咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是531-540 订阅
排序:
Pre-ictal causal connectivity reveals the epileptic network characteristics for deep brain stimulation
收藏 引用
Neuroscience 2025年 579卷 329-343页
作者: Yifan Wang Tao Yu Yulan Ma Weigang Cui Xueyuan Wang Liankun Ren Yang Li Department of Automation Science and Electrical Engineering Beihang University Beijing 100191 China Beijing Institute of Functional Neurosurgery Department of Functional Neurosurgery Xuanwu Hospital Capital Medical University Beijing 100053 China School of Engineering Medicine Beihang University Beijing 100191 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing 100053 China Beijing Advanced Innovation Center for Big Data and Brain Computing State Key Laboratory of Virtual Reality Technology and Systems Department of Automation Science and Electrical Engineering Beihang University Beijing 100191 China
Deep brain stimulation of anterior nucleus of the thalamus (ANT-DBS) is an effective clinical treatment for drug-resistant focal epilepsy. However, the complex epileptic network characteristics underlying ANT-stimulat...
来源: 评论
LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks  19
LEFV: A Lightweight and Efficient System for Face Verificati...
收藏 引用
Proceedings of the 3rd International Conference on Video and Image Processing
作者: Ming Liu Ping Zhang Qingbao Li Jinjin Liu Zhifeng Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The emergence of deep learning has made great progress in face recognition. With the popularization of embedded devices, deploying the deep model on embedded devices has become a trend. Most high-precision models requ... 详细信息
来源: 评论
Efficient Low-Resolution Face Recognition via Bridge Distillation
arXiv
收藏 引用
arXiv 2024年
作者: Ge, Shiming Zhao, Shengwei Li, Chenyu Zhang, Yu Li, Jia The Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China SenseTime Group Limited 100084 China The State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China The Peng Cheng Laboratory Shenzhen518055 China
Face recognition in the wild is now advancing towards light-weight models, fast inference speed and resolution-adapted capability. In this paper, we propose a bridge distillation approach to turn a complex face model ... 详细信息
来源: 评论
Software Supply Chain Analysis Based on Function Similarity
Software Supply Chain Analysis Based on Function Similarity
收藏 引用
作者: Wenjie Sun Zheng Shan Fudong liu Xingwei Li Meng Qiao Chunyan Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing
The supply of open source and open source components is growing at an alarming rate,while vulnerabilities in open source components are *** supply chain analysis aims to discover third-party components and open source... 详细信息
来源: 评论
Ultra-Fast Mini License Plate Recognition System Based-on Vision Processing Unit  2
Ultra-Fast Mini License Plate Recognition System Based-on Vi...
收藏 引用
2nd International Conference on Big-Data Service and Intelligent Computation, BDSIC 2020
作者: Wang, Junhui Ren, Shuangyin He, Jiezhong Ji, Xiaolan Huang, Diqing College of Computer National University of Defense Technology State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Computer National University of Defense Technology
As more embedded environments need license plate recognition systems, how to recognize car plates with high speed/accuracy and low energy has become an important and challenging problem. In this paper, we propose a ul... 详细信息
来源: 评论
NAS Honeypot Technology Based on Attack Chain
NAS Honeypot Technology Based on Attack Chain
收藏 引用
作者: Bing Liu Hui Shu Fei Kang State Key Laboratory of Mathematical Engineering and Advanced Computing
With the wide application of network attached storage(NAS), the security problem is becoming more and more serious, together with the increasingly fierce attacks against NAS devices of different manufacturers. In orde... 详细信息
来源: 评论
Field-tuned magnetic structure and phase diagram of the honeycomb magnet YbCl_(3)
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2021年 第3期64卷 84-89页
作者: YiQing Hao HongLiang Wo YiMeng Gu XiaoWen Zhang YiQing Gu ShiYi Zheng Yang Zhao GuangYong Xu Jeffrey WLynn Kenji Nakajima Naoki Murai WenBin Wang Jun Zhao State Key Laboratory of Surface Physics and Department of Physics Fudan UniversityShanghai 200433China NIST Center for Neutron Research National Institute of Standards and TechnologyGaithersburg 20899USA Department of Materials Science and Engineering University of MarylandCollege Park 20742USA J-PARC Center Japan Atomic Energy Agency(JAEA)Ibaraki 319-1195Japan Institute of Nanoelectronic Devices and Quantum Computing Fudan UniversityShanghai 200433China Collaborative Innovation Center of Advanced Microstructures Nanjing 210093China
We report thermodynamic and neutron diffraction measurements on the magnetic ordering properties of the honeycomb lattice magnet YbCl_(3). We find YbCl_(3) exhibits a Ne′el type long-range magnetic order at the wavev... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
作者: Jinzhu Wang Ruijie Cai Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing
Cisco IOS is an operating system that runs on Cisco routing and switching *** security is important to the entire *** vulnerability attacks have become one of the main sources of threat to Cisco IOS security,it is nec... 详细信息
来源: 评论
Thin-film neural networks for optical inverse problem
收藏 引用
Light(advanced Manufacturing) 2021年 第4期2卷 23-30页
作者: Lingjie Fan Ang Chen Tongyu Li Jiao Chu Yang Tang Jiajun Wang Maoxiong Zhao Tangyao Shen Minjia Zheng Fang Guan Haiwei Yin Lei Shi Jian Zi State Key Laboratory of Surface Physics Key Laboratory of Micro-and Nano-Photonic Structures(Ministry of Education)and Department of PhysicsFudan UniversityShanghai 200433China Shanghai Engineering Research Center of Optical Metrology for Nano-fabrication(SERCOM) Shanghai 200433China Institute for Nanoelectronic devices and Quantum computing Fudan UniversityShanghai 200438China Collaborative Innovation Center of Advanced Microsstructures Nanjing UniversityNanjing 210093China
The thin-film optical inverse problem has attracted a great deal of attention in science and industry,and is widely applied to optical ***,as the number of layers increases,the time it takes to extract the parameters ... 详细信息
来源: 评论
Arbitrary coherent distributions in a programmable quantum walk
收藏 引用
Physical Review Research 2022年 第2期4卷 023042-023042页
作者: Rong Zhang Ran Yang Jian Guo Chang-Wei Sun Yi-Chen Liu Heng Zhou Ping Xu Zhenda Xie Yan-Xiao Gong Shi-Ning Zhu National Laboratory of Solid State Microstructure School of Physics School of Electronic Science and Engineering and Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing 210093 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunication Nanjing 210023 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Institute for Quantum Information and State Key Laboratory of High Performance Computing College of Computing National University of Defense Technology Changsha 410073 China
The coherent superposition of position states in a quantum walk (QW) can be precisely engineered towards the desired distributions to meet the need of quantum information applications. The coherent distribution can ma... 详细信息
来源: 评论