咨询与建议

限定检索结果

文献类型

  • 496 篇 期刊文献
  • 419 篇 会议

馆藏范围

  • 915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 602 篇 工学
    • 451 篇 计算机科学与技术...
    • 368 篇 软件工程
    • 166 篇 信息与通信工程
    • 81 篇 生物工程
    • 72 篇 电气工程
    • 67 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 27 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 15 篇 网络空间安全
    • 14 篇 航空宇航科学与技...
  • 366 篇 理学
    • 181 篇 数学
    • 108 篇 物理学
    • 91 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 35 篇 化学
    • 29 篇 系统科学
    • 19 篇 地球物理学
  • 194 篇 管理学
    • 117 篇 图书情报与档案管...
    • 85 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 7 篇 农学
  • 5 篇 教育学

主题

  • 42 篇 semantics
  • 32 篇 training
  • 30 篇 feature extracti...
  • 29 篇 deep learning
  • 19 篇 knowledge graph
  • 19 篇 computational mo...
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 15 篇 conferences
  • 15 篇 data mining
  • 15 篇 data models
  • 14 篇 graph neural net...
  • 14 篇 federated learni...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 171 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 43 篇 school of comput...
  • 34 篇 key laboratory o...
  • 31 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 institute of art...
  • 13 篇 gansu provincial...
  • 12 篇 chongqing key la...
  • 12 篇 institute for ai...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 22 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 17 篇 xueqi cheng
  • 14 篇 sun xiaoming
  • 12 篇 niyato dusit
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 853 篇 英文
  • 53 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
915 条 记 录,以下是141-150 订阅
排序:
Adversarial U-network for Predicting Blood Oxygen Level-Dependent Time Series
Adversarial U-Network for Predicting Blood Oxygen Level-Depe...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Bao, Cong Zheng, Weihao Zhang, Qin Yang, Songyu Yao, Zhijun Hu, Bin Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University Lanzhou China School of Medical Technology Beijing Institute of Technology Beijing China Cas Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences Shanghai China Joint Research Center for Cognitive Neurosensor Technology of Lanzhou University Institute of Semiconductors Chinese Academy of Sciences Lanzhou China
Functional magnetic resonance imaging (fMRI) plays a vital role in brain science as it measures and maps brain activity through the analysis of blood flow changes, offering valuable insights into cognitive functions a... 详细信息
来源: 评论
Nested Event Extraction upon Pivot Element Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Ren, Weicheng Li, Zixuan Jin, Xiaolong Bai, Long Su, Miao Liu, Yantao Guan, Saiping Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Nested Event Extraction (NEE) aims to extract complex event structures where an event contains other events as its arguments recursively. Nested events involve a kind of Pivot Elements (PEs) that simultaneously act as... 详细信息
来源: 评论
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan... 详细信息
来源: 评论
Match-Prompt: Improving Multi-task Generalization Ability for Neural Text Matching via Prompt Learning
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Shicheng Pang, Liang Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology CAS University of Chinese Academy of Sciences Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS University of Chinese Academy of Sciences Beijing China
Text matching is a fundamental technique in both information retrieval and natural language processing. Text matching tasks share the same paradigm that determines the relationship between two given texts. The relatio... 详细信息
来源: 评论
Streaming Media Load Balancing with Improved Genetic Algorithm
Streaming Media Load Balancing with Improved Genetic Algorit...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Yang Zhang Xing Yang Yuan Xu Yanlin He Mingqing Zhang Qunxiong Zhu College of Information Science and Technology Beijing University of Chemical Technology Beijing China Key Laboratory of Data Science and Intelligent Computing Institute of International Innovation Beihang University Hangzhou China
The load balancing algorithm of streaming media server is facing unique challenges. Different from the traditional Web server, the streaming media server needs to consider the characteristics of real-time, bandwidth o... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
M3GIA: A Cognition Inspired Multilingual and Multimodal General Intelligence Ability Benchmark
arXiv
收藏 引用
arXiv 2024年
作者: Song, Wei Li, Yadong Xu, Jianhua Wu, Guowei Ming, Lingfeng Yi, Kexin Luo, Weihua Li, Houyi Du, Yi Guo, Fangda Yu, Kaicheng AutoLab Westlake University China AI Business Alibaba Group China Zhejiang University China Key Laboratory of Behavioral Science Institute of Psychology CAS China Key Laboratory of AI Safety Institute of Computing Technology CAS China
As recent multi-modality large language models (MLLMs) have shown formidable proficiency on various complex tasks, there has been increasing attention on debating whether these models could eventually mirror human int... 详细信息
来源: 评论
Entity disambiguation method based on Graph Attention networks  14
Entity disambiguation method based on Graph Attention Networ...
收藏 引用
14th International Conference on Measuring technology and Mechatronics Automation, ICMTMA 2022
作者: Qiang, Chengyu Li, Xiaogo Ma, Xianyan Han, Wei Yao, Yi School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an71012 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China Xi 'an Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi'an710121 China
Entity disambiguation based on entity-link is a technique which constructs the mappings between entity reference items appearing in the short text and target entity in knowledge base respectively. In this paper we pro... 详细信息
来源: 评论
User Information Enhanced Knowledge Graph Convolutional networks for Recommender Systems  14
User Information Enhanced Knowledge Graph Convolutional Netw...
收藏 引用
14th International Conference on Measuring technology and Mechatronics Automation, ICMTMA 2022
作者: Hao, Junyu Li, Xiaoge School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an71012 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China Xi'an Key laboratory of Big Data and Intelligent Computing Shaanxi Xi'an710121 China
To deeply excavate the information contained in user data and better alleviate cold start problem, we propose KGCN++, a user information enhanced knowledge graph convolutional networks model for recommender system, wh... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论