咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 783 篇 期刊文献

馆藏范围

  • 1,593 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,024 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 154 篇 信息与通信工程
    • 136 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 101 篇 控制科学与工程
    • 88 篇 化学工程与技术
    • 80 篇 生物工程
    • 77 篇 材料科学与工程(可...
    • 76 篇 网络空间安全
    • 70 篇 光学工程
    • 53 篇 机械工程
    • 49 篇 仪器科学与技术
    • 44 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 751 篇 理学
    • 424 篇 物理学
    • 251 篇 数学
    • 96 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 87 篇 化学
    • 74 篇 地球物理学
    • 40 篇 系统科学
  • 187 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 30 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 28 篇 cosmic rays
  • 28 篇 network security
  • 26 篇 security
  • 26 篇 training
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 632 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 79 篇 fang j.
  • 79 篇 feng c.f.
  • 79 篇 jiang k.
  • 78 篇 bastieri d.
  • 78 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 71 篇 guo y.q.
  • 70 篇 chen m.j.
  • 70 篇 bao y.w.
  • 69 篇 li cheng
  • 69 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 li xin
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 1,408 篇 英文
  • 151 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1593 条 记 录,以下是281-290 订阅
A Multi-DOF Robot System Based on LightGBM-Driven EEG Decoding Model for BCI Human-Machine Interaction  42
A Multi-DOF Robot System Based on LightGBM-Driven EEG Decodi...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Yan, Weidong Xu, Zhaoliang Li, Yang Beihang University The Department of Automation Science and Electrical Engineering Beijing100191 China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing100191 China Beihang University State Key Laboratory of Virtual Reality Technology and Systems Beijing100191 China Advanced Institute of Information Technology Peking University Hangzhou310000 China
In this study, a multi-degree-of-freedom (Multi-DOF) robot (MDR) system based on a LightGBM-driven electroencephalogram (EEG) decoding model is designed and developed to assist subjects with hand motor dysfunction in ... 详细信息
来源: 评论
Super-Resolution of Diffusion-Weighted Images via TDI-Conditioned Diffusion Model  15th
Super-Resolution of Diffusion-Weighted Images via TDI-Cond...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Ma, Jiquan Teng, Yujun Chen, Geng Jiang, Haotian Zhang, Kai Liu, Feihong Rekik, Islem Shen, Dinggang School of Computer Science and Technology Heilongjiang University Harbin China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an China School of Biomedical Engineering and State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China School of Information Science and Technology Northwest University Xi’an China BASIRA Lab Imperial-X and Department of Computing Imperial College London London United Kingdom
Diffusion-Weighted Imaging (DWI) is a significant technique for studying white matter. However, it suffers from low-resolution obstacles in clinical settings. Post-acquisition Super-Resolution (SR) can enhance the res... 详细信息
来源: 评论
Preparation and Simulation of Quantum states of Matrices  6
Preparation and Simulation of Quantum States of Matrices
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Liu, Zhengyu Liu, Xiaonan Xie, Haoshan Zhao, Chenyan School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450000 China National Supercomputing Center in Zhengzhou Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450000 China
A basic problem of quantum computing is how to effectively express classical data in quantum systems. This problem is called state preparation problem, and the process of preparing quantum states is called coding. In ... 详细信息
来源: 评论
Path planning of UAV base station based on deep reinforcement learning  12
Path planning of UAV base station based on deep reinforcemen...
收藏 引用
12th International Conference on Identification, Information and Knowledge in the internet of Things, IIKI 2021
作者: Yang, Siming Shan, Zheng Cao, Jiang Gao, Yuan Guo, Yang Wang, Ping Wang, Xiaonan Wang, Jing Zhang, Tingting Guo, Jiayu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China Academy of Military Science of the PLA Beijing100091 China Network Technology Research Center of the PLA Beijing100090 China
UAV base station platform has become the current research hotspot of assisting ground base station for wireless *** present, the most important issue is how to make path planning to provide the stable communication gu... 详细信息
来源: 评论
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System  3
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
3rd International Conference on advanced Information Science and System, AISS 2021
作者: Liu, Jinjin Chen, Zhifeng Li, Xiaonan Wei, Tongxin School of Computer Science Zhongyuan University of Technology China and State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer Science Zhongyuan University of Technology China School of Cyberspace Security Zhengzhou University China
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
A Multi-Head Convolution Network with Attention Consistency for Facial Expression Recognition  42
A Multi-Head Convolution Network with Attention Consistency ...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Liu, Wenkang Sun, Mingyi Li, Yang Beihang University The Department of Automation Science and Electrical Engineering Beijing100191 China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing100191 China Beihang University State Key Laboratory of Virtual Reality Technology and Systems Beijing100191 China Peking University Advanced Institute of Information Technology Hangzhou310000 China
In recent years, the demand for facial expression recognition applications has increased rapidly, and its research has received extensive attention from researchers. However, the current recognition methods based on d... 详细信息
来源: 评论
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
2021 IEEE Conference on Telecommunications, Optics and Computer Science, TOCS 2021
作者: Li, Zhuolun Kang, Fei Yu, Pu Shu, Hui Zhengzhou University School of Software Zhengzhou China Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论
A Review on IoT Botnet  2021
A Review on IoT Botnet
收藏 引用
2nd International Conference on computing and Data Science, CONF-CDS 2021
作者: Zhao, Hao Shu, Hui Xing, Ying State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China
The rapid development of the Internet of Things (IoT) also generates security threats that cannot be ignored. This paper lists the development history of botnets, introduces representative IoT botnets, and reveals the... 详细信息
来源: 评论
A Formal Verification Method for Security Protocol Implementations Based on Model Learning and Tamarin  6
A Formal Verification Method for Security Protocol Implement...
收藏 引用
2021 6th International Symposium on Advances in Electrical, Electronics and Computer engineering, ISAEECE 2021
作者: Zhang, Xieli Zhu, Yuefei Gu, Chunxiang Miao, Xuyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan450002 China
The verification of security protocol implementations is notoriously difficult and important. In this paper, combining with the model learning using Tamarin, a formal verification tool of protocol specification, a for... 详细信息
来源: 评论
Rotation Transformation: A Method to Improve the Transferability of Adversarial Examples
Rotation Transformation: A Method to Improve the Transferabi...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Li, Zheming Zhang, Hengwei Ma, Junqiang Yang, Bo Li, Chenwei Li, Jingwen Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China PLA Army Staff Department Beijing China
Convolutional neural network models are fragile to adversarial examples. Adding disturbances that humans cannot observe in clean images can make the model classification error. Among the adversarial attack methods, wh... 详细信息
来源: 评论