咨询与建议

限定检索结果

文献类型

  • 988 篇 期刊文献
  • 637 篇 会议

馆藏范围

  • 1,625 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,005 篇 工学
    • 660 篇 计算机科学与技术...
    • 566 篇 软件工程
    • 223 篇 信息与通信工程
    • 133 篇 电气工程
    • 100 篇 生物工程
    • 90 篇 电子科学与技术(可...
    • 81 篇 控制科学与工程
    • 72 篇 化学工程与技术
    • 64 篇 光学工程
    • 51 篇 仪器科学与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 机械工程
    • 43 篇 网络空间安全
    • 35 篇 材料科学与工程(可...
    • 30 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
  • 605 篇 理学
    • 232 篇 数学
    • 215 篇 物理学
    • 138 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 53 篇 地球物理学
    • 51 篇 化学
    • 31 篇 系统科学
  • 280 篇 管理学
    • 164 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 107 篇 医学
    • 74 篇 临床医学
    • 49 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 45 篇 农学
    • 26 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 7 篇 教育学
  • 2 篇 艺术学

主题

  • 71 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 31 篇 computational mo...
  • 31 篇 quantum cryptogr...
  • 29 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 image segmentati...
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 50 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 42 篇 college of compu...
  • 38 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 29 篇 cas center for e...
  • 29 篇 shaanxi key labo...
  • 26 篇 hefei national l...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 cas key laborato...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 24 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 19 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 18 篇 chen wei
  • 17 篇 qin zhen
  • 16 篇 liu jun
  • 16 篇 qiang li

语言

  • 1,495 篇 英文
  • 96 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1625 条 记 录,以下是221-230 订阅
排序:
Automatic ocular artifact removal from EEG data using a hybrid CAE-RLS approach
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第1期27卷 81-91页
作者: Wang Zhongmin Tian Meng Liang Chen Song Hui School of Computer Science and Technology Xi'an University of Posts and TelecommunicationsXi'an 710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and TelecommunicationsXi'an 710121China
Traditional methods for removing ocular artifacts(OAs) from electroencephalography(EEG) signals often involve a large number of EEG electrodes or require electrooculogram(EOG) as the reference, these constraints make ... 详细信息
来源: 评论
Iterative Bounded Distance Decoding with Random Flipping for Product-Like Codes
收藏 引用
IEEE Transactions on Communications 2024年 第5期73卷 2864-2875页
作者: Li, Guorong Wang, Shiguo Zhao, Shancheng Jinan University National and Local Joint Research Center of Network Security Detection and Protection Technology College of Information Science and Technology Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving The Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Changsha University of Science and Technology Computer and Communication Engineering Institute Changsha410114 China
Product-like codes are widely used in high-speed communication systems since they can be decoded with low-complexity hard decision decoders (HDDs). To meet the growing demand of data rates, enhanced HDDs are required.... 详细信息
来源: 评论
Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence  6
Focus on the Stability of Large Systems: Toward Automatic Pr...
收藏 引用
6th IEEE International Conference on data science in Cyberspace, DSC 2021
作者: Song, Shiwen Wu, Qiong Zheng, Xin Wang, Peng Dou, Yuchen Li, Zhongwen Zhai, Lidong Institute Of Information Engineering Chinese Academy Of Sciences BeiJing China Bag Data Academy Zhongke Beijing China Institute Of Computing Technology Chinese Academy Of Sciences Cas Key Laboratory Of Network Data Science And Technology Beijing China
With the increase in the number of users and business volume, the business systems of Internet companies are becoming more and more complex, resulting in a surge in the number of alarms. A large number of dirty alarms... 详细信息
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
science China(Information sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
Predictability of real temporal networks
收藏 引用
National science Review 2020年 第5期7卷 929-937页
作者: Disheng Tang Wenbo Du Louis Shekhtman Yijie Wang Shlomo Havlin Xianbin Cao Gang Yan School of Electronic and Information Engineering Beihang University Shanghai Institute of Intelligence Science and Technology Tongji University Network Science Institute Northeastern University Department of Physics Bar Ilan University CAS Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences National Engineering Laboratory of Big Data Application Technologies of Comprehensive Transportation School of Physics Science and Engineering Tongji University
Links in most real networks often change over time. Such temporality of links encodes the ordering and causality of interactions between nodes and has a profound effect on network dynamics and *** evidence has shown t... 详细信息
来源: 评论
Robust twin-field quantum key distribution through sending or not sending
收藏 引用
National science Review 2023年 第4期10卷 76-85页
作者: Cong Jiang Zong-Wen Yu Xiao-Long Hu Xiang-Bin Wang Jinan Institute of Quantum Technology State Key Laboratory of Low Dimensional Quantum Physics Department of Physics Tsinghua University Data Communication Science and Technology Research Institute School of Physics State Key Laboratory of Optoelectronic Materials and Technologies Sun Yat-sen University Shanghai Branch CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics University of Science and Technology of China Shenzhen Institute for Quantum Science and Engineering and Physics Department Southern University of Science and Technology Frontier Science Center for Quantum Information
The sending-or-not-sending(SNS) protocol is one of the most major variants of the twin-field(TF)quantum key distribution(QKD) protocol and has been realized in a 511-km field fiber, the farthest field experiment to da... 详细信息
来源: 评论
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-Target Stance Detection
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Zhang, Zhao Li, Yiming Zhang, Jin Xu, Hui CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China
Stance detection aims at inferring an author’s attitude towards a specific target in a text. Prior methods mainly consider target-related background information for a better understanding of targets while neglecting ... 详细信息
来源: 评论
Classifier Guidance Enhances Diffusion-Based Adversarial Purification by Preserving Predictive Information  27
Classifier Guidance Enhances Diffusion-Based Adversarial Pur...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zhang, Mingkun Li, Jianing Chen, Wei Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial... 详细信息
来源: 评论
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning
收藏 引用
Information and Software technology 2025年 184卷
作者: Zhenzhou Tian Yudong Teng Xianqun Ke Yanping Chen Lingwei Chen School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an 710121 Shaanxi China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and Telecommunications Xi’an 710121 Shaanxi China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an University of Posts and Telecommunications Xi’an 710121 Shaanxi China Department of Computer Science and Engineering Wright State University Dayton 45435 OH USA
Context: Reliable and effective similarity analysis for the smart contracts facilitates the maintenance and quality assurance of the smart contract ecosystem. However, existing signature-based methods and code represe...
来源: 评论
Recent Advances in Generative Information Retrieval  24
Recent Advances in Generative Information Retrieval
收藏 引用
33rd Companion of the ACM World Wide Web Conference, WWW 2023
作者: Tang, Yubao Zhang, Ruqing Sun, Weiwei Guo, Jiafeng de Rijke, Maarten CAS Key Lab of Network Data Science and Technology ICT CAS University of Chinese Academy of Sciences Beijing China Shandong University Qingdao China University of Amsterdam Amsterdam Netherlands
Generative retrieval (GR) has witnessed significant growth recently in the area of information retrieval. Compared to the traditional "index-retrieve-then-rank" pipeline, the GR paradigm aims to consolidate ... 详细信息
来源: 评论