咨询与建议

限定检索结果

文献类型

  • 994 篇 期刊文献
  • 641 篇 会议

馆藏范围

  • 1,635 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 673 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 237 篇 信息与通信工程
    • 139 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 70 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 47 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
  • 619 篇 理学
    • 236 篇 数学
    • 222 篇 物理学
    • 139 篇 生物学
    • 86 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 283 篇 管理学
    • 165 篇 图书情报与档案管...
    • 126 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 104 篇 医学
    • 72 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 32 篇 quantum cryptogr...
  • 31 篇 computational mo...
  • 30 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 image segmentati...
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 51 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 40 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 30 篇 cas center for e...
  • 30 篇 shaanxi key labo...
  • 29 篇 hefei national l...
  • 26 篇 anhui province k...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 17 篇 xueqi cheng
  • 17 篇 chen wei
  • 16 篇 qin zhen
  • 16 篇 liu jun

语言

  • 1,493 篇 英文
  • 108 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1635 条 记 录,以下是51-60 订阅
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, IcasSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, IcasSP 2025
作者: Miao, Haonan Zhao, Peizheng Sun, Yuqi Nan, Fang Zhang, Xiaolong Wu, Yaqiang Tian, Feng School of Computer Science and Technology Xi'an Jiaotong University Xi'an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China School of Advanced Technology Xi'an Jiaotong-Liverpool University Suzhou215123 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (IcasSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Ziming Yuan Lei Dai Wen Li Jie Zhang Shengwen Liang Ying Wang Cheng Liu Huawei Li Xiaowei Li Jiafeng Guo Peng Wang Renhai Chen Gong Zhang State Key Lab of Processors Institute of Computing TechnologyCAS University of Chinese Academy of Sciences School of Computer and Information Technology Shanxi University School of Computer Science Peking University Zhongguancun National Laboratory Beijing Key Lab of Network Data Science and Technology Institute of Computing Technology CAS Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论
FM-FCN:A Neural network with Filtering Modules for Accurate Vital Signs Extraction
收藏 引用
Research 2025年 第1期2024卷 92-106页
作者: Fangfang Zhu Qichao Niu Xiang Li Qi Zhao Honghong Su Jianwei Shuai Department of Physics and Fujian Provincial Key Laboratory for Soft Functional Materials ResearchXiamen UniversityXiamen 361005China National Institute for Data Science in Health and Medicine and State Key Laboratory of Cellular Stress BiologyInnovation Center for Cell Signaling NetworkXiamen UniversityXiamen 361005China Vitalsilicon Technology Co.Ltd. JiaxingZhejiang 314006China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan 114051China Yangtze Delta Region Institute of Tsinghua University ZhejiangJiaxing 314006China Wenzhou Institute University of Chinese Academy of SciencesWenzhou 325001China Oujiang Laboratory (Zhejiang Lab for Regenerative Medicine Vision and Brain Health)Wenzhou 325001China
Neural networks excel at capturing local spatial patterns through convolutional modules,but they may struggle to identify and effectively utilize the morphological and amplitude periodic nature of physiological *** th... 详细信息
来源: 评论
A Model-Agnostic Hierarchical Framework Towards Trajectory Prediction
收藏 引用
Journal of Computer science and technology 2025年 第2期40卷 322-339页
作者: Qian, Tang-Wen Wang, Yuan Xu, Yong-Jun Zhang, Zhao Wu, Lin Qiu, Qiang Wang, Fei Domain-Oriented Intelligent System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100190 China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
Predicting the future trajectories of multiple agents is essential for various applications in real life, such as surveillance systems, autonomous driving, and social robots. The trajectory prediction task is influenc... 详细信息
来源: 评论
Towards Robust Universal Information Extraction: Benchmark, Evaluation, and Solution
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Jizhao Shi, Akang Li, Zixuan Bai, Long Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science Shenyang Aerospace University Shenyang China
In this paper, we aim to enhance the robustness of Universal Information Extraction (UIE) by introducing a new benchmark dataset, a comprehensive evaluation, and a feasible solution. Existing robust benchmark datasets... 详细信息
来源: 评论
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4874-4889页
作者: Cao, Hangcheng Xu, Guowen He, Ziyang Shi, Shaoqing Xu, Shengmin Wu, Cong Ning, Jianting Hunan University College of Computer Science and Electronic Engineering Changsha410012 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450001 China Zhengzhou University International College Zhengzhou450001 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350007 China Nanyang Technological University College of Computing and Data Science Jurong West 639798 Singapore Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science Macau China
Ample profits of GPU cryptojacking attract hackers to recklessly invade victims’ devices, for completing specific cryptocurrency mining tasks. Such malicious invasion undoubtedly obstructs normal device usage and was... 详细信息
来源: 评论
A millisecond integrated quantum memory for photonic qubits
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Yu-Ping Ou, Zhong-Wen Zhu, Tian-Xiang Su, Ming-Xu Liu, Chao Han, Yong-Jian Zhou, Zong-Quan Li, Chuan-Feng Guo, Guang-Can CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China Anhui Province Key Laboratory of Quantum Network University of Science and Technology of China Hefei230026 China CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Hefei230026 China Hefei National Laboratory University of Science and Technology of China Hefei230088 China
Quantum memories for light are essential building blocks for quantum repeaters and quantum networks. Integrated operations of quantum memories could enable scalable application with low-power consumption. However, the... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, IcasSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论