咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 754 篇 期刊文献

馆藏范围

  • 1,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,000 篇 工学
    • 620 篇 计算机科学与技术...
    • 501 篇 软件工程
    • 147 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 97 篇 控制科学与工程
    • 83 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 73 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 50 篇 机械工程
    • 48 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
    • 25 篇 冶金工程
    • 24 篇 力学(可授工学、理...
  • 737 篇 理学
    • 419 篇 物理学
    • 250 篇 数学
    • 94 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 83 篇 化学
    • 72 篇 地球物理学
    • 39 篇 系统科学
  • 184 篇 管理学
    • 119 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 31 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 27 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 620 篇 state key labora...
  • 103 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 85 篇 department of ph...
  • 85 篇 key laboratory f...
  • 82 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 79 篇 institute of fro...
  • 79 篇 school of physic...
  • 79 篇 school of physic...
  • 79 篇 moscow institute...
  • 79 篇 school of astron...
  • 78 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 76 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 bao y.w.
  • 67 篇 hu h.b.
  • 67 篇 liu b.
  • 64 篇 li xin
  • 62 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,489 篇 英文
  • 37 篇 中文
  • 36 篇 其他
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1559 条 记 录,以下是81-90 订阅
排序:
Social User Geolocation Method Based on POI Location Feature Enhancement in Context  1
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Liu, Yu Qiao, Yaqiong Liu, Yimin Du, Shaoyong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China School of Information Engineering North China University of Water Resources and Electric Power Zhengzhou China
The geolocation information in social media user generated text is one of the important bases for inferring users' location. The existing methods often rely on the mentioned Point of Interest (POI) and location In... 详细信息
来源: 评论
Data quantity governance for machine learning in materials science
收藏 引用
National Science Review 2023年 第7期10卷 234-250页
作者: Yue Liu Zhengwei Yang Xinxin Zou Shuchang Ma Dahui Liu Maxim Avdeev Siqi Shi School of Computer Engineering and Science Shanghai University Shanghai Engineering Research Center of Intelligent Computing System Australian Nuclear Science and Technology Organisation School of Chemistry The University of Sydney State Key Laboratory of Advanced Special Steel School of Materials Science and Engineering Shanghai University Materials Genome Institute Shanghai University
Data-driven machine learning(ML) is widely employed in the analysis of materials structure-activity relationships,performance optimization and materials design due to its superior ability to reveal latent data pattern... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  6
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Li, Chenwei Li, Zheming Yang, Bo Zhang, Hengwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论
Rotation Model Enhancement for Adversarial Attack
Rotation Model Enhancement for Adversarial Attack
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Li, Zheming Liu, Hao Yang, Bo Li, Chenwei Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur... 详细信息
来源: 评论
Traceability Method of Network Attack Based on Evolutionary Game
Traceability Method of Network Attack Based on Evolutionary ...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Zhang, Xiaoning Sun, Pengyu Liu, Xiaohu Ma, Junqiang Zhang, Yuchen State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz... 详细信息
来源: 评论
Code Clone Detection Based on Code Semantic Enhancement Model
Code Clone Detection Based on Code Semantic Enhancement Mode...
收藏 引用
2023 International Conference on Intelligent Communication and Computer engineering, ICICCE 2023
作者: Chunyan, Zhang Ziang, Shen Chen, Liang State Key of Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Beijing University of Civil Engineering and Architecture Department of Electrical and Information Engineering Beijing China
Code clones are code fragments that are similar in composition or semantics of code statements, which can significantly improve software development efficiency and reduce costs by improving the quality of reusable cod... 详细信息
来源: 评论
A Combination Method of Resampling and Random Forest for Imbalanced Data Classification  4
A Combination Method of Resampling and Random Forest for Imb...
收藏 引用
4th International Conference on Advances in Computer Technology, Information Science and Communications, CTISC 2022
作者: Zheng, Liu Han, Qiu Junhu, Zhu Information & Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the research of imbalanced data classification, the resampling effect of the existing resampling and random forest combination technology is greatly affected by the characteristic dimension of the training set, res... 详细信息
来源: 评论
Grover algorithm circuit optimization and noise analysis on integer factorization  7
Grover algorithm circuit optimization and noise analysis on ...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Song, Hui-Chao Liu, Xiao-Nan Jiang, Duo An, Jiale University of Information Engineering State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The classical computer is restricted by Moore's law and other factors into the development bottleneck, quantum computer by virtue of its natural acceleration advantage into the field of vision. Quantum computing c... 详细信息
来源: 评论
Color Image Steganalysis Algorithm Based on Quaternion Convolutional Neural Network  30th
Color Image Steganalysis Algorithm Based on Quaternion Convo...
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Xu, Meng Wang, Jinwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
Most of the images on the Internet are color images, and steganalysis of color images is a very critical issue in the field of steganalysis. The current proposed color image steganalysis features mainly rely on manual... 详细信息
来源: 评论
Pushing AI to wireless network edge: an overview on integrated sensing, communication, and computation towards 6G
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 7-25页
作者: Guangxu ZHU Zhonghao LYU Xiang JIAO Peixi LIU Mingzhe CHEN Jie XU Shuguang CUI Ping ZHANG Shenzhen Research Institute of Big Data Future Network of Intelligence Institute (FNii) The Chinese University of Hong Kong (Shenzhen) School of Science and Engineering (SSE) The Chinese University of Hong Kong (Shenzhen) State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Peking University Department of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Peng Cheng Laboratory State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-gen... 详细信息
来源: 评论