咨询与建议

限定检索结果

文献类型

  • 988 篇 期刊文献
  • 657 篇 会议

馆藏范围

  • 1,645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,020 篇 工学
    • 670 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 229 篇 信息与通信工程
    • 122 篇 电气工程
    • 102 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 91 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 69 篇 光学工程
    • 51 篇 生物医学工程(可授...
    • 49 篇 仪器科学与技术
    • 46 篇 机械工程
    • 45 篇 网络空间安全
    • 33 篇 材料科学与工程(可...
    • 32 篇 动力工程及工程热...
    • 28 篇 安全科学与工程
  • 617 篇 理学
    • 234 篇 数学
    • 219 篇 物理学
    • 141 篇 生物学
    • 83 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 281 篇 管理学
    • 166 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 102 篇 医学
    • 70 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 41 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 44 篇 feature extracti...
  • 39 篇 accuracy
  • 38 篇 training
  • 31 篇 quantum cryptogr...
  • 30 篇 computational mo...
  • 30 篇 federated learni...
  • 26 篇 privacy
  • 23 篇 neural networks
  • 20 篇 forecasting
  • 19 篇 image segmentati...
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 graph neural net...
  • 17 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 210 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 key laboratory o...
  • 52 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 42 篇 cas key laborato...
  • 36 篇 college of cyber...
  • 34 篇 school of comput...
  • 32 篇 cas center for e...
  • 31 篇 hefei national l...
  • 31 篇 shaanxi key labo...
  • 27 篇 anhui province k...
  • 27 篇 cas key lab of n...
  • 26 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 194 篇 cheng xueqi
  • 154 篇 guo jiafeng
  • 52 篇 zhang ruqing
  • 49 篇 fan yixing
  • 45 篇 lan yanyan
  • 43 篇 shen huawei
  • 33 篇 jin xiaolong
  • 29 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 22 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 xueqi cheng
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 19 篇 jie tian
  • 17 篇 liu jun
  • 17 篇 li chuan-feng
  • 17 篇 chen wei

