咨询与建议

限定检索结果

文献类型

  • 994 篇 期刊文献
  • 641 篇 会议

馆藏范围

  • 1,635 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 673 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 237 篇 信息与通信工程
    • 139 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 70 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 47 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
  • 619 篇 理学
    • 236 篇 数学
    • 222 篇 物理学
    • 139 篇 生物学
    • 86 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 283 篇 管理学
    • 165 篇 图书情报与档案管...
    • 126 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 104 篇 医学
    • 72 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 32 篇 quantum cryptogr...
  • 31 篇 computational mo...
  • 30 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 image segmentati...
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 51 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 40 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 30 篇 cas center for e...
  • 30 篇 shaanxi key labo...
  • 29 篇 hefei national l...
  • 26 篇 anhui province k...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 17 篇 xueqi cheng
  • 17 篇 chen wei
  • 16 篇 qin zhen
  • 16 篇 liu jun

语言

  • 1,493 篇 英文
  • 108 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1635 条 记 录,以下是351-360 订阅
排序:
Joint Optimization Task Offloading Strategy for Mobile Edge Computing  2
Joint Optimization Task Offloading Strategy for Mobile Edge ...
收藏 引用
2nd IEEE International Conference on Information technology, Big data and Artificial Intelligence, ICIBA 2021
作者: Tang, Xue Wen, Zhan Chen, Jiali Li, Yiquan Li, Wenzao College of Communication Engineer Chengdu University of Information Technology Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu611730 China
With increase of Internet of Things (IoT) devices, the burden of cloud computing servers is gradually increasing. Mobile Edge Computing (MEC), as an emerging solution, can relieve the pressure of computing and improve... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
An Efficient and Provably Secure SM2 key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
Exploration on the key Issues of the Teaching Method of Student Independent Proposition
Exploration on the Key Issues of the Teaching Method of Stud...
收藏 引用
International Conference on Guidance, Navigation and Control, ICGNC 2020
作者: Zhang, Jin Quan, Weihong Li, Haoran Wang, Lizhi Gong, Xiaoli Wu, Qian College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Tianjin University of Science and Technology Tianjin China
In order to figure out the solutions to difficulties facing the university online education platform in the expansion of the question bank, this paper proposes a teaching method of student independent proposition... 详细信息
来源: 评论
Malicious HTTPS Traffic Classification Algorithm Based on DCGAN_1D-CNN
Malicious HTTPS Traffic Classification Algorithm Based on DC...
收藏 引用
2021 IEEE Conference on Telecommunications, Optics and Computer science, TOCS 2021
作者: Luo, Wen Liu, Zhaohui Zhao, Rui Chen, Jianhua Deng, Xin University of South China School of Computer Science Hengyang China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
Aiming at the problems of fast classification and unbalanced data classification of encrypted malicious traffic in the internet, a classification method of encrypted malicious based on DCGAN 1D-CNN model is ***-IDCNN ... 详细信息
来源: 评论
MQGrad: Reinforcement learning of gradient quantization in parameter server
arXiv
收藏 引用
arXiv 2018年
作者: Cui, Guoxin Xu, Jun Zeng, Wei Lan, Yanyan Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of ComputingTechnology Chinese Academy of Sciences Beijing100190 China
One of the most significant bottleneck in training large scale machine learning models on parameter server (PS) is the communication overhead, because it needs to frequently exchange the model gradients between the wo... 详细信息
来源: 评论
Nondestructive technique for identifying nuclides using neutron resonance transmission analysis at CSNS Back-n
收藏 引用
Nuclear science and Techniques 2024年 第1期35卷 178-187页
