咨询与建议

限定检索结果

文献类型

  • 988 篇 期刊文献
  • 637 篇 会议

馆藏范围

  • 1,625 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,005 篇 工学
    • 660 篇 计算机科学与技术...
    • 566 篇 软件工程
    • 223 篇 信息与通信工程
    • 133 篇 电气工程
    • 100 篇 生物工程
    • 90 篇 电子科学与技术(可...
    • 81 篇 控制科学与工程
    • 72 篇 化学工程与技术
    • 64 篇 光学工程
    • 51 篇 仪器科学与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 机械工程
    • 43 篇 网络空间安全
    • 35 篇 材料科学与工程(可...
    • 30 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
  • 605 篇 理学
    • 232 篇 数学
    • 215 篇 物理学
    • 138 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 53 篇 地球物理学
    • 51 篇 化学
    • 31 篇 系统科学
  • 280 篇 管理学
    • 164 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 107 篇 医学
    • 74 篇 临床医学
    • 49 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 45 篇 农学
    • 26 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 7 篇 教育学
  • 2 篇 艺术学

主题

  • 71 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 31 篇 computational mo...
  • 31 篇 quantum cryptogr...
  • 29 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 image segmentati...
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 50 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 42 篇 college of compu...
  • 38 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 29 篇 cas center for e...
  • 29 篇 shaanxi key labo...
  • 26 篇 hefei national l...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 cas key laborato...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 24 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 19 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 18 篇 chen wei
  • 17 篇 qin zhen
  • 16 篇 liu jun
  • 16 篇 qiang li

