咨询与建议

限定检索结果

文献类型

  • 992 篇 期刊文献
  • 661 篇 会议

馆藏范围

  • 1,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 676 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 231 篇 信息与通信工程
    • 126 篇 电气工程
    • 103 篇 生物工程
    • 101 篇 电子科学与技术(可...
    • 98 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 68 篇 光学工程
    • 50 篇 仪器科学与技术
    • 50 篇 生物医学工程(可授...
    • 45 篇 机械工程
    • 45 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 32 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
  • 618 篇 理学
    • 235 篇 数学
    • 220 篇 物理学
    • 142 篇 生物学
    • 83 篇 统计学(可授理学、...
    • 55 篇 地球物理学
    • 54 篇 化学
    • 31 篇 系统科学
  • 282 篇 管理学
    • 166 篇 图书情报与档案管...
    • 124 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 102 篇 医学
    • 71 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 41 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 45 篇 feature extracti...
  • 39 篇 accuracy
  • 38 篇 training
  • 32 篇 quantum cryptogr...
  • 31 篇 federated learni...
  • 30 篇 computational mo...
  • 26 篇 privacy
  • 23 篇 neural networks
  • 20 篇 forecasting
  • 19 篇 image segmentati...
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 graph neural net...
  • 17 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 210 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 65 篇 key laboratory o...
  • 63 篇 cas key laborato...
  • 52 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 41 篇 cas key laborato...
  • 36 篇 college of cyber...
  • 34 篇 school of comput...
  • 31 篇 cas center for e...
  • 31 篇 shaanxi key labo...
  • 30 篇 hefei national l...
  • 27 篇 anhui province k...
  • 27 篇 cas key lab of n...
  • 26 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 194 篇 cheng xueqi
  • 154 篇 guo jiafeng
  • 52 篇 zhang ruqing
  • 49 篇 fan yixing
  • 45 篇 lan yanyan
  • 43 篇 shen huawei
  • 33 篇 jin xiaolong
  • 29 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 22 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 xueqi cheng
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 19 篇 jie tian
  • 18 篇 chen wei
  • 17 篇 qin zhen
  • 17 篇 liu jun

语言

  • 1,462 篇 英文
  • 156 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science Technology"
1653 条 记 录,以下是1-10 订阅
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
CrossLinkNet: An Explainable and Trustworthy AI Framework for Whole-Slide Images Segmentation
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4703-4724页
作者: Peng Xiao Qi Zhong Jingxue Chen Dongyuan Wu Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China
In the intelligent medical diagnosis area,Artificial Intelligence(AI)’s trustworthiness,reliability,and interpretability are critical,especially in cancer *** neural networks,while excellent at processing natural ima... 详细信息
来源: 评论
CausalDiff: Causality-Inspired Disentanglement via Diffusion Model for Adversarial Defense  38
CausalDiff: Causality-Inspired Disentanglement via Diffusion...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhang, Mingkun Bi, Keping Chen, Wei Chen, Quanrun Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology CAS China Key Laboratory of Network Data Science and Technology Institute of Computing Technology CAS China School of Statistics University of International Business and Economics China
Despite ongoing efforts to defend neural classifiers from adversarial attacks, they remain vulnerable, especially to unseen attacks. In contrast, humans are difficult to be cheated by subtle manipulations, since we ma...
来源: 评论
More trust in networks,more secure keys
收藏 引用
Light(science & Applications) 2025年 第1期14卷 18-19页
作者: Guan-Jie Fan-Yuan Shuang Wang CAS Key Laboratory of Quantum Information University of Science and Technology of China230026HefeiChina Anhui Province Key Laboratory of Quantum Network University of Science and Technology of China230026HefeiChina CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of China230026HefeiChina Hefei National Laboratory University of Science and Technology of China230088HefeiChina
A novel continuous-variable quantum passive optical network is proposed in which a user can increase their key rate by trusting other *** is because the keys,which would be discarded to remove correlations with untrus... 详细信息
来源: 评论
Large Language Model-Based Event Relation Extraction with Rationales  31
Large Language Model-Based Event Relation Extraction with Ra...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Hu, Zhilei Li, Zixuan Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesSchool of Computer Science and Technology University of Chinese Academy of Sciences
Event Relation Extraction (ERE) aims to extract various types of relations between different events within texts. Although Large Language Models (LLMs) have demonstrated impressive capabilities in many natural languag... 详细信息
来源: 评论
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
收藏 引用
Tsinghua science and technology 2023年 第1期28卷 1-12页
作者: Guanxiong Ha Hang Chen Chunfu Jia Mingyue Li College of Cyber Science Nankai UniversityTianjin 300350China Tianjin Key Laboratory of Network and Data Security Technology Tianjin 300350China
In cloud storage,client-side deduplication is widely used to reduce storage and communication *** client-side deduplication,if the cloud server detects that the user’s outsourced data have been stored,then clients wi... 详细信息
来源: 评论
A New Pipeline for Knowledge Graph Reasoning Enhanced by Large Language Models Without Fine-Tuning
A New Pipeline for Knowledge Graph Reasoning Enhanced by Lar...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Zhongwu Bai, Long Li, Zixuan Huang, Zhen Jin, Xiaolong Dou, Yong National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Conventional Knowledge Graph Reasoning (KGR) models learn the embeddings of KG components over the structure of KGs, but their performances are limited when the KGs are severely incomplete. Recent LLM-enhanced KGR mod... 详细信息
来源: 评论
RoCEL: Advancing Table Entity Linking through Distinctive Row and Column Contexts
RoCEL: Advancing Table Entity Linking through Distinctive Ro...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Wang, Yuanzheng Fan, Yixing Guo, Jiafeng Zhang, Ruqing Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Table entity linking (TEL) aims to map entity mentions in the table to their corresponding entities in a knowledge base (KB). The core of this task is to leverage structured contexts, specifically row and column conte... 详细信息
来源: 评论
Controlling Risk of Retrieval-augmented Generation: A Counterfactual Prompting Framework
Controlling Risk of Retrieval-augmented Generation: A Counte...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Lu Zhang, Ruqing Guo, Jiafeng Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of Chinese Academy of Sciences Beijing China
Retrieval-augmented generation (RAG) has emerged as a popular solution to mitigate the hallucination issues of large language models. However, existing studies on RAG seldom address the issue of predictive uncertainty... 详细信息
来源: 评论
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
收藏 引用
Digital Communications and networks 2024年 第2期10卷 380-388页
作者: Renwan Bi Mingfeng Zhao Zuobin Ying Youliang Tian Jinbo Xiong Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin541004China Faculty of Data Science City University of Macao999078MacaoChina State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ... 详细信息
来源: 评论