咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是391-400 订阅
排序:
A Compact Transformer for Adaptive Style Transfer
A Compact Transformer for Adaptive Style Transfer
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yi Li Xin Xie Haiyan Fu Xiangyang Luo Yanqing Guo School of Artificial Intelligence Dalian University of Technology Dalian China School of Information and Communication Engineering Dalian University of Technology Dalian China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the limitation of spatial receptive field, it is challenging for CNN-based style transfer methods to capture rich and long-range semantic concepts in artworks. Though the transformer provides a fresh solution b...
来源: 评论
Focus, Distinguish, and Prompt: Unleashing CLIP for Efficient and Flexible Scene Text Retrieval
arXiv
收藏 引用
arXiv 2024年
作者: Zeng, Gangyan Zhang, Yuan Wei, Jin Yang, Dongbao Zhang, Peng Gao, Yiwen Qin, Xugong Zhou, Yu School of Cyber Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Media Convergence and Communication Communication University of China China Institute of Information Engineering Chinese Academy of Sciences China Laboratory for Advanced Computing and Intelligence Engineering China TMCC College of Computer Science Nankai University China
Scene text retrieval aims to find all images containing the query text from an image gallery. Current efforts tend to adopt an Optical Character Recognition (OCR) pipeline, which requires complicated text detection an... 详细信息
来源: 评论
通过表面终止化学设计实现高度可逆的锌金属阳极
收藏 引用
Science Bulletin 2023年 第23期68卷 2993-3002,M0005页
作者: 刘宇 陈树麟 袁豪 熊方宇 刘琴 安永康 张建勇 吴璐 孙建国 Yong-Wei Zhang 安琴友 John Wang State Key Laboratory of Advanced Technology for Materials Synthesis and Processing Wuhan University of TechnologyWuhan 430070China Department of Materials Science and Engineering National University of SingaporeSingapore 117574Singapore Institute of High Performance Computing Agency for ScienceTechnology and Research(A*Star)Singapore 138632Singapore Institute of Materials Research and Engineering(IMRE) Agency for ScienceTechnology and Research(A*Star)Singapore 138634Singapore
锌表面自然形成的非均匀氧化层(ZnO)会与电解液发生反应形成Zn_(4)(OH)_(6)SO_(4)·xH_(2)O(ZSH)副产物,导致锌负极表面非均匀沉积,从而阻碍水性锌离子电池实际应用.为了排除氧化层分布形式的影响,本文利用表面终止化学设计策略在... 详细信息
来源: 评论
Self-Attention Prediction Correction with Channel Suppression for Weakly-Supervised Semantic Segmentation
Self-Attention Prediction Correction with Channel Suppressio...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Guoying Sun Meng Yang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Integrated Services Networks Xidian University Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Ministry of Education China
Single-stage weakly-supervised semantic segmentation (WSSS) with image-level labels has become a new research hotspot in the community for its lower cost and higher training efficiency. However, the pseudo label of WS...
来源: 评论
Research on Security Protocol Analysis Tool SmartVerif
Research on Security Protocol Analysis Tool SmartVerif
收藏 引用
2021 International Conference on Computer Technology, Information engineering and Electron Materials, CTIEEM 2021
作者: Lu, Siqi Han, Qingdi Miao, Xuyang Liu, Yubo State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450000 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450000 China Department of Information Science and Engineering Ocean University of China Shandong Qingdao266100 China
Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol... 详细信息
来源: 评论
Multiple Images Steganography of JPEG Images Based on Optimal Payload Distribution
收藏 引用
Computer Modeling in engineering & Sciences 2020年 第10期125卷 417-436页
作者: Yang Pei Xiangyang Luo Yi Zhang Liyan Zhu Zhong Yuan Network Security Research Institute Zhengzhou UniversityZhengzhou450000China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China
Multiple images steganography refers to hiding secret messages in multiple natural images to minimize the leakage of secret messages during ***,the main multiple images steganography algorithms mainly distribute the p... 详细信息
来源: 评论
A Survey on Neural Machine Translation Applied to Sign Language Generation  3
A Survey on Neural Machine Translation Applied to Sign Langu...
收藏 引用
3rd International Conference on Applied Machine Learning, ICAML 2021
作者: Zhang, Yue Cao, Lihong State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China Neuroscience and Intelligent Media Institute Communication University of China Beijing100024 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is increasing at a rapid rate. There is a signifîcant com... 详细信息
来源: 评论
Shields for Digital Images: A Watermarking Method with KAN Block and Simulation-Enhanced Noise Pool to Resist Screen-Camera Attacks
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Guo, Daidou Qin, Chuan Luo, Xiangyang Feng, Guorui Zhang, Xinpeng University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai 200093 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450000 China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou 450001 China Shanghai University School of Communication and Information Engineering Shanghai 200444 China
To address the issues of privacy leakage and copyright infringement in screen-camera scenarios, we propose a robust image watermarking method, which incorporates kolmogorov-arnold network (KAN) blocks and a simulation... 详细信息
来源: 评论
Low dose PET image reconstruction using diffusion sampling with posterior iterative correction
Low dose PET image reconstruction using diffusion sampling w...
收藏 引用
IEEE Symposium on Nuclear Science (NSS/MIC)
作者: B. Qi R. Hu D. Wu N. Guo Q. Li H. Liu Department of Optical Engineering the State Key Laboratory of Modern Optical Instrumentation Zhejiang University Hangzhou China Massachusetts General Hospital/Harvard Medical School The Center for Advanced Medical Computing and Analysis Boston Massachusetts United States of America
Low dose PET image reconstruction is a crucial technique in functional imaging, addressing both patient safety and diagnostic needs by minimizing radioactive exposure. However, as dosage is reduced, the increasing noi... 详细信息
来源: 评论
Exploration and research of blended learning in the "principles of computer organization"  2
Exploration and research of blended learning in the "princip...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Hou, Yifan Wang, Wei Liu, Fudong Shan, Zheng Wang, Junchao Wang, Lixin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
The'Principles of Computer Organization' is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the 'Principles of Computer Organizati... 详细信息
来源: 评论