语言

  • 1,495 篇 英文
  • 96 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1625 条 记 录,以下是211-220 订阅
排序:
Predict anchor links across social networks via an embedding approach  25
Predict anchor links across social networks via an embedding...
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Man, Tong Shen, Huawei Liu, Shenghua Jin, Xiaolong Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China
Predicting anchor links across social networks has important implications to an array of applications, including cross-network information diffusion and cross-domain recommendation. One challenging problem is: whether... 详细信息
来源: 评论
Measurement of the neutron total cross section of carbon at the Back-n white neutron beam of CSNS
收藏 引用
Nuclear science and Techniques 2019年 第9期30卷 73-82页
作者: Xing-Yan Liu Yi-Wei Yang Rong Liu Jie Wen Zhong-Wei Wen Zi-Jie Han Zhi-Zhou Ren Qi An Huai-Yong Bai Jie Bao Ping Cao Qi-Ping Chen Yong-Hao Chen Pin-Jing Cheng Zeng-Qi Cui Rui-Rui Fan Chang-Qing Feng Min-Hao Gu Feng-Qin Guo Chang-Cai Han Guo-Zhu He Yong-Cheng He Yue-Feng He Han-Xiong Huang Wei-Ling Huang Xi-Ru Huang Xiao-Lu Ji Xu-Yang Ji Hao-Yu Jiang Wei Jiang Han-Tao Jing Ling Kang Ming-Tao Kang Bo Li Lun Li Qiang Li Xiao Li Yang Li Yang Li Shu-Bin Liu Guang-Yuan Luan Ying-Lin Ma Chang-Jun Ning Bin-Bin Qi Jie Ren Xi-Chao Ruan Zhao-Hui Song Hong Sun Xiao-Yang Sun Zhi-Jia Sun Zhi-Xin Tan Hong-Qing Tang Jing-Yu Tang Peng-Cheng Wang Qi Wang Tao-Feng Wang Yan-Feng Wang Zhao-Hui Wang Zheng Wang Qing-Biao Wu Xiao-Guang Wu Xuan Wu Li-Kun Xie Han Yi Li Yu Tao Yu Yong-Ji Yu Guo-Hui Zhang Jing Zhang Lin-Hao Zhang Li-Ying Zhang Qing-Min Zhang Qi-Wei Zhang Xian-Peng Zhang Yu-Liang Zhang Zhi-Yong Zhang Ying-Tan Zhao Liang Zhou Zu-Ying Zhou Dan-Yang Zhu Ke-Jun Zhu Peng Zhu Institute of Nuclear Physics and Chemistry China Academy of Engineering Physics State Key Laboratory of Particle Detection and Electronics Chinese Academy of Sciences(CAS) Department of Modern Physics University of Science and Technology of China State Key Laboratory of Nuclear Physics and Technology School of PhysicsPeking University Key Laboratory of Nuclear Data China Institute of Atomic Energy Institute of High Energy Physics Chinese Academy of Sciences(CAS) Spallation Neutron Source Science Center University of South China Northwest Institute of Nuclear Technology Department of Engineering and Applied Physics University of Science and Technology of China Beihang University Xi’an Jiaotong University
To verify the performance of the neutron total cross-sectional spectrometer, the neutron total cross section of carbon is initially measured in the energy range of 1 eV to 20 MeV using the time-of-flight method. The m... 详细信息
来源: 评论
Promoting Open-Domain Dialogue Generation Through Learning Pattern Information Between Contexts and Responses  12th
Promoting Open-Domain Dialogue Generation Through Learning P...
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Liu, Mengjuan Liu, Chenyang Yang, Yunfan Liu, Jiang Jing, Mohan Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China
Recently, utilizing deep neural networks to build the open-domain dialogue models has become a hot topic. However, the responses generated by these models suffer from many problems such as responses not being contextu... 详细信息
来源: 评论
A novel network intrusion detection model based on two-phase detection and manually labeling
A novel network intrusion detection model based on two-phase...
收藏 引用
2021 International Conference on Internet of Things and Machine Learning, IoTML 2021
作者: Zhang, Yu Zhou, Yangbo Ma, Xiaowei Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
network intrusion detection system (NIDS) is a tool that can detect various network attacks by analyzing network traffic. In recent years, traditional machine learning and deep learning methods have been widely used i... 详细信息
来源: 评论
CarfRCNN: A Two-stage Effective Model for Instance Segmentation
CarfRCNN: A Two-stage Effective Model for Instance Segmentat...
收藏 引用
2021 International Conference on Intelligent Manufacturing and Industrial Automation, CIMIA 2021
作者: Chen, Yujie Zhao, Pengbiao Chen, Julin Network and Data Security Key Laboratory of Sichuan Province University of Electr Onic Science and Technology of China China
With the rapid development of deep learning, many instance segmentation models have achieved good results in accuracy and time. But here are still many problems. In this paper, we proposed a two-stage model CarfRCNN. ... 详细信息
来源: 评论
A Novel Distributed Anomaly Detection Algorithm for Low-density data
A Novel Distributed Anomaly Detection Algorithm for Low-dens...
收藏 引用
2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications, AEECA 2020
作者: Mei, Lin Zhang, Fengli University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu China
Anomaly detection becomes an interesting and significant problem in data mining area. It, in turn, generates many promising applications such as Intrusion Detection, Fraud Detection, Mobile cellular network fraud, and... 详细信息
来源: 评论
Thematic Event Extraction Based on Event-Related Sentence Detection  1
Thematic Event Extraction Based on Event-Related Sentence De...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Zhang, Xing Guo, Yucan Jin, Xiaolong Liang, Haozhe Guan, Saiping School of Computer Science and Technology University of Chinese Academy of Sciences China Institute of Computing Technology Chinese Academy of Sciences Cas Key Laboratory of Network Data Science and Technology China Institute of Systems Engineering Academy of Military Science Australia
Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event... 详细信息
来源: 评论
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm  1st
Fuzzing Drone Control System Configurations Based on Qualit...
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Chang, Zhiwei Zhang, Hanfeng Yang, Yue Jia, Yan Xu, Sihan Li, Tong Liu, Zheli College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If these param... 详细信息
来源: 评论
Research on Improved MobileViT Image Tamper Localization Model
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3173-3192页
作者: Jingtao Sun Fengling Zhang Huanqi Liu Wenyan Hou School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and TelecommunicationsXi’an710121China
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing... 详细信息
来源: 评论
An Overview of General Theory of Security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao Information Security Center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 评论