咨询与建议

限定检索结果

文献类型

  • 972 篇 期刊文献
  • 636 篇 会议

馆藏范围

  • 1,608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 992 篇 工学
    • 655 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 219 篇 信息与通信工程
    • 124 篇 电气工程
    • 98 篇 生物工程
    • 88 篇 电子科学与技术(可...
    • 81 篇 控制科学与工程
    • 72 篇 化学工程与技术
    • 62 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 48 篇 机械工程
    • 43 篇 网络空间安全
    • 35 篇 材料科学与工程(可...
    • 30 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
  • 600 篇 理学
    • 232 篇 数学
    • 213 篇 物理学
    • 137 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 53 篇 地球物理学
    • 51 篇 化学
    • 29 篇 系统科学
  • 275 篇 管理学
    • 161 篇 图书情报与档案管...
    • 121 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 106 篇 医学
    • 73 篇 临床医学
    • 49 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 45 篇 农学
    • 26 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 7 篇 教育学
  • 2 篇 艺术学

主题

  • 71 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 39 篇 accuracy
  • 39 篇 training
  • 31 篇 quantum cryptogr...
  • 30 篇 computational mo...
  • 28 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 forecasting
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 image segmentati...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 49 篇 network and data...
  • 49 篇 school of comput...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 42 篇 college of compu...
  • 37 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 29 篇 shaanxi key labo...
  • 28 篇 cas center for e...
  • 25 篇 hefei national l...
  • 24 篇 school of comput...
  • 24 篇 cas key laborato...
  • 24 篇 cas key lab of n...
  • 23 篇 shaanxi key labo...

作者

  • 187 篇 cheng xueqi
  • 143 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 23 篇 guo guang-can
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 21 篇 bi keping
  • 19 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 17 篇 qin zhen
  • 17 篇 chen wei
  • 16 篇 qiang li
  • 16 篇 huang qingming

语言

  • 1,486 篇 英文
  • 88 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1608 条 记 录,以下是1-10 订阅
排序:
Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第06期24卷 5446-5463页
作者: Bi, Ye Jia, Chunfu Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology DISSEC Tianjin300350 China
The booming 5 G cellular networks sparked tremendous interest in supporting more sophisticated critical use cases through vehicle-to-network (V2N) communications. However, the inherent technical vulnerabilities and de... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
More trust in networks,more secure keys
收藏 引用
Light(science & Applications) 2025年 第1期14卷 18-19页
作者: Guan-Jie Fan-Yuan Shuang Wang CAS Key Laboratory of Quantum Information University of Science and Technology of China230026HefeiChina Anhui Province Key Laboratory of Quantum Network University of Science and Technology of China230026HefeiChina CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of China230026HefeiChina Hefei National Laboratory University of Science and Technology of China230088HefeiChina
A novel continuous-variable quantum passive optical network is proposed in which a user can increase their key rate by trusting other *** is because the keys,which would be discarded to remove correlations with untrus... 详细信息
来源: 评论
Large Language Model-Based Event Relation Extraction with Rationales  31
Large Language Model-Based Event Relation Extraction with Ra...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Hu, Zhilei Li, Zixuan Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesSchool of Computer Science and Technology University of Chinese Academy of Sciences
Event Relation Extraction (ERE) aims to extract various types of relations between different events within texts. Although Large Language Models (LLMs) have demonstrated impressive capabilities in many natural languag... 详细信息
来源: 评论
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
A Novel Approach to Cloud Security: Publicly Verifiable Remote Signcryption Framework
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14828-14844页
作者: Ali, Mohammad Liu, Ximeng Amirkabir University of Technology Department of Mathematics and Computer Science Tehran Iran Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou350108 China
In communication systems, ensuring both data integrity and confidentiality is crucial. Traditional methods, such as encryption and signature schemes, handle these aspects separately, leading to inefficiencies. Signcry... 详细信息
来源: 评论
Robust Information Retrieval  25
Robust Information Retrieval
收藏 引用
18th ACM International Conference on Web Search and data Mining, WSDM 2025
作者: Liu, Yu-An Zhang, Ruqing Guo, Jiafeng de Rijke, Maarten CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Beyond effectiveness, the robustness of an information retrieval (IR) system is increasingly attracting attention. When deployed, a critical technology such as IR should not only deliver strong performance on average ... 详细信息
来源: 评论
ADLT: a novel method for effective detection of adversarial attacks in image retrieval
ADLT: a novel method for effective detection of adversarial ...
收藏 引用
2024 International Conference on Computer Vision and Image Processing, CVIP 2024
作者: Xu, Shiyue Zhang, Yu College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
The versatile application of deep learning has made it prone to vulnerabilities, particularly adversarial attacks, which have been increasingly prevalent as its scope expands. Attack methods based on adversarial queri... 详细信息
来源: 评论
Crowdsense Roadside Parking Spaces With Dynamic Gap Reduction Algorithm
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11858-11873页
作者: Zheng, Wenjun Shi, Zhan Ou, Qianyu Liao, Ruizhi The Chinese University of Hong Kong School of Data Science Shenzhen Shenzhen518116 China Guangdong Provincial Key Laboratory of Mathematical Foundations for Artificial Intelligence Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology School of Humanities and Social Science Shenzhen518116 China
In the context of smart city development, mobile sensing emerges as a cost-effective alternative to fixed sensing for on-street parking detection. However, its practicality is often challenged by the inherent accuracy... 详细信息
来源: 评论
Inductive Link Prediction in N-ary Knowledge Graphs  31
Inductive Link Prediction in N-ary Knowledge Graphs
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
N-ary Knowledge Graphs (NKGs), where a fact can involve more than two entities, have gained increasing attention. Link Prediction in NKGs (LPN) aims to predict missing elements in facts to facilitate the completion of... 详细信息
来源: 评论