咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 152 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 99 篇 控制科学与工程
    • 86 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 74 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 421 篇 物理学
    • 252 篇 数学
    • 95 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 85 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,488 篇 英文
  • 58 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1581 条 记 录,以下是471-480 订阅
排序:
Visualizing nonlinear resonance in nanomechanical systems via single-electron tunneling
收藏 引用
Nano Research 2021年 第4期14卷 1156-1161页
作者: Xinhe Wang Lin Cong Dong Zhu Zi Yuan Xiaoyang Lin Weisheng Zhao Zaiqiao Bai Wenjie Liang Ximing Sun Guang-Wei Deng Kaili Jiang Fert Beijing Research Institute School of Microelectronics&Beijing Advanced Innovation Centre for Big Data and Brain Computing(BDBC)Beihang UniversityBeijing 100191China State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics and Tsinghua-Foxconn Nanotechnology Research CenterTsinghua UniversityBeijing 100084China Key Laboratory of Quantum Information CASUniversity of Science and Technology of ChinaHefei 230026China Department of Physics Beijing Normal UniversityBeijing 100875China Institute of Physics Chinese Academy of SciencesBeijing 100080China Institute of Nuclear and New Energy Technology Collaborative Innovation Center of Advanced Nuclear Energy TechnologyKey Laboratory of Advanced Reactor EngineeringTsinghua UniversityBeijing 100084China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu 610054China
Numerous reports have elucidated the importance of mechanical resonators comprising quantum-dot-embedded carbon nanotubes(CNTs)for studying the effects of single-electron ***,there is a need to investigate the single-... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
2021国际计算机前沿大会
作者: Wenning Zhang Qinglei Zhou Chongyang Jiao Ting Xu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhongyuan University of Technology Zhengzhou University
To solve the emerging complex optimization problems,multi objective optimization algorithms are *** introducing the surrogate model for approximate fitness calculation,the multi objective firefly algorithm with surrog...
来源: 评论
Outsourced secure ID3 decision tree algorithm over horizontally partitioned datasets with consortium blockchain  10
Outsourced secure ID3 decision tree algorithm over horizonta...
收藏 引用
10th International Conference on Communication and Network Security, ICCNS 2020
作者: Yang, Ming Hu, Xuexian Wei, Jianghog Zhang, Qihui Liu, Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China Guangxi Key Laboratory of Cryptography and Information Security Guilin Guangxi China
Due to the capacity of storing massive data and providing huge computing resources, cloud computing has been a desirable platform to assist machine learning in multiple-data-owners scenarios. However, the issue of dat... 详细信息
来源: 评论
Open Set Recognition for Encrypted Traffic using Intra-class Partition and Boundary Sample Generation
Open Set Recognition for Encrypted Traffic using Intra-class...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Xue Li Jinlong Fei Zan Qi Zhuo Lv Heng Jiang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China National Digital Switching System Engineering Technological Research Center PLA Information Engineering University Zhengzhou China
Existing deep learning-based encrypted traffic recognition methods can achieve high precision identification performance while protecting user privacy, but almost all of them focus on closed sets, in which training da... 详细信息
来源: 评论
Efficient Cache Strategy for Face Recognition System  20
Efficient Cache Strategy for Face Recognition System
收藏 引用
5th International Conference on Big Data and computing, ICBDC 2020
作者: Zong, Guoxiao Li, Qingbao Zhang, Ping Zhang, Guimin Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing NO.62 Science Avenue ZhengzhouCN 450001 China
Recently, the need for real-time deep learning applications, such as face recognition system, implement on the embedded devices is increasing. At the system level, caching system is one of the most effective ways to r... 详细信息
来源: 评论
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Jiawei Wang, Jinwei Wang, Hao Luo, Xiangyang Nanjing University of Information Science and Technology Nanjing China Nanjing University of Science and Technology Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
Malicious intelligent algorithms greatly threaten the security of social users’ privacy by detecting and analyzing the uploaded photos to social network platforms. The destruction to DNNs brought by the adversarial a... 详细信息
来源: 评论
Entirety of Quantum Uncertainty and Its Experimental Verification
收藏 引用
Chinese Physics Letters 2021年 第7期38卷 11-16页
作者: Jie Xie Li Zhou Aonan Zhang Huichao Xu Man-Hong Yung Ping Xu Nengkun Yu Lijian Zhang National Laboratory of Solid State Microstructures College of Engineering and Applied Sciences and School of PhysicsNanjing UniversityNanjing 210093China Collaborative Innovation Center of Advanced Microstructures Nanjing UniversityNanjing 210093China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shenzhen Institute for Quantum Science and Engineering and Department of Physics Southern University of Science and TechnologyShenzhen 518055China Shenzhen Key Laboratory of Quantum Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Institute for Quantum Information&State Key Laboratory of High Performance Computing College of ComputerNational University of Defense TechnologyChangsha 410073China Centre for Quantum Software and Information School of SoftwareFaculty of Engineering and Information TechnologyUniversity of Technology SydneyNSWAustralia
As a foundation of quantum physics,uncertainty relations describe ultimate limit for the measurement uncertainty of incompatible ***,uncertainty relations are formulated by mathematical bounds for a specific *** we pr... 详细信息
来源: 评论
NEXT:a neural network framework for next POI recommendation
收藏 引用
Frontiers of Computer Science 2020年 第2期14卷 314-333页
作者: Zhiqian ZHANG Chenliang LI Zhiyong WU Aixin SUN Dengpan YE Xiangyang LUO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China Department of Computer Science The University of Hong KongPokfulam RoadHong Kong 999077China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore State Key Lab of Mathematical Engineering and Advanced Computing Zhengzhou 450001China
The task of next POI recommendations has been studied extensively in recent ***,developing a unified recommendation framework to incorporate multiple factors associated with both POIs and users remains challenging,bec... 详细信息
来源: 评论
A Privacy Preserving and Byzantine Robust Collaborative Federated Learning Method Design
A Privacy Preserving and Byzantine Robust Collaborative Fede...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Nuocheng Yang Sihua Wang Mingzhe Chen Changchuan Yin Christopher G. Brinton Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA School of Electrical and Computer Engineering Purdue University West Lafayette IN USA
Collaborative federated learning (CFL) enables device cooperation in training shared machine learning models without reliance on a parameter server. However, the absence of a parameter server also impacts vulnerabilit... 详细信息
来源: 评论
KANsformer for Scalable Beamforming
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Xie, Xinke Lu, Yang Chi, Chong-Yung Chen, Wei Ai, Bo Niyato, Dusit Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation Beijing100044 China Beijing Jiaotong University School of Computer Science and Technology Beijing100044 China National Tsing Hua University Institute of Communications Engineering Department of Electrical Engineering Hsinchu30013 Taiwan Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
This paper proposes an unsupervised deep-learning (DL) approach by integrating Transformer and Kolmogorov-Arnold networks (KAN) termed KANsformer to realize scalable beamforming for mobile communication systems. Speci... 详细信息
来源: 评论