咨询与建议

限定检索结果

文献类型

  • 2,122 篇 期刊文献
  • 1,604 篇 会议
  • 3 册 图书

馆藏范围

  • 3,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,409 篇 工学
    • 1,413 篇 计算机科学与技术...
    • 1,104 篇 软件工程
    • 390 篇 信息与通信工程
    • 346 篇 电子科学与技术(可...
    • 328 篇 电气工程
    • 265 篇 控制科学与工程
    • 206 篇 化学工程与技术
    • 194 篇 生物工程
    • 188 篇 光学工程
    • 175 篇 机械工程
    • 168 篇 材料科学与工程(可...
    • 121 篇 动力工程及工程热...
    • 120 篇 仪器科学与技术
    • 118 篇 网络空间安全
    • 106 篇 生物医学工程(可授...
    • 104 篇 力学(可授工学、理...
    • 69 篇 交通运输工程
    • 62 篇 土木工程
    • 60 篇 安全科学与工程
  • 1,811 篇 理学
    • 858 篇 数学
    • 808 篇 物理学
    • 238 篇 统计学(可授理学、...
    • 232 篇 生物学
    • 200 篇 化学
    • 129 篇 系统科学
    • 92 篇 地球物理学
  • 473 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 98 篇 工商管理
  • 86 篇 医学
    • 74 篇 临床医学
  • 62 篇 法学
  • 42 篇 经济学
  • 22 篇 军事学
  • 21 篇 农学
  • 10 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 55 篇 semantics
  • 55 篇 feature extracti...
  • 53 篇 deep learning
  • 53 篇 machine learning
  • 51 篇 training
  • 46 篇 computational mo...
  • 44 篇 optimization
  • 36 篇 data models
  • 33 篇 security
  • 31 篇 network security
  • 31 篇 cryptography
  • 30 篇 software
  • 28 篇 robustness
  • 27 篇 cosmic rays
  • 27 篇 algorithm design...
  • 23 篇 deep neural netw...
  • 23 篇 data mining
  • 23 篇 protocols
  • 23 篇 malware
  • 23 篇 nuclear structur...

机构

  • 618 篇 state key labora...
  • 155 篇 university of ch...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 91 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 82 篇 school of physic...
  • 80 篇 center for astro...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 73 篇 state key labora...
  • 72 篇 school of physic...
  • 70 篇 national astrono...
  • 69 篇 school of physic...
  • 67 篇 national space s...
  • 64 篇 moscow institute...
  • 63 篇 state key labora...

作者

  • 84 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 liu d.
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 li xin
  • 66 篇 guo y.q.
  • 66 篇 danzengluobu
  • 64 篇 bao y.w.
  • 64 篇 liu b.
  • 62 篇 min z.
  • 62 篇 hu h.b.
  • 60 篇 liu h.d.

