咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1989 条 记 录,以下是531-540 订阅
排序:
DG-CNN:Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images
收藏 引用
Journal of Computer Science & Technology 2022年 第2期37卷 277-294页
作者: Xiao-Zheng Xie Jian-Wei Niu Senior Member Xue-Feng Liu Qing-Feng Li Yong Wang Jie Han Shaojie Tang State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang UniversityBeijing 100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityHangzhou 310051China Department of Diagnostic Ultrasound National Cancer CenterChinese Academy of Medical SciencesPeking Union Medical CollegeBeijing 100021China Naveen Jindal School of Management The University of Texas at DallasRichardsonTX 75080-3021U.S.A.
Although using convolutional neural networks(CNNs)for computer-aided diagnosis(CAD)has made tremendous progress in the last few years,the small medical datasets remain to be the major bottleneck in this *** address th... 详细信息
来源: 评论
Ultra-high-amplitude Peregrine solitons induced by helicoidal spin-orbit coupling
收藏 引用
Physical Review Research 2024年 第3期6卷 L032036-L032036页
作者: Cui-Cui Ding Qin Zhou B. A. Malomed Research Group of Nonlinear Optical Science and Technology Research Center of Nonlinear Science School of Mathematical and Physical Sciences State Key Laboratory of New Textile Materials and Advanced Processing Technologies Department of Physical Electronics School of Electrical Engineering Faculty of Engineering and the Center for Light-Matter University Instituto de Alta Investigación
In the framework of the model of a spatially nonuniform Bose-Einstein condensate with helicoidal spin-orbit (SO) coupling, we find abnormal Peregrine solitons (PSs) on top of flat and periodic backgrounds, with ultrah... 详细信息
来源: 评论
Robust Zero Watermarking Algorithm for Medical Images Using Local Binary Pattern and Discrete Cosine Transform  8th
Robust Zero Watermarking Algorithm for Medical Images Using ...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Liu, Wenyi Li, Jingbing Shao, Chunyan Ma, Jixin Huang, Mengxing Bhatti, Uzair Aslam School of Information and Communication Engineering Hainan University Haikou570228 China School of Computing and Mathematical Sciences University of Greenwich LondonSE10 9LS United Kingdom State Key Laboratory of Marine Resource Utilization in the South China Sea Hainan University Haikou570228 China
Thanks to the rapid development of the telemedicine, medical treatment has turned in great convenience. However, as the internet network can be addressed by any user, the medical images cannot avoid the defects of suf... 详细信息
来源: 评论
Continual Reinforcement Learning for Digital Twin Synchronization Optimization
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Tong, Haonan Chen, Mingzhe Zhao, Jun Hu, Ye Yang, Zhaohui Liu, Yuchen Yin, Changchuan Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence Beijing Advanced Information Network Laboratory Beijing China College of Computing and Data Science Singapore University of Miami Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing Coral Gables33146 United States University of Miami Department of Industrial and Systems Engineering Coral Gables33146 United States Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China North Carolina State University Department of Computer Science RaleighNC27695 United States Beijing Key Laboratory of Network System Architecture and Convergence China Beijing University of Posts and Telecommunications Beijing Advanced Information Network Laboratory Beijing100876 China
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously colle... 详细信息
来源: 评论
CATH: an effective method for detecting denial-of-service attacks in software defined networks
收藏 引用
Science China(Information Sciences) 2019年 第3期62卷 75-89页
作者: Yi GUO Fu MIAO Liancheng ZHANG Yu WANG State Key Laboratory of Mathematical Engineering and Advanced Computing Institute for Network Science and Cyberspace Tsinghua University School of Computer Science Henan University of Engineering
Software defined networks(SDNs) are innovative network frameworks that have recently received wide attention. Their programming flexibility facilitates automatic network management and control, thus mitigating existin... 详细信息
来源: 评论
Deepstsnet: Reconstructing the Quantum state-Resolved Thermochemical Nonequilibrium Flowfield Using Deep Neural Operator Learning With Scarce Data
SSRN
收藏 引用
SSRN 2023年
作者: Lv, Jiaqi Hong, Qizhen Wang, Xiaoyong Mao, Zhiping Sun, Quanhua State Key Laboratory of High Temperature Gas Dynamics Institute of Mechanics Chinese Academy of Sciences Beijing100190 China School of Engineering Science University of Chinese Academy of Sciences Beijing100049 China School of Mathematical Sciences Fujian Provincial Key Laboratory of Mathematical Modeling and High-Performance Scientific Computing Xiamen University Xiamen361005 China
The hypersonic flow is in a thermochemical nonequilibrium state due to the high-temperature caused by the strong shock compression. In a thermochemical nonequilibrium flow, the distribution of molecular internal energ... 详细信息
来源: 评论
Green Floating Blockchain-Empowered Co-Trust Security Mechanism with Energy Efficiency Against Attack Threat for 6G-IoV
Green Floating Blockchain-Empowered Co-Trust Security Mechan...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yibing Liu Lijun Huo Hansong Xu Qianqian Pan Jun Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Science and Technology on Information Systems Engineering Laboratory National University of Defense Technology Changsha China School of Engineering The University of Tokyo Tokyo Japan Graduate School of Information Production and Systems Waseda University Fukuoka Japan
The Internet of Vehicles (IoV) based on the 6-th Generation (6G) communication brings convenience, but also raises anxiety about information security. Researchers have developed static security schemes based on the bl...
来源: 评论
Breaking Limitation of Convergence in Continuous Optimization: Predefined-Time Gradient Flows
Breaking Limitation of Convergence in Continuous Optimizatio...
收藏 引用
IEEE Conference on Decision and Control
作者: Renyongkang Zhang Ge Guo Zhenyu Gao Miao Yu Lu Zhang Zhengsong Wang Meng Han Yanyan Yin College of Information Science and Engineering Northeastern University Shenyang China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang China School of Control Engineering Northeastern University at Qinhuangdao Qinhuangdao China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Perth Western Australia Australia
This paper investigates the continuous-time unconstrained optimization via dynamical gradient flow systems. For strongly convex objective functions, a gradient flow with predefined time convergence is proposed, which ... 详细信息
来源: 评论
A differential privacy preserving algorithm for greedy decision tree
A differential privacy preserving algorithm for greedy decis...
收藏 引用
Big Data & Artificial Intelligence & Software engineering (ICBASE), International Conference on
作者: Shudan Yang Nan Li Daozhu Sun Qiming Du Wenfu Liu Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing College of Cyberspace Security Zhengzhou China
In recent years, the contradiction between data application and privacy protection has become increasingly prominent, and differential privacy is considered an effective technology to resolve this contradiction. There... 详细信息
来源: 评论
Function Projective Synchronization of Chaotic PMSMs with Certain and Uncertain System Parameters
Function Projective Synchronization of Chaotic PMSMs with Ce...
收藏 引用
Chinese Automation Congress (CAC)
作者: Mufeng Wang Ke Liu Yangyang Geng Xin Che Jingpei Wang College of Control Science&Engineering Zhejiang University Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, driven by huge engineering demands, industrial Cyber-Physical System (iCPS) has developed rapidly. As an important energy conversion device in iCPS, stable operation of permanent magnet synchronous mo... 详细信息
来源: 评论