Guanglai Zhang, Zheng Zhao, Yufeng Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith... 详细信息
来源: 评论
An evaluation algorithm of the importance of network node based on community influence  1
收藏 引用
5th International Conference on Data Mining and Big Data, DMBD 2020
作者: He, Gongzhen Luo, Junyong Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Identifying nodes in social networks that have great influence on information dissemination is of great significance for monitoring and guiding information dissemination. There are few methods to study the influence o... 详细信息
来源: 评论