咨询与建议

限定检索结果

文献类型

  • 104,281 篇 期刊文献
  • 51,472 篇 会议
  • 149 篇 学位论文
  • 84 册 图书
  • 8 篇 专利

馆藏范围

  • 155,994 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 115,189 篇 工学
    • 58,485 篇 计算机科学与技术...
    • 30,877 篇 电气工程
    • 25,062 篇 软件工程
    • 21,422 篇 信息与通信工程
    • 10,486 篇 控制科学与工程
    • 8,356 篇 环境科学与工程(可...
    • 6,945 篇 生物工程
    • 6,690 篇 仪器科学与技术
    • 6,656 篇 化学工程与技术
    • 6,175 篇 测绘科学与技术
    • 6,026 篇 电子科学与技术(可...
    • 6,020 篇 材料科学与工程(可...
    • 5,244 篇 机械工程
    • 4,825 篇 生物医学工程(可授...
    • 4,380 篇 动力工程及工程热...
    • 4,202 篇 光学工程
    • 4,135 篇 交通运输工程
    • 4,036 篇 土木工程
    • 3,223 篇 石油与天然气工程
  • 63,081 篇 理学
    • 16,401 篇 生物学
    • 16,058 篇 物理学
    • 11,794 篇 数学
    • 10,642 篇 地球物理学
    • 9,228 篇 化学
    • 4,175 篇 统计学(可授理学、...
    • 3,654 篇 天文学
  • 17,977 篇 医学
    • 12,407 篇 临床医学
    • 5,797 篇 基础医学(可授医学...
  • 15,163 篇 管理学
    • 10,560 篇 管理科学与工程(可...
    • 4,623 篇 图书情报与档案管...
  • 6,849 篇 农学
  • 1,853 篇 法学
  • 1,446 篇 经济学
  • 1,104 篇 教育学
  • 359 篇 文学
  • 217 篇 军事学
  • 172 篇 艺术学
  • 70 篇 历史学
  • 19 篇 哲学

主题

  • 7,615 篇 deep learning
  • 5,303 篇 feature extracti...
  • 3,865 篇 training
  • 3,106 篇 machine learning
  • 2,919 篇 data models
  • 2,435 篇 neural networks
  • 2,098 篇 task analysis
  • 1,999 篇 data mining
  • 1,947 篇 computational mo...
  • 1,918 篇 convolutional ne...
  • 1,831 篇 convolutional ne...
  • 1,723 篇 accuracy
  • 1,673 篇 semantics
  • 1,577 篇 convolution
  • 1,574 篇 predictive model...
  • 1,522 篇 optimization
  • 1,464 篇 remote sensing
  • 1,402 篇 internet of thin...
  • 1,344 篇 neural network
  • 1,248 篇 wireless sensor ...

机构

  • 8,221 篇 univ chinese aca...
  • 2,656 篇 university of ch...
  • 838 篇 univ iowa iowa c...
  • 781 篇 yerevan physics ...
  • 748 篇 institute of hig...
  • 747 篇 infn sezione di ...
  • 745 篇 ohio state univ ...
  • 734 篇 infn sezione di ...
  • 692 篇 centro brasileir...
  • 653 篇 charles universi...
  • 648 篇 university of de...
  • 639 篇 infn laboratori ...
  • 620 篇 department of ph...
  • 605 篇 academy of scien...
  • 604 篇 paul scherrer in...
  • 603 篇 inst high energy...
  • 597 篇 infn sezione di ...
  • 594 篇 rwth aachen univ...
  • 594 篇 institute rudjer...
  • 593 篇 infn sezione di ...

作者

  • 1,361 篇 waltenberger w.
  • 1,349 篇 lowette s.
  • 1,158 篇 adam w.
  • 1,154 篇 tytgat m.
  • 1,144 篇 sznajder a.
  • 1,113 篇 tumasyan a.
  • 1,107 篇 delaere c.
  • 1,099 篇 jeitler m.
  • 1,095 篇 giammanco a.
  • 1,086 篇 carvalho w.
  • 1,076 篇 tavernier s.
  • 1,071 篇 nogima h.
  • 1,069 篇 dragicevic m.
  • 1,066 篇 liko d.
  • 1,046 篇 clerbaux b.
  • 1,043 篇 van mechelen p.
  • 1,022 篇 bruno g.
  • 1,014 篇 santoro a.
  • 1,012 篇 vanlaer p.
  • 1,001 篇 bergauer t.