作者: Sheng-Da Tang Yong-Hao Chen Jing-Yu Tang Rui-Rui Fan Qiang Li Gong Li Dong Liu Zheng-Yao Jin Xing-Zhu Cui Tian-Xiang Chen Yi-Wei Yang Rong Liu Han Yi Yang Li Zhen Yang Qi An Hao-Fan Bai Jiang-Bo Bai Jie Bao Ping Cao Qi-Ping Chen Zhen Chen Zeng-Qi Cui An-Chuan Fan Chang-Qing Feng Fan-Zhen Feng Ke-Qing Gao Min-Hao Gu Chang-Cai Han Zi-Jie Han Guo-Zhu He Yong-Cheng He Yang Hong Yi-Wei Hu Han-Xiong Huang Wei-Hua Jia Hao-yu Jiang Wei Jiang Zhi-jie Jiang Ling Kang Bo Li Chao Li Jia-Wen Li Xiao Li Jie Liu Shu-Bin Liu Guang-Yuan Luan Chang-Jun Ning Bin-Bin Qi Jie Ren Zhi-Zhou Ren Xi-Chao Ruan Zhao-Hui Song Kang Sun Zhi-Xin Tan Li-Jiao Wang Peng-Cheng Wang Zhao-Hui Wang Zhong-Wei Wen Xiao-Guang Wu Xuan Wu Li-Kun Xie Yong-Ji Yu Guo-Hui Zhang Lin-Hao Zhang Mo-Han Zhang Qi-Wei Zhang Xian-Peng Zhang Yu-Liang Zhang Yue Zhang Zhi-Yong Zhang Mao-Yuan Zhao Lu-Ping Zhou Zhi-Hao Zhou Ke-Jun Zhu Sino-French Institute of Nuclear Engineering and Technology Sun Yat-sen UniversityZhuhai 519082China Institute of High-Energy Physics Chinese Academy of Sciences(CAS)Beijing 100049China Spallation Neutron Source Science Center Dongguan 523803China School of Nuclear Science and Technology University of Science and Technology of ChinaHefei 230026China State Key Laboratory of Particle Detection and Electronics University of Science and Technology of ChinaHefei 230026China State Key Laboratory of Particle Detection and Electronics Institute of High Energy PhysicsChinese Academy of SciencesBeijing 100049China USTC Archaeometry Laboratory University of Science and Technology of ChinaHefei 230026China Institute of Nuclear Physics and Chemistry China Academy of Engineering PhysicsMianyang 621900China Department of Modern Physics University of Science and Technology of ChinaHefei 230026China State Key Laboratory of Nuclear Physics and Technology School of PhysicsPeking UniversityBeijing 100871China Key Laboratory of Nuclear Data China Institute of Atomic EnergyBeijing 102413China Northwest Institute of Nuclear Technology Xi’an 710024China University of Chinese Academy of Sciences Beijing 100049China
Nondestructive and noninvasive neutron assays are essential applications of neutron *** resonance transmission analysis(NRTA)is a powerful nondestructive method for investigating the elemental composition of an *** ba... 详细信息
来源: 评论
Multi-layer network embedding on scc-based network with motif
收藏 引用
Digital Communications and networks 2024年 第3期10卷 546-556页
作者: Lu Sun Xiaona Li Mingyue Zhang Liangtian Wan Yun Lin Xianpeng Wang Gang Xu Department of Communication Engineering Institute of Information Science TechnologyDalian Maritime UniversityDalian116026China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province DUT School of Software Technology&DUT-RU International School of Information Science and EngineeringDalian University of TechnologyDalian 116620China College of Information and Communication Engineering Harbin Engineering UniversityHarbin 150001China School of Information and Communication Engineering Hainan UniversityHaikou 570228China State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast UniversityNanjing 210096China
Interconnection of all things challenges the traditional communication methods,and Semantic Communication and Computing(SCC)will become new *** is a challenging task to accurately detect,extract,and represent semantic... 详细信息
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论
A Discriminative Semantic Ranker for Question Retrieval  21
A Discriminative Semantic Ranker for Question Retrieval
收藏 引用
11th ACM SIGIR International Conference on Theory of Information Retrieval, ICTIR 2021
作者: Cai, Yinqiong Fan, Yixing Guo, Jiafeng Zhang, Ruqing Lan, Yanyan Cheng, Xueqi University of Chinese Academy of Sciences Beijing China Cas Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute for Ai Industry Research Tsinghua University Beijing China
Similar question retrieval is a core task in community-based question answering (CQA) services. To balance the effectiveness and efficiency, the question retrieval system is typically implemented as multi-stage ranker... 详细信息
来源: 评论