咨询与建议

限定检索结果

文献类型

  • 972 篇 期刊文献
  • 640 篇 会议

馆藏范围

  • 1,612 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,006 篇 工学
    • 660 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 231 篇 信息与通信工程
    • 127 篇 电气工程
    • 100 篇 生物工程
    • 97 篇 电子科学与技术(可...
    • 88 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 69 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 45 篇 机械工程
    • 45 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
  • 611 篇 理学
    • 232 篇 数学
    • 220 篇 物理学
    • 139 篇 生物学
    • 84 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 30 篇 系统科学
  • 280 篇 管理学
    • 164 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 100 篇 医学
    • 69 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 41 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 69 篇 semantics
  • 47 篇 deep learning
  • 45 篇 feature extracti...
  • 39 篇 accuracy
  • 38 篇 training
  • 32 篇 quantum cryptogr...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 image segmentati...
  • 20 篇 forecasting
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 graph neural net...
  • 17 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 202 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 key laboratory o...
  • 62 篇 cas key laborato...
  • 52 篇 school of comput...
  • 48 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 42 篇 college of compu...
  • 40 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 30 篇 cas center for e...
  • 29 篇 hefei national l...
  • 26 篇 anhui province k...
  • 26 篇 cas key lab of n...
  • 24 篇 shaanxi key labo...
  • 23 篇 school of comput...

作者

  • 190 篇 cheng xueqi
  • 149 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 48 篇 fan yixing
  • 45 篇 lan yanyan
  • 43 篇 shen huawei
  • 32 篇 jin xiaolong
  • 29 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 xueqi cheng
  • 18 篇 jie tian
  • 17 篇 chen wei
  • 16 篇 qin zhen
  • 16 篇 liu jun

语言

  • 1,472 篇 英文
  • 106 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1612 条 记 录,以下是391-400 订阅
排序:
Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master key
Scalable Client-side Encrypted Deduplication beyond Secret S...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yuchen Chen Guanxiong Ha Xuan Shan Chunfu Jia Qiaowen Jia The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology and DISSec Tianjin China University of Chinese Academy of Sciences Beijing China
Individuals and companies increasingly adopt encrypted deduplication systems for their enhanced security and efficiency benefits. Server-aided encrypted deduplication systems are the state-of-the-art scheme to resist ... 详细信息
来源: 评论
Disentangled Hyperbolic Representation Learning for Heterogeneous Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Bai, Qijie Nie, Changli Zhang, Haiwei Dou, Zhicheng Yuan, Xiaojie The College of Computer Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China Gaoling School of Artificial Intelligence Renmin University of China Beijing China
Heterogeneous graphs have attracted a lot of research interests recently due to the success for representing complex real-world systems. However, existing methods have two pain points in embedding them into low-dimens... 详细信息
来源: 评论
Perturbation-Invariant Adversarial Training for Neural Ranking Models: Improving the Effectiveness-Robustness Trade-Off
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Yu-An Zhang, Ruqing Zhang, Mingkun Chen, Wei de Rijke, Maarten Guo, Jiafeng Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Neural ranking models (NRMs) have shown great success in information retrieval (IR). But their predictions can easily be manipulated using adversarial examples, which are crafted by adding imperceptible perturbations ... 详细信息
来源: 评论
Target-Oriented WiFi Sensing for Respiratory Healthcare: from Indiscriminate Perception to In-Area Sensing
收藏 引用
IEEE network 2024年
作者: Wang, Meng Huang, Jinyang Zhang, Xiang Liu, Zhi Li, Meng Zhao, Peng Yan, Huan Sun, Xiao Dong, Mianxiong Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligence Machine School of Computer and Information Hefei230601 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China Muroran Institute of Technology Department of Sciences and Informatics 0508585 Japan
Driven by the vision of integrated sensing and communication (ISAC) toward 6G technology, the WiFi-based respiration sensing approach has emerged as a highly competitive candidate for advanced healthcare services. Nev... 详细信息
来源: 评论
Certified Robustness to Word Substitution Ranking Attack for Neural Ranking Models
arXiv
收藏 引用
arXiv 2022年
作者: Wu, Chen Zhang, Ruqing Guo, Jiafeng Chen, Wei Fan, Yixing de Rijke, Maarten Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Neural ranking models (NRMs) have achieved promising results in information retrieval. NRMs have also been shown to be vulnerable to adversarial examples. A typical Word Substitution Ranking Attack (WSRA) against NRMs... 详细信息
来源: 评论
AMHF-TP:Multifunctional therapeutic peptides prediction based on multi-granularity hierarchical features
收藏 引用
Quantitative Biology 2025年 第1期13卷 127-141页
作者: Shouheng Tuo YanLing Zhu Jiangkun Lin Jiewei Jiang School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’anChina Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’anChina Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anChina School of Electronic Engineering Xi’an University of Posts and TelecommunicationsXi’anChina
Multifunctional therapeutic peptides(MFTP)hold immense potential in diverse therapeutic contexts,yet their prediction and identification remain challenging due to the limitations of traditional methodologies,such as e... 详细信息
来源: 评论
Multi-chain Storage Scheme Based on Hash Calendar and Recursive Zero-knowledge Proof  2
Multi-chain Storage Scheme Based on Hash Calendar and Recurs...
收藏 引用
2nd International Conference on Computer science and Blockchain, CCSB 2022
作者: Wang, Chao Yao, Zhongyuan Zhang, Yong Guo, Shangkun Zhao, Lindong Si, Xueming Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China Zhongyuan University of Technology The Frontier Information Technology Research Institute China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
Blockchain technology is currently a research hotspot in the computer field. However, with the rapid development of blockchain technology, poor storage scalability limits its further application. In response to this p... 详细信息
来源: 评论
Adversarial Learning data Augmentation for Graph Contrastive Learning in Recommendation
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Junjie Cao, Qi Xie, Ruobing Zhang, Shaoliang Xia, Feng Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China WeChat Tencent Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Recently, Graph Neural networks (GNNs) achieve remarkable success in Recommendation. To reduce the influence of data sparsity, Graph Contrastive Learning (GCL) is adopted in GNN-based CF methods for enhancing performa... 详细信息
来源: 评论
LSMM: A Life-cycle Security Management Mechanism for Secure Image Sharing  2
LSMM: A Life-cycle Security Management Mechanism for Secure ...
收藏 引用
2nd International Conference on Computer science and Blockchain, CCSB 2022
作者: Zhang, Yaoyao Yao, Zhongyuan Pan, Heng Si, Xueming Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China The Frontier Information Technology Research Institute Zhongyuan University of Technology China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
During the storing, transferring, processing, and exchanging phases of the full life-cycle of secure image sharing, there may exist security issues such as information leakage, infringement and abuse. To address those... 详细信息
来源: 评论
Augmentation-Aware Self-Supervision for data-Efficient GAN Training
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Liang Cao, Qi Yuan, Yige Zhao, Songtao Ma, Chongyang Pan, Siyuan Wan, Pengfei Wang, Zhongyuan Shen, Huawei Cheng, Xueqi CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Kuaishou Technology China
Training generative adversarial networks (GANs) with limited data is challenging because the discriminator is prone to overfitting. Previously proposed differentiable augmentation demonstrates improved data efficiency... 详细信息
来源: 评论