咨询与建议

限定检索结果

文献类型

  • 994 篇 期刊文献
  • 641 篇 会议

馆藏范围

  • 1,635 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 673 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 237 篇 信息与通信工程
    • 139 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 70 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 47 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
  • 619 篇 理学
    • 236 篇 数学
    • 222 篇 物理学
    • 139 篇 生物学
    • 86 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 283 篇 管理学
    • 165 篇 图书情报与档案管...
    • 126 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 104 篇 医学
    • 72 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 32 篇 quantum cryptogr...
  • 31 篇 computational mo...
  • 30 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 image segmentati...
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 51 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 40 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 30 篇 cas center for e...
  • 30 篇 shaanxi key labo...
  • 29 篇 hefei national l...
  • 26 篇 anhui province k...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 17 篇 xueqi cheng
  • 17 篇 chen wei
  • 16 篇 qin zhen
  • 16 篇 liu jun

语言

  • 1,493 篇 英文
  • 108 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1635 条 记 录,以下是371-380 订阅
排序:
Remaining Useful Life Prediction of Lithium Battery via Neural network Ensemble  16
Remaining Useful Life Prediction of Lithium Battery via Neur...
收藏 引用
16th IEEE International Conference on Intelligent Systems and Knowledge Engineering, ISKE 2021
作者: Zhang, Hengshan Wu, Di Wang, Zhongmin Chen, Yanping Xu, Jiaxuan Xi'an University of Posts and Telecommunications School of Computer Science and Technology Xi'an710000 China Shanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an710000 China
Accurately predicting the Remaining Useful Life (RUL) of lithium-ion batteries is critical for accelerating the technology development. The neural network via data driven can avoid manual feature extraction and releas... 详细信息
来源: 评论
Design and Implementation of Analyzer Management System Based on Elasticsearch  19th
Design and Implementation of Analyzer Management System Ba...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Sun, Jingqi Nie, Peng Xu, Licheng Zhang, Haiwei College of Cyber Science Nankai University Tianjin300350 China College of Computer Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Elasticsearch is one of the most popular full-text search and analytics engine. It can store, search, and analyze big volumes of data in near real time. Before searching, Elasticsearch will build multiple inverted ind... 详细信息
来源: 评论
Intelligence’s Dilemma: AI Algorithms May Cause Anti-Intelligence
Intelligence’s Dilemma: AI Algorithms May Cause Anti-Intell...
收藏 引用
4th International Conference on Cognitive Systems and Information Processing, ICCSIP 2018
作者: Zhang, Yuhong Nauman, Umer Network and Data Security Key Laboratory of Sichuan University of Electronic Science and Technology of China Chengdu610054 China Information Science and Engineering College Henan University of Technology Zhengzhou450001 China
As the intelligent age continues and technology gets more advanced, algorithms offer some of the solutions for our better work and life. However, research suggests that the proliferation and abuse of intelligent algor...
来源: 评论
A Lightweight Anonymous key Agreement Scheme in V2G networks  2
A Lightweight Anonymous Key Agreement Scheme in V2G Networks
收藏 引用
2nd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2022
作者: Chendong, Huang Feng, Wang Zhongming, Huang Fujian University of Technology School of Computer Science and Mathematics Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Electric vehicle access to the grid (V2G) technology enables bidirectional interaction of energy and information between electric vehicles and the grid. The energy transactions between electric vehicles and the power ... 详细信息
来源: 评论
network Security Situation Assessment Method Based on Absorbing Markov Chain
Network Security Situation Assessment Method Based on Absorb...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Gao, Hongbin Wang, Shangxing Zhang, Hongbin Liu, Bin Zhao, Dongmei Liu, Zhen Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China
This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It... 详细信息
来源: 评论
EEG-Based Fatigue Detection Using PLI Brain network and Relief Algorithm
EEG-Based Fatigue Detection Using PLI Brain Network and Reli...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: He, Yan Wang, Zhongmin Zhao, Yupeng Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi'an710121 China School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China
EEG-based fatigue driving monitoring has important application value in road traffic safety, and the ultimate goal of the research is the development and use of wearable devices, and too many EEG channels in practical... 详细信息
来源: 评论
Intention Recognition Method Based on Resting-state and P300 Task-state Dynamic Brain Functional network Features  15
Intention Recognition Method Based on Resting-state and P300...
收藏 引用
15th International Conference on Measurement technology and Mechanical Automation, ICMTMA 2023
作者: Yi, X. Wang, Z.M. Heng, X. School of Computer Science and Technology Xi'An University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China Xi 'An Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi'an710121 China
In order to reconfigure its structure from the static state in the vision odd ball task, so as to realize the intention recognition based on the characteristics of the brain functional network. The thesis proposes the... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
QoS Prediction based on the Low-rank Autoregressive Tensor Completion
QoS Prediction based on the Low-rank Autoregressive Tensor C...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Xia, Hong Dong, Qingyi Chen, Yanping Zheng, Jiahao Gao, Cong Wang, ZhongMin School of Computer Science and Technology Xi’an University of Posts and Telecommunications Shaanxi Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi’an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi’an710121 China
With the rapid development of network services and edge computing, Quality of Service (QoS) has become an important indicator to validate performances of a network. Recommend high-quality services to users based on Qo... 详细信息
来源: 评论
Entity disambiguation method based on Graph Attention networks  14
Entity disambiguation method based on Graph Attention Networ...
收藏 引用
14th International Conference on Measuring technology and Mechatronics Automation, ICMTMA 2022
作者: Qiang, Chengyu Li, Xiaogo Ma, Xianyan Han, Wei Yao, Yi School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an71012 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China Xi 'an Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi'an710121 China
Entity disambiguation based on entity-link is a technique which constructs the mappings between entity reference items appearing in the short text and target entity in knowledge base respectively. In this paper we pro... 详细信息
来源: 评论