咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是471-480 订阅
排序:
Open Set Recognition for Encrypted Traffic using Intra-class Partition and Boundary Sample Generation
Open Set Recognition for Encrypted Traffic using Intra-class...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Xue Li Jinlong Fei Zan Qi Zhuo Lv Heng Jiang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China National Digital Switching System Engineering Technological Research Center PLA Information Engineering University Zhengzhou China
Existing deep learning-based encrypted traffic recognition methods can achieve high precision identification performance while protecting user privacy, but almost all of them focus on closed sets, in which training da... 详细信息
来源: 评论
Efficient Cache Strategy for Face Recognition System  20
Efficient Cache Strategy for Face Recognition System
收藏 引用
5th International Conference on Big Data and computing, ICBDC 2020
作者: Zong, Guoxiao Li, Qingbao Zhang, Ping Zhang, Guimin Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing NO.62 Science Avenue ZhengzhouCN 450001 China
Recently, the need for real-time deep learning applications, such as face recognition system, implement on the embedded devices is increasing. At the system level, caching system is one of the most effective ways to r... 详细信息
来源: 评论
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Jiawei Wang, Jinwei Wang, Hao Luo, Xiangyang Nanjing University of Information Science and Technology Nanjing China Nanjing University of Science and Technology Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
Malicious intelligent algorithms greatly threaten the security of social users’ privacy by detecting and analyzing the uploaded photos to social network platforms. The destruction to DNNs brought by the adversarial a... 详细信息
来源: 评论
Entirety of Quantum Uncertainty and Its Experimental Verification
收藏 引用
Chinese Physics Letters 2021年 第7期38卷 11-16页
作者: Jie Xie Li Zhou Aonan Zhang Huichao Xu Man-Hong Yung Ping Xu Nengkun Yu Lijian Zhang National Laboratory of Solid State Microstructures College of Engineering and Applied Sciences and School of PhysicsNanjing UniversityNanjing 210093China Collaborative Innovation Center of Advanced Microstructures Nanjing UniversityNanjing 210093China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shenzhen Institute for Quantum Science and Engineering and Department of Physics Southern University of Science and TechnologyShenzhen 518055China Shenzhen Key Laboratory of Quantum Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Institute for Quantum Information&State Key Laboratory of High Performance Computing College of ComputerNational University of Defense TechnologyChangsha 410073China Centre for Quantum Software and Information School of SoftwareFaculty of Engineering and Information TechnologyUniversity of Technology SydneyNSWAustralia
As a foundation of quantum physics,uncertainty relations describe ultimate limit for the measurement uncertainty of incompatible ***,uncertainty relations are formulated by mathematical bounds for a specific *** we pr... 详细信息
来源: 评论
NEXT:a neural network framework for next POI recommendation
收藏 引用
Frontiers of Computer Science 2020年 第2期14卷 314-333页
作者: Zhiqian ZHANG Chenliang LI Zhiyong WU Aixin SUN Dengpan YE Xiangyang LUO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China Department of Computer Science The University of Hong KongPokfulam RoadHong Kong 999077China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore State Key Lab of Mathematical Engineering and Advanced Computing Zhengzhou 450001China
The task of next POI recommendations has been studied extensively in recent ***,developing a unified recommendation framework to incorporate multiple factors associated with both POIs and users remains challenging,bec... 详细信息
来源: 评论
A Privacy Preserving and Byzantine Robust Collaborative Federated Learning Method Design
A Privacy Preserving and Byzantine Robust Collaborative Fede...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Nuocheng Yang Sihua Wang Mingzhe Chen Changchuan Yin Christopher G. Brinton Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA School of Electrical and Computer Engineering Purdue University West Lafayette IN USA
Collaborative federated learning (CFL) enables device cooperation in training shared machine learning models without reliance on a parameter server. However, the absence of a parameter server also impacts vulnerabilit... 详细信息
来源: 评论
KANsformer for Scalable Beamforming
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Xie, Xinke Lu, Yang Chi, Chong-Yung Chen, Wei Ai, Bo Niyato, Dusit Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation Beijing100044 China Beijing Jiaotong University School of Computer Science and Technology Beijing100044 China National Tsing Hua University Institute of Communications Engineering Department of Electrical Engineering Hsinchu30013 Taiwan Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
This paper proposes an unsupervised deep-learning (DL) approach by integrating Transformer and Kolmogorov-Arnold networks (KAN) termed KANsformer to realize scalable beamforming for mobile communication systems. Speci... 详细信息
来源: 评论
NLGT: Neighborhood-based and Label-enhanced Graph Transformer Framework for Node Classification  39
NLGT: Neighborhood-based and Label-enhanced Graph Transforme...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Xiaolong Zhou, Yibo Xiang, Haolong Li, Xiaoyong Zhang, Xuyun Qi, Lianyong Dou, Wanchun School of Software Nanjing University of Information Science and Technology China Yunnan Key Laboratory of Service Computing Yunan University of Finance and Economics China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology China College of Meteorology and Oceanography National University of Defense Technology China School of Computing Macquarie University Australia College of Computer Science and Technology China University of Petroleum (East China) China State Key Laboratory for Novel Software Technology Nanjing University China
Graph Neural Networks (GNNs) are widely applied on graph-level tasks, such as node classification, link prediction and graph generation. Existing GNNs mostly adopt a message-passing mechanism to aggregate node informa... 详细信息
来源: 评论
A differential public PUF design for lightweight authentication  16
A differential public PUF design for lightweight authenticat...
收藏 引用
2021 International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, SMACD 2021 and 16th Conference on PhD Research in Microelectronics and Electronics, PRIME 2021
作者: Duan, Shengyu Sai, Gaole School of Computer Engineering and Science Shanghai University Shanghai200444 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology China
Physical Unclonable Functions (PUFs) have emerged as a promising primitive to provide a hardware keyless security mechanism for integrated circuit applications. Public PUFs (PPUFs) address the crucial PUF vulnerabilit... 详细信息
来源: 评论
IRS-Enhanced Anti-Jamming Precoding Against DISCO Physical Layer Jamming Attacks
IRS-Enhanced Anti-Jamming Precoding Against DISCO Physical L...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Huan Huang Hongliang Zhang Yi Cai Yunjing Zhang A. Lee Swindlehurst Zhu Han Electronic Information School Soochow University Suzhou China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Peking University Beijing China Department of Electrical and Computer Engineering University of Houston Houston USA Center for Pervasive Communications and Computing University of California Irvine USA
Illegitimate intelligent reflective surfaces (IRSs) can pose significant physical layer security risks on multi-user multiple-input single-output (MU-MISO) systems. Recently, a DISCO approach has been proposed an ille... 详细信息
来源: 评论