咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是271-280 订阅
排序:
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System  3
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
3rd International Conference on advanced Information Science and System, AISS 2021
作者: Liu, Jinjin Chen, Zhifeng Li, Xiaonan Wei, Tongxin School of Computer Science Zhongyuan University of Technology China and State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer Science Zhongyuan University of Technology China School of Cyberspace Security Zhengzhou University China
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
Distributed Truss Computation in Dynamic Graphs
收藏 引用
Tsinghua Science and Technology 2023年 第5期28卷 873-887页
作者: Ziwei Mo Qi Luo Dongxiao Yu Hao Sheng Jiguo Yu Xiuzhen Cheng School of Computer Science and Technology Shandong UniversityQingdao 266200China State Key Laboratory of Software Development Environment School of Computer Science and Engineering and the Beijing Advanced Innovation Center for Big Data and Brain ComputingBeihang UniversityBeijing 100191China Big Data Institute Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China
Large-scale graphs usually exhibit global sparsity with local cohesiveness,and mining the representative cohesive subgraphs is a fundamental problem in graph *** k-truss is one of the most commonly studied cohesive su... 详细信息
来源: 评论
Code Clone Detection Based on Code Semantic Enhancement Model
Code Clone Detection Based on Code Semantic Enhancement Mode...
收藏 引用
Intelligent Communication and Computer engineering (ICICCE), International Conference on
作者: Zhang Chunyan Shen Ziang Liang Chen State Key of Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Department of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture Beijing China
Code clones are code fragments that are similar in composition or semantics of code statements, which can significantly improve software development efficiency and reduce costs by improving the quality of reusable cod...
来源: 评论
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
2021 IEEE Conference on Telecommunications, Optics and Computer Science, TOCS 2021
作者: Li, Zhuolun Kang, Fei Yu, Pu Shu, Hui Zhengzhou University School of Software Zhengzhou China Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论
A Graph Reasoning Model Based on Multiple Types of Nodes  7
A Graph Reasoning Model Based on Multiple Types of Nodes
收藏 引用
7th International Conference on Big Data and Information Analytics, BigDIA 2021
作者: Liu, Yibing Huo, Lijun Zhou, Gang Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National University of Defense Technology Key Laboratory of Information System Engineering Changsha China
Multi-hop machine reading comprehension (MRC) depends on the model to answer a semantically related question based on the given supporting text. In this study, inspired by previous research about Graph Neural Network(... 详细信息
来源: 评论
A Review on IoT Botnet  2021
A Review on IoT Botnet
收藏 引用
2nd International Conference on computing and Data Science, CONF-CDS 2021
作者: Zhao, Hao Shu, Hui Xing, Ying State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China
The rapid development of the Internet of Things (IoT) also generates security threats that cannot be ignored. This paper lists the development history of botnets, introduces representative IoT botnets, and reveals the... 详细信息
来源: 评论
Preparation and Simulation of Quantum states of Matrices  6
Preparation and Simulation of Quantum States of Matrices
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Liu, Zhengyu Liu, Xiaonan Xie, Haoshan Zhao, Chenyan School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450000 China National Supercomputing Center in Zhengzhou Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450000 China
A basic problem of quantum computing is how to effectively express classical data in quantum systems. This problem is called state preparation problem, and the process of preparing quantum states is called coding. In ... 详细信息
来源: 评论
Medical image registration and its application in retinal images:a review
收藏 引用
Visual computing for Industry,Biomedicine,and Art 2024年 第1期7卷 142-164页
作者: Qiushi Nie Xiaoqing Zhang Yan Hu Mingdao Gong Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Center for High Performance Computing and Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Singapore Eye Research Institute Singapore 169856Singapore State Key Laboratory of Ophthalmology Optometry and Visual ScienceEye HospitalWenzhou Medical UniversityWenzhou 325027China
Medical image registration is vital for disease diagnosis and treatment with its ability to merge diverse informa-tion of images,which may be captured under different times,angles,or *** several surveys have reviewed ... 详细信息
来源: 评论
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Jinwei Wu, Hao Wang, Haihua Zhang, Jiawei Luo, Xiangyang Ma, Bin Nanjing University of Information Science and Technology China State Key Laboratory of Mathematical Engineering and Advanced Computing China Qilu University of Technology China
The vulnerability of Deep Neural Networks (DNNs) to adversarial examples has been confirmed. Existing adversarial defenses primarily aim at preventing adversarial examples from attacking DNNs successfully, rather than... 详细信息
来源: 评论
Publicly Verifiable Private Set Intersection from Homomorphic Encryption  8th
Publicly Verifiable Private Set Intersection from Homomorph...
收藏 引用
8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022
作者: Jiang, Yuting Wei, Jianghong Pan, Jing Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Guangzhou Institute of Technology Xidian University Guanzhou510555 China
Private Set Intersection (PSI) enables two mistrusting parties to securely evaluate the intersection of their private inputs, without revealing any additional information. With its wide application in privacy protecti... 详细信息
来源: 评论