咨询与建议

限定检索结果

文献类型

  • 994 篇 期刊文献
  • 641 篇 会议

馆藏范围

  • 1,635 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 673 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 237 篇 信息与通信工程
    • 139 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 70 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 47 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
  • 619 篇 理学
    • 236 篇 数学
    • 222 篇 物理学
    • 139 篇 生物学
    • 86 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 283 篇 管理学
    • 165 篇 图书情报与档案管...
    • 126 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 104 篇 医学
    • 72 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 32 篇 quantum cryptogr...
  • 31 篇 computational mo...
  • 30 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 image segmentati...
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 51 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 40 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 30 篇 cas center for e...
  • 30 篇 shaanxi key labo...
  • 29 篇 hefei national l...
  • 26 篇 anhui province k...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 17 篇 xueqi cheng
  • 17 篇 chen wei
  • 16 篇 qin zhen
  • 16 篇 liu jun

语言

  • 1,493 篇 英文
  • 108 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1635 条 记 录,以下是471-480 订阅
排序:
Modeling topical relevance for multi-turn dialogue generation
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Hainan Lan, Yanyan Pang, Liang Chen, Hongshen Ding, Zhuoye Yin, Dawei CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS China *** Beijing China University of Chinese Academy of Sciences China
Topic drift is a common phenomenon in multi-turn dialogue. Therefore, an ideal dialogue generation models should be able to capture the topic information of each context, detect the relevant context, and produce appro... 详细信息
来源: 评论
Quantum-to-quantum Bernoulli factory problem
收藏 引用
Physical Review A 2018年 第3期97卷 032303-032303页
作者: Jiaqing Jiang Jialin Zhang Xiaoming Sun CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China University of Chinese Academy of Sciences Beijing 100049 China
Given a coin with unknown bias p∈[0,1], can we exactly simulate another coin with bias f(p)? The exact set of simulable functions has been well characterized 20 years ago. In this paper, we ask the quantum counterpar... 详细信息
来源: 评论
Temporal Refinement Graph Convolutional network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论
An Efficient and Privacy-Preserving data Aggregation Scheme Supporting Arbitrary Statistical Functions in IoT
收藏 引用
China Communications 2022年 第6期19卷 91-104页
作者: Haihui Liu Jianwei Chen Liwei Lin Ayong Ye Chuan Huang College of Computer and Cyber Security Fujian Normal UniversityFuzhou 350117China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal UniversityFuzhou 350117China School of Computer Science and Mathematics Fujian University of TechnologyFuzhou 350118China Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhou 350117China
The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our *** terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to achieve i... 详细信息
来源: 评论
LINKAGE: Listwise Ranking among Varied-Quality References for Non-Factoid QA Evaluation via LLMs
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Sihui Bi, Keping Cui, Wanqing Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences Beijing China
Non-Factoid (NF) Question Answering (QA) is challenging to evaluate due to diverse potential answers and no objective criterion. The commonly used automatic evaluation metrics like ROUGE or BERTScore cannot accurately... 详细信息
来源: 评论
Design and implementation of content confidentiality check system  3
Design and implementation of content confidentiality check s...
收藏 引用
3rd International Conference on Electronic Information Engineering, Big data, and Computer technology, EIBDCT 2024
作者: Song, Yanyan Chen, Menghong Pi, Chunying Nie, Peng College of Computer Science Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
Nowadays, companies use databases for information storage and it is inevitable that there will be confidential information which can cause severe crises and public relations problems if leaked. In order to solve this ... 详细信息
来源: 评论
Graph based Tensor Recovery for Accurate Internet Anomaly Detection
Graph based Tensor Recovery for Accurate Internet Anomaly De...
收藏 引用
2018 IEEE Conference on Computer Communications, INFOCOM 2018
作者: Xie, Kun Li, Xiaocan Wang, Xin Xie, Gaogang Wen, Jigang Zhang, Dafang College of Computer Science and Electronics Engineering Hunan University China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Department of Electrical and Computer Engineering State University of New York at Stony Brook United States Institute of Computing Technology Chinese Academy of Sciences China
Detecting anomalous traffic is a crucial task of managing networks. Many anomaly detection algorithms have been proposed recently. However, constrained by their matrix-based traffic data model, existing algorithms oft... 详细信息
来源: 评论
Self-feedback LSTM regression model for real-time particle source apportionment
收藏 引用
Journal of Environmental sciences 2022年 第4期34卷 10-20页
作者: Wei Wang Weiman Xu Shuai Deng Yimeng Chai Ruoyu Ma Guoliang Shi Bo Xu Mei Li Yue Li Trusted AI System Laboratory College of Computer ScienceNankai UniversityTianjin 300350China KLMDASR Tianjin Key Laboratory of Network and Data Security TechnologyTianjin 300350China State Environmental Protection Key Laboratory of Urban Ambient Air Particulate Matter Pollution Prevention and Control College of Environmental Science and EngineeringNankai UniversityTianjin 300071China Institute of Mass Spectrometry and Atmospheric Environment Guangdong Provincial Engineering Research Center for on-line source apportionment system of air pollution Jinan UniversityGuangzhou 510632China Guangdong-Hongkong-Macao Joint Laboratory of Collaborative Innovation for Environmental Quality Guangzhou 510632China
Atmospheric particulate matter pollution has attracted much wider attention *** recent years,the development of atmospheric particle collection techniques has put forwards new demands on the real-time source apportion... 详细信息
来源: 评论
PathAFL: Path-Coverage Assisted Fuzzing  20
PathAFL: Path-Coverage Assisted Fuzzing
收藏 引用
15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
作者: Yan, Shengbo Wu, Chenlu Li, Hang Shao, Wei Jia, Chunfu Nankai University College of Cyber Science TianJin China Nankai University College of Artificial Intelligence TianJin China Nankai University College of Cyber Science TianJin Key Laboratory of Network and Data Security Technology TianJin300350 China
Fuzzing is an effective method to find software bugs and vulnerabilities. One of the most useful techniques is the coverage-guided fuzzing, whose key element is the tracing code coverage information. Existing coverage... 详细信息
来源: 评论
MedX-Net: Hierarchical Transformer with Large Kernel Convolutions for 3D Medical Image Segmentation
MedX-Net: Hierarchical Transformer with Large Kernel Convolu...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Lin Zou, Qingzhi Key Laboratory of Computing Power Network and Information Se-curity Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the exceptional performance of Transform-ers in 2D medical image segmentation, recent work has also introduced them into 3D medical segmentation tasks. For instance, Swin UNETR and other hierarchical Transforme... 详细信息
来源: 评论