语言

  • 3,533 篇 英文
  • 113 篇 其他
  • 87 篇 中文
检索条件"机构=State Key Laboratory of Scientfic/Engineering Computing"
3729 条 记 录,以下是1-10 订阅
排序:
Pre-trained Semantic Interaction based Inductive Graph Neural Networks for Text Classification  31
Pre-trained Semantic Interaction based Inductive Graph Neura...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Shiyu Zhou, Gang Lu, Jicang Chen, Jing Huang, Ningbo State Key Laboratory of Mathematical Engineering and Advanced Computing China
Nowadays, research of Text Classification (TC) based on graph neural networks (GNNs) is on the rise. Both inductive methods and transductive methods have made significant progress. For transductive methods, the semant... 详细信息
来源: 评论
Research on Intrusion Tolerance System Based on Behavioral Baseline and Defense-in-Depth Architecture
Research on Intrusion Tolerance System Based on Behavioral B...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Meng, Qi Wang, Xuemeng Yang, Kai Meng, Long Wang, Jiancheng Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
Tolerance technology is the third-generation network security technology commonly used in the world. It is derived from the category of information survival and endogenous security technology. A scholar from Carnegie ... 详细信息
来源: 评论
Social Media User Geolocation Based on Large Language Models  2nd
Social Media User Geolocation Based on Large Language Model...
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Zhang, Meng Luo, Xiangyang Huang, Ningbo Key Laboratory of Cyberspace Situation Awareness of Henan Province Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
In the digital age, social media platforms have amassed a wealth of user-generated content, which contains valuable geographic information. However, the irregularities and noise in user-generated text, have led to sub... 详细信息
来源: 评论
Adaptive cyclic gradient methods with interpolation
收藏 引用
Computational Optimization and Applications 2025年 1-25页
作者: Xie, Yixin Sun, Cong Yuan, Ya-Xiang Beijing100876 China Ministry of Education Beijing100876 China State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and System Sciences Chinese Academy of Sciences Beijing100190 China
Gradient method is an important method for solving large scale problems. In this paper, a new gradient method framework for unconstrained optimization problem is proposed, where the stepsize is updated in a cyclic way... 详细信息
来源: 评论
On greedy randomized coordinate updating iteration methods for solving symmetric eigenvalue problems
收藏 引用
Applied Numerical Mathematics 2025年 216卷 76-97页
作者: Bai, Zhong-Zhi State Key Laboratory of Mathematical Sciences Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences P.O. Box 2719 Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
In order to compute the smallest eigenvalue and its corresponding eigenvector of a large-scale, real, and symmetric matrix, we propose a class of greedy randomized coordinate updating iteration methods based on the pr... 详细信息
来源: 评论
DidTrust: Privacy-Preserving Trust Management for Decentralized Identity
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 3105-3120页
作者: Yin, Jie Xiao, Yang Feng, Jie Yang, Mengmeng Pei, Qingqi Yi, Xun Xidian University State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing Xi’an710071 China Xidian University State Key Laboratory of Integrated ServicesNetworks School of Cyber Engineering Engineering Research Center of Trusted Digital Economy Universities of Shaanxi Province Xi’an710071 China Commonwealth Scientific and Industrial Research Organization CanberraACT2600 Australia RMIT University School of Computing Technologies MelbourneVIC3000 Australia
Decentralized identity (DID) is rapidly emerging as a promising alternative to centralized identity infrastructure, offering numerous real-world applications. However, existing DID systems are confronted with trust co... 详细信息
来源: 评论
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Pi, Qiankun Lu, Jicang Sun, Yepeng Fan, Qinlong Zhou, Xukun Shang, Shouxin State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
FASTEN: Video Event Localization Based on Audio-Visual Feature Alignment and Multi-Scale Temporal Enhancement
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2010-2014页
作者: Liu, Yin Wu, Qin Zeng, Mingyong Liu, Yahan Pan, Yuying Jiangnan University School of Artificial Intelligence and Computer Science Wuxi214122 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214083 China Jiangnan University School of Internet of Things Engineering Wuxi214122 China
The audio-visual event localization task investigates how audio and visual modalities can mutually enhance video event localization. Current methods often rely on single-modality features or lack effective initial ali... 详细信息
来源: 评论
Passive on-chip isolators based on the thin-film lithium niobate platform
收藏 引用
Chinese Physics B 2025年 第3期34卷 408-413页
作者: Jiacheng Liu Gongyu Xia Qilin Hong Pingyu Zhu Kai-Kai Zhang keyu Xia Ping Xu Shiqiao Qin Zhihong Zhu College of Advanced Interdisciplinary Studies&Hunan Provincial Key Laboratory of Novel Nano Optoelectronic Information Materials and Devices National University of Defense TechnologyChangsha 410073China Institute for Quantum Information and State Key Laboratory of High-Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China College of Engineering and Applied Sciences National Laboratory of Solid State Microstructuresand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210023China
Optical isolators,the photonic analogs of electronic diodes,are essential for ensuring the unidirectional flow of light in optical systems,thereby mitigating the destabilizing effects of back ***-film lithium niobate(... 详细信息
来源: 评论