咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是231-240 订阅
排序:
Synthesis of Decoherence-Free Modes in Linear Quantum Passive Systems via Robust Pole Placement
Synthesis of Decoherence-Free Modes in Linear Quantum Passiv...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Miao, Zibo Pan, Yu Gao, Qing School of Mechanical Engineering and Automation Adaptive Robotics Harbin Institute of Technology Guangdong Key Laboratory of Intelligent Morphing Mechanisms Shenzhen518055 China The Institute of Cyber-Systems and Control College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China The School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China
In this paper we extend our previous research on coherent observer-based pole placement approach to study the synthesis of robust decoherence-free (DF) modes for linear quantum passive systems, which is aimed at prese... 详细信息
来源: 评论
DSSA: Dual-Side Sparse Systolic Array Architecture for Accelerating Convolutional Neural Network Training  22
DSSA: Dual-Side Sparse Systolic Array Architecture for Accel...
收藏 引用
Proceedings of the 51st International Conference on Parallel Processing
作者: Zhengbo Chen Qi Yu Fang Zheng Feng Guo Zuoning Chen Information Engineering University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Chinese Academy of Engineering China
Ever-growing CNN size incurs a significant amount of redundancy in model parameters, which in turn, puts considerable burden on hardware. Unstructured pruning is widely used to reduce model sparsity. While, the irregu... 详细信息
来源: 评论
High-performance optimization of SM4-GCM based on FPGA
High-performance optimization of SM4-GCM based on FPGA
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Shun Sen Lv Bin Li Xiaojie Chen Qinglei Zhou School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathmatical Engineering and Advanced Computing Zhengzhou China Schoo of Information Engineering Zhengzhou University Zhengzhou China
SM4-GCM is an encryption algorithm with authentication function. The algorithm achieves the purpose of data security and information integrity. The SM4-GCM algorithm, implemented using traditional software methods, ha... 详细信息
来源: 评论
Personalized Federated Learning with Collaborative Aggregation Networks for Multi-Site Brain Disorder Diagnosis  4
Personalized Federated Learning with Collaborative Aggregati...
收藏 引用
4th International Conference on Industrial Automation, Robotics and Control engineering, IARCE 2024
作者: Si, Qian Li, Yang School of Cyber Science and Technology Beihang University Beijing China Department of Automation Science and Electrical Engineering The Beijing Advanced Innovation Center for Big Data and Brain Computing State Key Laboratory of Virtual Reality Technology and Systems Beijing China Advanced Institute of Information Technology Peking University Beijing China Beihang University Beijing China
In multi-site brain disease diagnosis studies, traditional centralized training methods necessitate sharing medical data, posing significant privacy risks. Federated learning (FL) offers a privacy-preserving solution ... 详细信息
来源: 评论
Focus, Distinguish, and Prompt: Unleashing CLIP for Efficient and Flexible Scene Text Retrieval  24
Focus, Distinguish, and Prompt: Unleashing CLIP for Efficien...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zeng, Gangyan Zhang, Yuan Wei, Jin Yang, Dongbao Zhang, Peng Gao, Yiwen Qin, Xugong Zhou, Yu School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China Lenovo Research Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China TMCC College of Computer Science Nankai University Tianjin China
Scene text retrieval aims to find all images containing the query text from an image gallery. Current efforts tend to adopt an Optical Character Recognition (OCR) pipeline, which requires complicated text detection an... 详细信息
来源: 评论
Optimal scheme for dynamic adjustment of active mirror in FAST system  2021
Optimal scheme for dynamic adjustment of active mirror in FA...
收藏 引用
2021 5th International Conference on Computer Science and Artificial Intelligence
作者: Hongchuan Zhou Jiaqi Liu Junyan Song Benchao Yang State Key Laboratory of Mathematical Engineering and advanced computing China
This paper mainly studies the optimal scheme of dynamic adjustment of active mirror in FAST system by establishing mathematical model. According to the constraints such as distance variation range, a mathematical mode... 详细信息
来源: 评论
A Survey on Knowledge Graph Representation Learning with Text Information  21
A Survey on Knowledge Graph Representation Learning with Tex...
收藏 引用
Proceedings of the 3rd World Symposium on Software engineering
作者: Ling Wang Jicang Lu Gang Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing China
Knowledge graph representation learning provides a lot of help for subsequent tasks such as knowledge graph completion, information retrieval, and intelligent question answering. By representing the knowledge graph as... 详细信息
来源: 评论
Open Set Recognition for Encrypted Traffic using Intra-class Partition and Boundary Sample Generation  5
Open Set Recognition for Encrypted Traffic using Intra-class...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Li, Xue Fei, Jinlong Qi, Zan Lv, Zhuo Jiang, Heng PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China PLA Information Engineering University National Digital Switching System Engineering Technological Research Center Zhengzhou China
Existing deep learning-based encrypted traffic recognition methods can achieve high precision identification performance while protecting user privacy, but almost all of them focus on closed sets, in which training da... 详细信息
来源: 评论
Software Vulnerability Mining Techniques Based on Data Fusion and Reverse engineering
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Liu, Tieming State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Software vulnerability mining is an important component of network attack and defense technology. To address the problems of high leakage rate and false positive rate of existing static analysis methods, this paper pr... 详细信息
来源: 评论
Attention-aligned mean-teacher learning for unsupervised domain adaptive person re-ID
收藏 引用
Science China Technological Sciences 2025年
作者: You LYU Zhen ZHANG Guoliang KANG Wei WEI Institute of Artificial Intelligence Beihang University Key Laboratory of Mathematics Informatics Behavioral Semantics Ministry of Education Beihang University State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University School of Automation Science and Electrical Engineering Beihang University AVICAS Generic Technology Co. Ltd Zhongguancun Laboratory School of Mathematics Sciences Beihang University
In recent years, artificial intelligence has fueled the development of numerous applications [1, 2]. Person re-identification (re-ID) is a typical artificial intelligence system designed to automatically retrieve imag...
来源: 评论