咨询与建议

限定检索结果

文献类型

  • 496 篇 期刊文献
  • 419 篇 会议

馆藏范围

  • 915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 602 篇 工学
    • 451 篇 计算机科学与技术...
    • 368 篇 软件工程
    • 166 篇 信息与通信工程
    • 81 篇 生物工程
    • 72 篇 电气工程
    • 67 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 27 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 15 篇 网络空间安全
    • 14 篇 航空宇航科学与技...
  • 366 篇 理学
    • 181 篇 数学
    • 108 篇 物理学
    • 91 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 35 篇 化学
    • 29 篇 系统科学
    • 19 篇 地球物理学
  • 194 篇 管理学
    • 117 篇 图书情报与档案管...
    • 85 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 7 篇 农学
  • 5 篇 教育学

主题

  • 42 篇 semantics
  • 32 篇 training
  • 30 篇 feature extracti...
  • 29 篇 deep learning
  • 19 篇 knowledge graph
  • 19 篇 computational mo...
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 15 篇 conferences
  • 15 篇 data mining
  • 15 篇 data models
  • 14 篇 graph neural net...
  • 14 篇 federated learni...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 171 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 43 篇 school of comput...
  • 34 篇 key laboratory o...
  • 31 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 institute of art...
  • 13 篇 gansu provincial...
  • 12 篇 chongqing key la...
  • 12 篇 institute for ai...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 22 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 17 篇 xueqi cheng
  • 14 篇 sun xiaoming
  • 12 篇 niyato dusit
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 853 篇 英文
  • 53 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
915 条 记 录,以下是251-260 订阅
排序:
Can Graph Descriptive Order Affect Solving Graph Problems with LLMs?
arXiv
收藏 引用
arXiv 2024年
作者: Ge, Yuyao Liu, Shenghua Bi, Baolong Wang, Yiwei Mei, Lingrui Feng, Wenjie Chen, Lizhe Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences China University of California Merced United States Institute of Data Science National University of Singapore Singapore Shenzhen International Graduate School Tsinghua University Shenzhen China University of Chinese Academy of Sciences China
Large language models (LLMs) have achieved significant success in reasoning tasks, including mathematical reasoning and logical deduction. Among these reasoning tasks, graph problems stand out due to their complexity ... 详细信息
来源: 评论
ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: He, Junwei Xu, Qianqian Jiang, Yangbangyan Wang, Zitai Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ... 详细信息
来源: 评论
Biologically inspired visual computing:the state of the art
收藏 引用
Frontiers of Computer science 2021年 第1期15卷 1-15页
作者: Wangli HAO Ian Max ANDOLINA Wei WANG Zhaoxiang ZHANG Research Center for Research on Intelligent Perception and Computing Beijing 100190China National Laboratory of Pattern Recognition CASIABeijing 100190China CAS Center for Excellence in Brain Science and Intelligence Technology CASBeijing 100190China University of Chinese Academy of Sciences Beijing 100190China State Key Laboratory of Neuroscience Shanghai 200031China Institute of Neuroscience Chinese Academy of SciencesShanghai 200031China
Visual information is highly advantageous for the evolutionary success of almost all *** information is likewise critical for many computing tasks,and visual computing has achieved tremendous successes in numerous app... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
Significance-aware Medication Recommendation with Medication Representation Learning
Significance-aware Medication Recommendation with Medication...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yishuo Li Zhufeng Shao Weimin Chen Shoujin Wang Yuehan Du Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Mental Health Center Jinan China Data Science Institute University of Technology Sydney Sydney Australia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The goal of medication recommendation system is to recommend appropriate pharmaceutical interventions based on a patient’s diagnosis. Most of existing approaches often formulate these recommendations use data on diag... 详细信息
来源: 评论
General nonlinear function neural network fitting algorithm based on CNN  3
General nonlinear function neural network fitting algorithm ...
收藏 引用
3rd International Conference on Computer Vision, Image and Deep Learning and International Conference on Computer Engineering and Applications, CVIDL and ICCEA 2022
作者: Xu, Xintao Jiang, Zhelong Chen, Gang Li, Zhigang Gong, Guoliang Lu, Huaxiang University of Science and Technology of China School of Microelectronics Hefei China Institute of Semiconductors Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Materials and Optoelectronics Research Center Beijing China Semiconductor Neural Network Intelligent Perception and Computing Technology Beijing Key Laboratory Beijing China
This paper proposes a generic neural network fitting algorithm based on CNN for nonlinear functions that overcomes the challenges of a large number of nonlinear functions in terms of hardware deployment and computing ... 详细信息
来源: 评论
An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature Information Supplementation
An Algorithm for Detecting Surface Defects in Industrial Str...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qingyu Xu Jiguo Yu Anming Dong Zihao Shang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Data Intelligence Information Technology Co. Ltd. Jinan China
In the context of Industry 4.0 and the rise of intelligent manufacturing, the quality of industrial products is becoming more and more important. Strip steel surface defect detection, as a key link in industrial produ... 详细信息
来源: 评论
Ethereum Phishing Detection Using Hyperbolic Neural networks and Temporal Information
Ethereum Phishing Detection Using Hyperbolic Neural Networks...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Rong Xu Jun Zhang Xiaoyue Zhu Zhaoxiong Song Zhi Yu College of Computer Science Inner Mongolia University Hohhot China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Computing Technology Chinese Academy of Sciences Beijing China
In recent years, the frequent occurrence of phishing scams on Ethereum has posed serious threats to transaction security and the financial safety of users. This paper proposes an Ethereum phishing scam detection metho... 详细信息
来源: 评论
High-Fidelity Editable Portrait Synthesis with 3D GAN Inversion
High-Fidelity Editable Portrait Synthesis with 3D GAN Invers...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (IcasSP)
作者: Jindong Xie Jiachen Liu Yupei Lin Jinbao Wang Xianxu Hou Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Information Engineering Guangdong University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University
The 3D generative adversarial network (GAN) inversion converts an image into 3D representation to attain high-fidelity reconstruction and facilitate realistic image manipulation within the 3D latent space. However, pr... 详细信息
来源: 评论
The Security and Privacy of Mobile Edge computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论