咨询与建议

限定检索结果

文献类型

  • 507 篇 期刊文献
  • 416 篇 会议

馆藏范围

  • 923 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 618 篇 工学
    • 458 篇 计算机科学与技术...
    • 372 篇 软件工程
    • 172 篇 信息与通信工程
    • 82 篇 电气工程
    • 82 篇 生物工程
    • 69 篇 控制科学与工程
    • 59 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 29 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 16 篇 网络空间安全
    • 15 篇 航空宇航科学与技...
  • 373 篇 理学
    • 184 篇 数学
    • 109 篇 物理学
    • 92 篇 生物学
    • 64 篇 统计学(可授理学、...
    • 35 篇 化学
    • 30 篇 系统科学
    • 20 篇 地球物理学
  • 198 篇 管理学
    • 118 篇 图书情报与档案管...
    • 87 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 50 篇 医学
    • 39 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 16 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 8 篇 农学
  • 5 篇 教育学

主题

  • 43 篇 semantics
  • 34 篇 training
  • 31 篇 feature extracti...
  • 29 篇 deep learning
  • 20 篇 computational mo...
  • 19 篇 knowledge graph
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 16 篇 data models
  • 15 篇 conferences
  • 15 篇 federated learni...
  • 14 篇 data mining
  • 14 篇 graph neural net...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 171 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 63 篇 cas key laborato...
  • 43 篇 school of comput...
  • 34 篇 key laboratory o...
  • 32 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 gansu provincial...
  • 12 篇 institute of art...
  • 12 篇 key laboratory o...
  • 12 篇 chongqing key la...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 23 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 16 篇 xueqi cheng
  • 14 篇 niyato dusit
  • 14 篇 sun xiaoming
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 858 篇 英文
  • 56 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
923 条 记 录,以下是291-300 订阅
排序:
Rectangle transformation problem
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Shaojiang He, Kun Pan, Yicheng Xia, Mingji State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences
In this paper, we propose the rectangle transformation problem (RTP) and its variants. RTP asks for a transformation by a rectangle partition between two rectangles of the same area. We are interested in the minimum R... 详细信息
来源: 评论
Learning efficient text-to-image synthesis via interstage cross-sample similarity distillation
收藏 引用
science China(Information sciences) 2021年 第2期64卷 19-30页
作者: Fengling MAO Bingpeng MA Hong CHANG Shiguang SHAN Xilin CHEN School of Information Science and Technology ShanghaiTech University Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing TechnologyChinese Academy of Sciences University of Chinese Academy of Sciences CAS Center for Excellence in Brain Science and Intelligence Technology
For a given text, previous text-to-image synthesis methods commonly utilize a multistage generation model to produce images with high resolution in a coarse-to-fine manner. However, these methods ignore the interactio... 详细信息
来源: 评论
IVE: Accelerating Enumeration-Based Subgraph Matching via Exploring Isolated Vertices  40
IVE: Accelerating Enumeration-Based Subgraph Matching via Ex...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Jiang, Zite Zhang, Shuai Hou, Xingzhong Yuan, Mengting You, Haihang Institute of Computing Technology CAS State Key Lab of Processors Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijinz China Zhongguancun Laboratory Beijing China School of Computer Science Wuhan University Wuhan China
The performance of the enumeration-based sub-graph matching, which searches all isomorphic subgraphs in the data graph, is crucial to various applications. The upper bound of the complexity for the enumeration-based m... 详细信息
来源: 评论
Impossible Differential Analysis on 8-Round PRINCE  9th
Impossible Differential Analysis on 8-Round PRINCE
收藏 引用
9th International Conference on Computer Engineering and networks, CENet2019
作者: Ding, Yaoling Jia, Keting Wang, An Shi, Ying School of Computer Science Beijing Institute of Technology Beijing100081 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a... 详细信息
来源: 评论
Classifier Guidance Enhances Diffusion-based Adversarial Purification by Preserving Predictive Information
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Mingkun Li, Jianing Chen, Wei Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial... 详细信息
来源: 评论
ReCoSa: Detecting the relevant contexts with self-attention for multi-turn dialogue generation
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Hainan Y., Lan L., Pang J., Guo X., Cheng CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
In multi-turn dialogue generation, response is usually related with only a few contexts. Therefore, an ideal model should be able to detect these relevant contexts and produce a suitable response accordingly. However,... 详细信息
来源: 评论
GERE: Generative Evidence Retrieval for Fact Verification
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Jiangui Zhang, Ruqing Guo, Jiafeng Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
Fact verification (FV) is a challenging task which aims to verify a claim using multiple evidential sentences from trustworthy corpora, e.g., Wikipedia. Most existing approaches follow a three-step pipeline framework,... 详细信息
来源: 评论
Influence maximization with ε-almost submodular threshold functions  17
Influence maximization with ε-almost submodular threshold f...
收藏 引用
Proceedings of the 31st International Conference on Neural Information Processing Systems
作者: Qiang Li Wei Chen Xiaoming Sun Jialin Zhang CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences Microsoft Research
Influence maximization is the problem of selecting k nodes in a social network to maximize their influence spread. The problem has been extensively studied but most works focus on the submodular influence diffusion mo...
来源: 评论
HiSMatch: Historical Structure Matching based Temporal Knowledge Graph Reasoning
arXiv
收藏 引用
arXiv 2022年
作者: Li, Zixuan Hou, Zhongni Guan, Saiping Jin, Xiaolong Peng, Weihua Bai, Long Lyu, Yajuan Li, Wei Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Baidu Inc China
A Temporal Knowledge Graph (TKG) is a sequence of KGs with respective timestamps, which adopts quadruples in the form of (subject, relation, object, timestamp) to describe dynamic facts. TKG reasoning has facilitated ... 详细信息
来源: 评论
Complex Evolutional Pattern Learning for Temporal Knowledge Graph Reasoning
arXiv
收藏 引用
arXiv 2022年
作者: Li, Zixuan Guan, Saiping Jin, Xiaolong Peng, Weihua Lyu, Yajuan Zhu, Yong Bai, Long Li, Wei Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Baidu Inc China
A Temporal Knowledge Graph (TKG) is a sequence of KGs corresponding to different timestamps. TKG reasoning aims to predict potential facts in the future given the historical KG sequences. One key of this task is to mi... 详细信息
来源: 评论