咨询与建议

限定检索结果

文献类型

  • 496 篇 期刊文献
  • 419 篇 会议

馆藏范围

  • 915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 602 篇 工学
    • 451 篇 计算机科学与技术...
    • 368 篇 软件工程
    • 166 篇 信息与通信工程
    • 81 篇 生物工程
    • 72 篇 电气工程
    • 67 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 27 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 15 篇 网络空间安全
    • 14 篇 航空宇航科学与技...
  • 366 篇 理学
    • 181 篇 数学
    • 108 篇 物理学
    • 91 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 35 篇 化学
    • 29 篇 系统科学
    • 19 篇 地球物理学
  • 194 篇 管理学
    • 117 篇 图书情报与档案管...
    • 85 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 7 篇 农学
  • 5 篇 教育学

主题

  • 42 篇 semantics
  • 32 篇 training
  • 30 篇 feature extracti...
  • 29 篇 deep learning
  • 19 篇 knowledge graph
  • 19 篇 computational mo...
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 15 篇 conferences
  • 15 篇 data mining
  • 15 篇 data models
  • 14 篇 graph neural net...
  • 14 篇 federated learni...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 171 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 43 篇 school of comput...
  • 34 篇 key laboratory o...
  • 31 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 institute of art...
  • 13 篇 gansu provincial...
  • 12 篇 chongqing key la...
  • 12 篇 institute for ai...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 22 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 17 篇 xueqi cheng
  • 14 篇 sun xiaoming
  • 12 篇 niyato dusit
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 853 篇 英文
  • 53 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
915 条 记 录,以下是1-10 订阅
CausalDiff: Causality-Inspired Disentanglement via Diffusion Model for Adversarial Defense  38
CausalDiff: Causality-Inspired Disentanglement via Diffusion...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhang, Mingkun Bi, Keping Chen, Wei Chen, Quanrun Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology CAS China Key Laboratory of Network Data Science and Technology Institute of Computing Technology CAS China School of Statistics University of International Business and Economics China
Despite ongoing efforts to defend neural classifiers from adversarial attacks, they remain vulnerable, especially to unseen attacks. In contrast, humans are difficult to be cheated by subtle manipulations, since we ma...
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Large Language Model-Based Event Relation Extraction with Rationales  31
Large Language Model-Based Event Relation Extraction with Ra...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Hu, Zhilei Li, Zixuan Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesSchool of Computer Science and Technology University of Chinese Academy of Sciences
Event Relation Extraction (ERE) aims to extract various types of relations between different events within texts. Although Large Language Models (LLMs) have demonstrated impressive capabilities in many natural languag... 详细信息
来源: 评论
A New Pipeline for Knowledge Graph Reasoning Enhanced by Large Language Models Without Fine-Tuning
A New Pipeline for Knowledge Graph Reasoning Enhanced by Lar...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Zhongwu Bai, Long Li, Zixuan Huang, Zhen Jin, Xiaolong Dou, Yong National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Conventional Knowledge Graph Reasoning (KGR) models learn the embeddings of KG components over the structure of KGs, but their performances are limited when the KGs are severely incomplete. Recent LLM-enhanced KGR mod... 详细信息
来源: 评论
RoCEL: Advancing Table Entity Linking through Distinctive Row and Column Contexts
RoCEL: Advancing Table Entity Linking through Distinctive Ro...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Wang, Yuanzheng Fan, Yixing Guo, Jiafeng Zhang, Ruqing Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Table entity linking (TEL) aims to map entity mentions in the table to their corresponding entities in a knowledge base (KB). The core of this task is to leverage structured contexts, specifically row and column conte... 详细信息
来源: 评论
LINKAGE: Listwise Ranking among Varied-Quality References for Non-Factoid QA Evaluation via LLMs
LINKAGE: Listwise Ranking among Varied-Quality References fo...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yang, Sihui Bi, Keping Cui, Wanqing Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences Beijing China
Non-Factoid (NF) Question Answering (QA) is challenging to evaluate due to diverse potential answers and no objective criterion. The commonly used automatic evaluation metrics like ROUGE or BERTScore cannot accurately... 详细信息
来源: 评论
Identity-Preserving Adversarial Training for Robust network Embedding
收藏 引用
Journal of Computer science & technology 2024年 第1期39卷 177-191页
作者: 岑科廷 沈华伟 曹婍 徐冰冰 程学旗 Data Intelligence System Research Center Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 101480China Beijing Academy of Artificial Intelligence Beijing 100000China Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link ***,existing network embed-ding models are ... 详细信息
来源: 评论
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-Target Stance Detection
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Zhang, Zhao Li, Yiming Zhang, Jin Xu, Hui CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China
Stance detection aims at inferring an author’s attitude towards a specific target in a text. Prior methods mainly consider target-related background information for a better understanding of targets while neglecting ... 详细信息
来源: 评论
Inductive Link Prediction in N-ary Knowledge Graphs  31
Inductive Link Prediction in N-ary Knowledge Graphs
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
N-ary Knowledge Graphs (NKGs), where a fact can involve more than two entities, have gained increasing attention. Link Prediction in NKGs (LPN) aims to predict missing elements in facts to facilitate the completion of... 详细信息
来源: 评论
Classifier Guidance Enhances Diffusion-Based Adversarial Purification by Preserving Predictive Information  27
Classifier Guidance Enhances Diffusion-Based Adversarial Pur...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zhang, Mingkun Li, Jianing Chen, Wei Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial... 详细信息
来源: 评论