语言

  • 144,240 篇 英文
  • 9,168 篇 其他
  • 1,965 篇 中文
  • 103 篇 德文
  • 68 篇 法文
  • 48 篇 荷兰文
  • 7 篇 斯洛文尼亚文
  • 6 篇 日文
  • 2 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 克罗地亚文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"机构=CAS Key Laboratory of Network Data Science Technology"
155994 条 记 录,以下是41-50 订阅
STPGTN-AMulti-Branch Parameters Identification Method Considering Spatial Constraints and Transient Measurement data
收藏 引用
Computer Modeling in Engineering & sciences 2023年 第9期136卷 2635-2654页
作者: Shuai Zhang Liguo Weng Jiangsu Key Laboratory of Big Data Analysis Technology Nanjing University of Information Science and TechnologyNanjing210044China
Transmission line(TL)Parameter Identification(PI)method plays an essential role in the transmission *** existing PI methods usually have two limitations:(1)These methods only model for single TL,and can not consider t... 详细信息
来源: 评论
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-Target Stance Detection
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Zhang, Zhao Li, Yiming Zhang, Jin Xu, Hui CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China
Stance detection aims at inferring an author’s attitude towards a specific target in a text. Prior methods mainly consider target-related background information for a better understanding of targets while neglecting ... 详细信息
来源: 评论
Classifier Guidance Enhances Diffusion-Based Adversarial Purification by Preserving Predictive Information  27
Classifier Guidance Enhances Diffusion-Based Adversarial Pur...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zhang, Mingkun Li, Jianing Chen, Wei Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial... 详细信息
来源: 评论
Black holes as the source of dark energy:A stringent test with high-redshift JWST AGNs
收藏 引用
science China(Physics,Mechanics & Astronomy) 2024年 第2期67卷 181-188页
作者: Lei Lei Lei Zu Guan-Wen Yuan Zhao-Qiang Shen Yi-Ying Wang Yuan-Zhu Wang Zhen-Bo Su Wen-Ke Ren Shao-Peng Tang Hao Zhou Chi Zhang Zhi-Ping Jin Lei Feng Yi-Zhong Fan Da-Ming Wei Key Laboratory of Dark Matter and Space Astronomy Purple Mountain ObservatoryChinese Academy of SciencesNanjing 210023China School of Astronomy and Space Science University of Science and Technology of ChinaHefei 230026China CAS Key Laboratory for Research in Galaxies and Cosmology Department of AstronomyUniversity of Science and Technology of ChinaHefei 230026China
Studies have proposed that there is evidence for cosmological coupling of black holes(BHs)with an index of k≈3;hence,BHs serve as the astrophysical source of dark ***,the data sample is limited for the redshifts of≤... 详细信息
来源: 评论
Recent Advances in Generative Information Retrieval  24
Recent Advances in Generative Information Retrieval
收藏 引用
33rd Companion of the ACM World Wide Web Conference, WWW 2023
作者: Tang, Yubao Zhang, Ruqing Sun, Weiwei Guo, Jiafeng de Rijke, Maarten CAS Key Lab of Network Data Science and Technology ICT CAS University of Chinese Academy of Sciences Beijing China Shandong University Qingdao China University of Amsterdam Amsterdam Netherlands
Generative retrieval (GR) has witnessed significant growth recently in the area of information retrieval. Compared to the traditional "index-retrieve-then-rank" pipeline, the GR paradigm aims to consolidate ... 详细信息
来源: 评论
Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第7期140卷 363-383页
作者: Liang Chen Jingbo Zhang Linjie Wu Xingjuan Cai Yubin Xu Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and TechnologyTaiyuan030024China School of State Key Laboratory of Novel Software Technology Nanjing UniversityNanjing210008China
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among de... 详细信息
来源: 评论
MDPO: Customized Direct Preference Optimization with a Metric-based Sampler for Question and Answer Generation  31
MDPO: Customized Direct Preference Optimization with a Metri...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Yihang Tian, Bowen Su, Yueyang Fan, Yixing Guo, Jiafeng Beijing University of Posts and Telecommunications Beijing China Guangzhou China CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of Chinese Academy of Sciences Beijing China
With the extensive use of large language models, automatically generating QA datasets for domain-specific fine-tuning has become crucial. However, considering the multifaceted demands for readability, diversity, and c... 详细信息
来源: 评论
Sensing–Communication–Computation Integration for Federated Edge Learning With Controllable Model Dropout
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19767-19781页
作者: Jiao, Xiang Zhu, Guangxu Jiang, Wei Chen, Li Luo, Wu Wen, Dingzhu Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Shenzhen Research Institute of Big Data Shenzhen International Center For Industrial and Applied Mathematics Shenzhen518172 China University of Science and Technology of China CAS Key Laboratory of Wireless Optical Communication Hefei230052 China ShanghaiTech University Network Intelligence Center School of Information Science and Technology Shanghai201210 China
Federated edge learning (FEEL) is an advanced paradigm in edge artificial intelligence, enabling privacy-preserving collaborative model training through periodic communication between edge devices and a central server... 详细信息
来源: 评论
A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 564-576页
作者: QIAO Zirui ZHOU Yanwei YANG Bo ZHANG Wenzheng ZHANG Mingwu School of Computer Science Shaanxi Normal University State Key Laboratory of Cryptology Science and Technology on Communication Security Laboratory Henan Key Laboratory of Network Cryptography Technology School of Computere Hubei University of Technology
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was propo... 详细信息
来源: 评论
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware  24
Semantic-Enhanced Static Vulnerability Detection in Baseband...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Liu, Yiming Zhang, Cen Li, Feng Li, Yeting Zhou, Jianhua Wang, Jian Zhan, Lanlan Liu, Yang Huo, Wei Institute of Information Engineering Cas School of Cyber Security Ucas Beijing China Key Laboratory of Network Assessment Technology Cas China Beijing Key Laboratory of Network Security and Protection Technology China Nanyang Technological University Singapore
Cellular network is the infrastructure of mobile communication. Baseband firmware, which carries the implementation of cellular network, has critical security impact on its vulnerabilities. To handle the inherent comp... 详细信息
来源: 评论