咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是511-520 订阅
排序:
A Novel Method for Detection of ECG with Deep Learning  7
A Novel Method for Detection of ECG with Deep Learning
收藏 引用
7th International Conference on Computer and Communications, ICCC 2021
作者: Wang, Haiyan Zhou, Yanjie Zhou, Bing Wang, Zongmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Simulation Experiment Centre Zhengzhou University of Aeronautics Zhengzhou China Collaborative Innovation Centre For Internet Healthcare Zhengzhou University Zhengzhou China School of Management Engineering Zhengzhou University Zhengzhou China School of Information Engineering Zhengzhou University Zhengzhou China
With the rapid development of machine learning and deep learning, ECG intelligent detection models lean more heavily on the labeled data. However, the development of ECG annotation cannot satisfy the development of an... 详细信息
来源: 评论
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
Telecommunications, Optics and Computer Science (TOCS), IEEE Conference on
作者: Zhuolun Li Fei Kang Pu Yu Hui Shu School of Software Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing MEAC Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论
A quantum-classical hybrid algorithm with Ising model for the learning with errors problem
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Muxi Zeng, Jinfeng Yang, Wentao Chang, Pei-Jie Yan, Bao Zhang, Haoran Wang, Min Wei, Shijie Long, Gui-Lu Beijing Academy of Quantum Information Sciences Beijing100193 China State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics Tsinghua University Beijing100084 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University Singapore Singapore Frontier Science Center for Quantum Information Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing100084 China
The Learning-With-Errors (LWE) problem is a crucial computational challenge with significant implications for post-quantum cryptography and computational learning theory. Here we propose a quantum-classical hybrid alg... 详细信息
来源: 评论
Real-Time Source-Independent Quantum Random Number Generator Based on a Cloud Superconducting Quantum Computer
Research Square
收藏 引用
Research Square 2021年
作者: Li, Yuanhao Fei, Yangyang Wang, Weilong Meng, Xiangdong Wang, Hong Duan, Qianheng Ma, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450001 China
Quantum random number generator (QRNG) relies on the intrinsic randomness of quantum mechanics to produce true random numbers which are important in information processing tasks. Due to the presence of the superpositi... 详细信息
来源: 评论
A differential privacy preserving algorithm for greedy decision tree
A differential privacy preserving algorithm for greedy decis...
收藏 引用
Big Data & Artificial Intelligence & Software engineering (ICBASE), International Conference on
作者: Shudan Yang Nan Li Daozhu Sun Qiming Du Wenfu Liu Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing College of Cyberspace Security Zhengzhou China
In recent years, the contradiction between data application and privacy protection has become increasingly prominent, and differential privacy is considered an effective technology to resolve this contradiction. There... 详细信息
来源: 评论
Function Projective Synchronization of Chaotic PMSMs with Certain and Uncertain System Parameters
Function Projective Synchronization of Chaotic PMSMs with Ce...
收藏 引用
Chinese Automation Congress (CAC)
作者: Mufeng Wang Ke Liu Yangyang Geng Xin Che Jingpei Wang College of Control Science&Engineering Zhejiang University Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, driven by huge engineering demands, industrial Cyber-Physical System (iCPS) has developed rapidly. As an important energy conversion device in iCPS, stable operation of permanent magnet synchronous mo... 详细信息
来源: 评论
Progressive Multi-Stage Feature Mix for Person Re-Identification
Progressive Multi-Stage Feature Mix for Person Re-Identifica...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yan Zhang Binyu He Li Sun Qingli Li Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Image features from a small local region often give strong evidence in person re-identification task. However, CNN suffers from paying too much attention on the most salient local areas, thus ignoring other discrimina... 详细信息
来源: 评论
ARIW-Framework: Adaptive Robust Iterative Watermarking Framework
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Shaowu Lu, Wei Zeng, Liting Luo, Xiangyang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid rise of large models, copyright protection for generated image content has become a critical security challenge. Although deep learning watermarking techniques offer an effective solution for digital im... 详细信息
来源: 评论
Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Liqin Lu, Wei Hu, Qianyue Luo, Xiangyang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The success of face recognition (FR) systems has led to serious privacy concerns due to potential unauthorized surveillance and user tracking on social networks. Existing methods for enhancing privacy fail to generate... 详细信息
来源: 评论
NOMANet: A Graph Neural Network Enabled Power Allocation Scheme for NOMA
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Yipu Lu, Yang Chen, Wei Ai, Bo Niyato, Dusit Ding, Zhiguo State Key Laboratory of Advanced Rail Autonomous Operation China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China College of Computing and Data Science Nanyang Technological University 639798 Singapore Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates
This paper proposes a graph neural network (GNN) enabled power allocation scheme for non-orthogonal multiple access (NOMA) networks. In particular, a downlink scenario with one base station serving multiple users over... 详细信息
来源: 评论