语言

  • 1,468 篇 英文
  • 142 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science Technology"
1645 条 记 录,以下是121-130 订阅
排序:
MIA-UNet:Multi-Scale Iterative Aggregation U-network for Retinal Vessel Segmentation
收藏 引用
Computer Modeling in Engineering & sciences 2021年 第11期129卷 805-828页
作者: Linfang Yu Zhen Qin Yi Ding Zhiguang Qin Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
As an important part of the new generation of information technology,the Internet of Things(IoT)has been widely concerned and regarded as an enabling technology of the next generation of health care *** fundus photogr... 详细信息
来源: 评论
Random Coding Responses for Resisting Side-channel Attacks in Client-side Deduplicated Cloud Storage
收藏 引用
IEEE Transactions on Services Computing 2025年 第03期18卷 1697-1710页
作者: Ha, Guanxiong Chen, Yuchen Cai, Zhipeng Jia, Chunfu Shan, Xuan Nankai University College of Cryptology and Cyber Science Tianjin China Data Security Technology Tianjin Key Laboratory of Network and Data Security Technology China Tianjin300350 China
Side-channel attacks are widespread in client-side deduplication systems, compromising the privacy of outsourced data. The adversary may infer the existence status of data via the deterministic relations between dupli... 详细信息
来源: 评论
Gray-scale transformation for traffic classification: leveraging local and global features in flow data  3
Gray-scale transformation for traffic classification: levera...
收藏 引用
3rd International Conference on Electronic Information Engineering, Big data, and Computer technology, EIBDCT 2024
作者: Xia, Yuchao Xue, Mutian Li, Wei Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China University of Electronic Science and Technology of China Chengdu China Sichuan University of Media and Communications Chengdu China
The rapid expansion and diversification of internet traffic pose a pressing demand for accurate classification of diverse application streams in network management and security monitoring. This paper introduces a deep... 详细信息
来源: 评论
Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers’ Autofill Functionality  40
Leaky Autofill: An Empirical Study on the Privacy Threat of ...
收藏 引用
40th Annual Computer Security Applications Conference, ACSAC 2024
作者: Fu, Yanduo Wang, Ding College of Cyber Science Nankai University Tianjin300350 China Ministry of Education Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
Password managers (PMs) provide users with convenient and robust functionalities to manage their credentials, highly recommended by security experts and major standard bodies. One of the most popular features is the a... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  25
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论
10B-doped MCP detector developed for neutron resonance imaging at Back-n white neutron source
收藏 引用
Nuclear science and Techniques 2024年 第8期35卷 58-68页
作者: Qiang Li Li‑Jiao Wang Jing‑Yu Tang Xiang‑Biao Qiu Zhen Chen Mao‑Yuan Zhao Chang‑Jun Ning Kai Pan Wei Xu Tao Li Su‑Peng Lu Han Yi Rui‑Rui Fan Chang‑Qing Feng Rong Zhang Xiao‑Yang Sun Qi An Hao‑Fan Bai Jiang‑Bo Bai Jie Bao Ping Cao Qi‑Ping Chen Yong‑Hao Chen Zeng‑Qi Cui An‑Chuan Fan Fan‑Zhen Feng Min‑Hao Gu Chang‑Cai Han Zi‑Jie Han Guo‑Zhu He Yong‑Cheng He Yang Hong Yi‑Wei Hu Han‑Xiong Huang Wei Jiang Zhi‑Jie Jiang Zheng‑Yao Jin Ling Kang Bo Li Gong Li Xiao Li Yang Li Jie Liu Rong Liu Shu‑Bin Liu Yi‑Na Liu Guang‑Yuan Luan Jie Ren Zhi‑Zhou Ren Xi‑Chao Ruan Zhao‑Hui Song Kang Sun Zhi‑Xin Tan Sheng‑Da Tang Jin‑Cheng Wang Peng‑Cheng Wang Zhao‑Hui Wang Zhong‑Wei Wen Xiao‑Guang Wu Xuan Wu Cong Xia Yong‑Ji Yu Guo‑Hui Zhang Hang‑Chang Zhang Lin‑Hao Zhang Qi‑Wei Zhang Xian‑Peng Zhang Yu‑Liang Zhang Yue Zhang Zhi‑Yong Zhang Zhi‑Hao Zhou Ke‑Jun Zhu Chong Zou Institute of High Energy Physics Chinese Academy of Sciences(CAS)Beijing 100049China Spallation Neutron Source Science Center Dongguan 523803China State Key Laboratory of Particle Detection and Electronics Institute of High Energy Physics Chinese Academy of SciencesBeijing 100049China Dongguan Songshan Lake Future School Dongguan 523808China School of Nuclear Science and Technology University of Science and Technology of ChinaHefei 230027China State Key Laboratory of Particle Detection and Electronics University of Science and Technology of ChinaHefei 230026China North Night Vision Science and Technology(Nanjing)Research Institute Co.Ltd Nanjing 211106China Department of Modern Physics University of Science and Technology of ChinaHefei 230026China State Key Laboratory of Nuclear Physics and Technology School of PhysicsPeking UniversityBeijing 100871China Institute of Modern Physics Fudan UniversityShanghai 200433China Key Laboratory of Nuclear Data China Institute of Atomic EnergyBeijing 102413China China Academy of Engineering Physics Institute of Nuclear Physics and ChemistryMianyang 621900China USTC archaeometry lab University of Science and Technology of ChinaHefei 230026China Northwest Institute of Nuclear Technology Xi’an 710024China University of Chinese Academy of Sciences Beijing 100049China China Shipbuilding Trading Co. LtdBeijing 100044China
Neutron resonance imaging(NRI)has recently emerged as an appealing technique for neutron *** complexity surpasses that of conventional transmission imaging,as it requires a high demand for both a neutron source and **... 详细信息
来源: 评论
A novel network intrusion detection model based on two-phase detection and manually labeling
A novel network intrusion detection model based on two-phase...
收藏 引用
2021 International Conference on Internet of Things and Machine Learning, IoTML 2021
作者: Zhang, Yu Zhou, Yangbo Ma, Xiaowei Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
network intrusion detection system (NIDS) is a tool that can detect various network attacks by analyzing network traffic. In recent years, traditional machine learning and deep learning methods have been widely used i... 详细信息
来源: 评论
Iterative Utility Judgment Framework via LLMs Inspired by Relevance in Philosophy
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hengran Bi, Keping Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China
Utility and topical relevance are critical measures in information retrieval (IR), reflecting system and user perspectives, respectively. While topical relevance has long been emphasized, utility is a higher standard ... 详细信息
来源: 评论
Controlling Risk of Retrieval-augmented Generation: A Counterfactual Prompting Framework
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Lu Zhang, Ruqing Guo, Jiafeng Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of Chinese Academy of Sciences Beijing China
Retrieval-augmented generation (RAG) has emerged as a popular solution to mitigate the hallucination issues of large language models. However, existing studies on RAG seldom address the issue of predictive uncertainty... 详细信息
来源: 评论
Temporal Refinement Graph Convolutional network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论