咨询与建议

限定检索结果

文献类型

  • 994 篇 期刊文献
  • 641 篇 会议

馆藏范围

  • 1,635 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 673 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 237 篇 信息与通信工程
    • 139 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 70 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 47 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
  • 619 篇 理学
    • 236 篇 数学
    • 222 篇 物理学
    • 139 篇 生物学
    • 86 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 283 篇 管理学
    • 165 篇 图书情报与档案管...
    • 126 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 104 篇 医学
    • 72 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 32 篇 quantum cryptogr...
  • 31 篇 computational mo...
  • 30 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 image segmentati...
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 51 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 40 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 30 篇 cas center for e...
  • 30 篇 shaanxi key labo...
  • 29 篇 hefei national l...
  • 26 篇 anhui province k...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 17 篇 xueqi cheng
  • 17 篇 chen wei
  • 16 篇 qin zhen
  • 16 篇 liu jun

语言

  • 1,493 篇 英文
  • 108 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1635 条 记 录,以下是531-540 订阅
排序:
Certified Robustness to Word Substitution Ranking Attack for Neural Ranking Models
arXiv
收藏 引用
arXiv 2022年
作者: Wu, Chen Zhang, Ruqing Guo, Jiafeng Chen, Wei Fan, Yixing de Rijke, Maarten Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Neural ranking models (NRMs) have achieved promising results in information retrieval. NRMs have also been shown to be vulnerable to adversarial examples. A typical Word Substitution Ranking Attack (WSRA) against NRMs... 详细信息
来源: 评论
Class Incremental Learning for Knowledge Acquisition Based on Prototype network Gating Mechanism
Class Incremental Learning for Knowledge Acquisition Based o...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Yuming Feng Xiaolong Jin Haozhe Liang Jiafeng Guo School of Computer Science and Technology University of Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Institute of Systems Engineering Academy of Military Science
With the development of information technology, the medical field has accumulated a large amount of medical data, which continues to grow. Efficient extraction and effective utilization of knowledge from this vast amo... 详细信息
来源: 评论
Multi-chain Storage Scheme Based on Hash Calendar and Recursive Zero-knowledge Proof  2
Multi-chain Storage Scheme Based on Hash Calendar and Recurs...
收藏 引用
2nd International Conference on Computer science and Blockchain, CCSB 2022
作者: Wang, Chao Yao, Zhongyuan Zhang, Yong Guo, Shangkun Zhao, Lindong Si, Xueming Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China Zhongyuan University of Technology The Frontier Information Technology Research Institute China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
Blockchain technology is currently a research hotspot in the computer field. However, with the rapid development of blockchain technology, poor storage scalability limits its further application. In response to this p... 详细信息
来源: 评论
Thematic Event Extraction Based on Event-Related Sentence Detection
Thematic Event Extraction Based on Event-Related Sentence De...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Xing Zhang Yucan Guo Xiaolong Jin Haozhe Liang Saiping Guan School of Computer Science and Technology University of Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Institute of Systems Engineering Academy of Military Science
Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event...
来源: 评论
Multi-View Graph Embedding Learning for Image Co-Segmentation and Co-Localization
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2024年 第6期34卷 4942-4956页
作者: Huang, Aiping Li, Lijian Zhang, Le Niu, Yuzhen Zhao, Tiesong Lin, Chia-Wen Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering Fuzhou350108 China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou350108 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering The Fujian Science and Technology Innovation Laboratory for Optoelectronic Information Fuzhou350108 China Institute of Communications Engineering National Tsing Hua University Department of Electrical Engineering Hsinchu30013 Taiwan
Image co-segmentation and co-localization exploit inter-image information to identify and extract foreground objects with a batch mode. However, they remain challenging when confronted with large object variations or ... 详细信息
来源: 评论
LSMM: A Life-cycle Security Management Mechanism for Secure Image Sharing  2
LSMM: A Life-cycle Security Management Mechanism for Secure ...
收藏 引用
2nd International Conference on Computer science and Blockchain, CCSB 2022
作者: Zhang, Yaoyao Yao, Zhongyuan Pan, Heng Si, Xueming Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China The Frontier Information Technology Research Institute Zhongyuan University of Technology China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
During the storing, transferring, processing, and exchanging phases of the full life-cycle of secure image sharing, there may exist security issues such as information leakage, infringement and abuse. To address those... 详细信息
来源: 评论
Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing  3rd
Attribute Propagation Enhanced Community Detection Model for...
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Wang, Jiming Xie, Xueshuo Fang, Yaozheng Lu, Ye Li, Tao Wang, Guiling College of Computer Science Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China New Jersey Institute of Technology NewarkNJ07102 United States
Bitcoin is a kind of decentralized cryptocurrency on a peer-to-peer network. Anonymity makes Bitcoin widely used in online payment but it is a disadvantage for regulatory purposes. We aim to de-anonymize Bitcoin to as... 详细信息
来源: 评论
Augmentation-Aware Self-Supervision for data-Efficient GAN Training
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Liang Cao, Qi Yuan, Yige Zhao, Songtao Ma, Chongyang Pan, Siyuan Wan, Pengfei Wang, Zhongyuan Shen, Huawei Cheng, Xueqi CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Kuaishou Technology China
Training generative adversarial networks (GANs) with limited data is challenging because the discriminator is prone to overfitting. Previously proposed differentiable augmentation demonstrates improved data efficiency... 详细信息
来源: 评论
Querying a matrix through matrix-vector products  46
Querying a matrix through matrix-vector products
收藏 引用
46th International Colloquium on Automata, Languages, and Programming, ICALP 2019
作者: Sun, Xiaoming Woodruff, David P. Yang, Guang Zhang, Jialin CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Carnegie Mellon University PittsburghPA United States Institute of Computing Technology Chinese Academy of Sciences Beijing China Conflux Beijing China
We consider algorithms with access to an unknown matrix M ∈ Fn×d via matrix-vector products, namely, the algorithm chooses vectors v1,..., vq, and observes Mv1,..., Mvq. Here the vi can be randomized as well as ... 详细信息
来源: 评论
Incentive Scheme for Shared Parking Space based on NFT  2
Incentive Scheme for Shared Parking Space based on NFT
收藏 引用
2nd International Conference on Computer science and Blockchain, CCSB 2022
作者: Cai, Fugang Pan, Heng Si, Xueming Wu, Zhili Qian, Haiyang Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China Zhongyuan University of Technology The Frontier Information Technology Research Institute China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
The lack of centralized management causes problems in the system of distributed parking spaces, such as unsecured revenues, poor service quality and malicious valuation. Therefore, this paper proposes a parking sharin... 详细信息
来源: 评论