咨询与建议

限定检索结果

文献类型

  • 987 篇 期刊文献
  • 637 篇 会议

馆藏范围

  • 1,624 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,005 篇 工学
    • 663 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 222 篇 信息与通信工程
    • 133 篇 电气工程
    • 99 篇 生物工程
    • 90 篇 电子科学与技术(可...
    • 82 篇 控制科学与工程
    • 72 篇 化学工程与技术
    • 62 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 48 篇 机械工程
    • 44 篇 网络空间安全
    • 35 篇 材料科学与工程(可...
    • 30 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
  • 604 篇 理学
    • 231 篇 数学
    • 215 篇 物理学
    • 138 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 51 篇 化学
    • 30 篇 系统科学
  • 279 篇 管理学
    • 165 篇 图书情报与档案管...
    • 121 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 108 篇 医学
    • 75 篇 临床医学
    • 49 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 45 篇 农学
    • 26 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 7 篇 教育学
  • 2 篇 艺术学

主题

  • 71 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 31 篇 computational mo...
  • 31 篇 quantum cryptogr...
  • 29 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 image segmentati...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 205 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 49 篇 network and data...
  • 49 篇 school of comput...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 42 篇 college of compu...
  • 38 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 29 篇 cas center for e...
  • 29 篇 shaanxi key labo...
  • 26 篇 hefei national l...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 cas key laborato...
  • 23 篇 anhui province k...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 24 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 19 篇 chen yanping
  • 19 篇 jie tian
  • 18 篇 xu jun
  • 18 篇 chen wei
  • 17 篇 qin zhen
  • 16 篇 liu jun
  • 16 篇 qiang li

语言

  • 1,495 篇 英文
  • 95 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1624 条 记 录,以下是41-50 订阅
排序:
Secure Similar Adjacent Vertex Query on Sparse Graph data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
Understanding User Passwords through Parsing Tree
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ding Shan, Xuan Wu, Yuxuan Jia, Chunfu Nankai University College of Cryptology and Cyber Science Tianjin300350 China Ministry of Education of China Henan Key Laboratory of Network Cryptography Key Laboratory of Cyberspace Security China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Passwords are today's dominant form of authentication, and password guessing is the most effective method for evaluating password strength. Most password guessing models (e.g., PCFG, Markov, and RFGuess) regard pa... 详细信息
来源: 评论
CLIPURE: PURIFICATION IN LATENT SPACE VIA CLIP FOR ADVERSARIALLY ROBUST ZERO-SHOT CLASSIFICATION
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Mingkun Bi, Keping Chen, Wei Guo, Jiafeng Cheng, Xueqi State Key Lab of AI Safety CAS Key Lab of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
In this paper, we aim to build an adversarially robust zero-shot image classifier. We ground our work on CLIP, a vision-language pre-trained encoder model that can perform zero-shot classification by matching an image... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (IcasSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Ziming Yuan Lei Dai Wen Li Jie Zhang Shengwen Liang Ying Wang Cheng Liu Huawei Li Xiaowei Li Jiafeng Guo Peng Wang Renhai Chen Gong Zhang State Key Lab of Processors Institute of Computing TechnologyCAS University of Chinese Academy of Sciences School of Computer and Information Technology Shanxi University School of Computer Science Peking University Zhongguancun National Laboratory Beijing Key Lab of Network Data Science and Technology Institute of Computing Technology CAS Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论
Towards Robust Universal Information Extraction: Benchmark, Evaluation, and Solution
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Jizhao Shi, Akang Li, Zixuan Bai, Long Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science Shenyang Aerospace University Shenyang China
In this paper, we aim to enhance the robustness of Universal Information Extraction (UIE) by introducing a new benchmark dataset, a comprehensive evaluation, and a feasible solution. Existing robust benchmark datasets... 详细信息
来源: 评论
TransMatch: Employing Bridging Strategy to Overcome Large Deformation for Feature Matching in Gastroscopy Scenario
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Zhu, Guosong Qin, Zhen Yu, Linfang Ding, Yi Qin, Zhiguang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu611731 China Industrial Research Institute Chengdu610000 China
Feature matching is widely applied in the image processing field. However, both traditional feature matching methods and previous deep learning-based methods struggle to accurately match the features with severe defor... 详细信息
来源: 评论
A Hybrid-Feature-Based Autoencoder Model for Predicting Traffic Flow to Accelerate Ambulance Medical Response Time in Internet of Vehicles
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11397-11407页
作者: Li, Yongmeng Tian, Yu Liu, Wenjian Gao, Longxiang Tian, Hui Xing, Lumin The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Shandong Key Laboratory of Digital Diagnosis and Treatment of Thoracic Oncology Shandong Engineering Research Center of Intelligent Surgery Shandong Jinan250014 China Qilu Hospital of Shandong University Department of Thoracic Surgery Shandong Jinan250012 China City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250000 China The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Shandong Key Laboratory of Digital Diagnosis and Treatment of Thoracic Oncology Shandong Jinan250014 China
Traffic congestion during ambulance travel can delay medical response times. With the growing availability of traffic data, computational methods for traffic flow prediction are attracting significant attention. Howev... 详细信息
来源: 评论
Towards Event Extraction with Massive Types: LLM-based Collaborative Annotation and Partitioning Extraction
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Wenxuan Li, Zixuan Bai, Long Zuo, Yuxin Xu, Daozhu Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an China
Developing a general-purpose extraction system that can extract events with massive types is a long-standing target in Event Extraction (EE). In doing so, the challenge comes from two aspects: 1) The absence of an eff... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, IcasSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论