咨询与建议

限定检索结果

文献类型

  • 496 篇 期刊文献
  • 419 篇 会议

馆藏范围

  • 915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 602 篇 工学
    • 451 篇 计算机科学与技术...
    • 368 篇 软件工程
    • 166 篇 信息与通信工程
    • 81 篇 生物工程
    • 72 篇 电气工程
    • 67 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 27 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 15 篇 网络空间安全
    • 14 篇 航空宇航科学与技...
  • 366 篇 理学
    • 181 篇 数学
    • 108 篇 物理学
    • 91 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 35 篇 化学
    • 29 篇 系统科学
    • 19 篇 地球物理学
  • 194 篇 管理学
    • 117 篇 图书情报与档案管...
    • 85 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 7 篇 农学
  • 5 篇 教育学

主题

  • 42 篇 semantics
  • 32 篇 training
  • 30 篇 feature extracti...
  • 29 篇 deep learning
  • 19 篇 knowledge graph
  • 19 篇 computational mo...
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 15 篇 conferences
  • 15 篇 data mining
  • 15 篇 data models
  • 14 篇 graph neural net...
  • 14 篇 federated learni...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 171 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 43 篇 school of comput...
  • 34 篇 key laboratory o...
  • 31 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 institute of art...
  • 13 篇 gansu provincial...
  • 12 篇 chongqing key la...
  • 12 篇 institute for ai...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 22 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 17 篇 xueqi cheng
  • 14 篇 sun xiaoming
  • 12 篇 niyato dusit
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 853 篇 英文
  • 53 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
915 条 记 录,以下是311-320 订阅
排序:
SFDA-rPPG: Source-Free Domain Adaptive Remote Physiological Measurement with Spatio-Temporal Consistency
arXiv
收藏 引用
arXiv 2024年
作者: Xie, Yiping Yu, Zitong Wu, Bingjie Xie, Weicheng Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Singapore
Remote Photoplethysmography (rPPG) is a non-contact method that uses facial video to predict changes in blood volume, enabling physiological metrics measurement. Traditional rPPG models often struggle with poor genera... 详细信息
来源: 评论
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Haiqing Lv Xiaohui Han Peipei Wang Wenbo Zuo Jing Guo Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
Hierarchical Reverse Games for the Resource Ecosystem in Cloud-Edge computing
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Pei, Manlin Wang, Chenyu Wang, Xia Zheng, Zhigao Huang, Jianhui Wang, Shengling Guo, Yufei School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Computer Science Georgia State University United States Beijing University of Technology School of Statistics and Data Science Faculty of Science Beijing China Institute of Artificial Intelligence School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Hubei Luojia Laboratory Wuhan University Wuhan China Chinese Academy of Sciences Institute of Computing Technology Beijing China Beijing Normal University School of Artificial Intelligence Beijing China George Washington University Department of Statistics United States
Edge computing has emerged as a killer technology for a hyper-connected world due to its distributed architecture and customer-proximity property. Combined edge nodes with the cloud data center, a cloud-edge computing... 详细信息
来源: 评论
Dynamic Erasing network Based on Multi-Scale Temporal Features for Weakly Supervised Video Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Chen Li, Guorong Qi, Yuankai Ye, Hanhua Qing, Laiyun Yang, Ming-Hsuan Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Australian Institute for Machine Learning The University of Adelaide Australia University of California Merced United States Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS China
The goal of weakly supervised video anomaly detection is to learn a detection model using only video-level labeled data. However, prior studies typically divide videos into fixed-length segments without considering th... 详细信息
来源: 评论
Learning efficient text-to-image synthesis via interstage cross-sample similarity distillation
收藏 引用
science China(Information sciences) 2021年 第2期64卷 19-30页
作者: Fengling MAO Bingpeng MA Hong CHANG Shiguang SHAN Xilin CHEN School of Information Science and Technology ShanghaiTech University Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing TechnologyChinese Academy of Sciences University of Chinese Academy of Sciences CAS Center for Excellence in Brain Science and Intelligence Technology
For a given text, previous text-to-image synthesis methods commonly utilize a multistage generation model to produce images with high resolution in a coarse-to-fine manner. However, these methods ignore the interactio... 详细信息
来源: 评论
Free-Space and Fiber-Integrated Measurement-Device-Independent Quantum key Distribution under High Background Noise
收藏 引用
Physical Review Letters 2023年 第10期131卷 100802-100802页
作者: Yu-Huai Li Shuang-Lin Li Xiao-Long Hu Cong Jiang Zong-Wen Yu Wei Li Wei-Yue Liu Sheng-Kai Liao Ji-Gang Ren Hao Li Lixing You Zhen Wang Juan Yin Feihu Xu Qiang Zhang Xiang-Bin Wang Yuan Cao Cheng-Zhi Peng Jian-Wei Pan Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences University of Science and Technology of China Hefei 230026 China Shanghai Research Center for Quantum Science and CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Shanghai 201315 China Hefei National Laboratory University of Science and Technology of China Hefei 230088 China State Key Laboratory of Low Dimensional Quantum Physics Tsinghua University Beijing 100084 People’s Republic of China Data Communication Science and Technology Research Institute Beijing 100191 China State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai 200050 People’s Republic of China
Measurement-device-independent quantum key distribution (MDI QKD) provides immunity against all attacks targeting measurement devices. It is essential to implement MDI QKD in the future global-scale quantum communicat... 详细信息
来源: 评论
Probing globular cluster with MeerKAT and FAST: a pulsar polarization census
收藏 引用
science Bulletin 2025年 第10期70卷 1568-1571页
作者: Zhang, Lei Abbate, Federico Li, Di Possenti, Andrea Bailes, Matthew Ridolfi, Alessandro Freire, Paulo C.C. Ransom, Scott M. Zhang, Yong-Kun Guo, Meng Ni, Meng-Meng Hu, Jia-Le Feng, Yi Wang, Pei Zhang, Jie Zhi, Qi-Jun National Astronomical Observatories Chinese Academy of Sciences Beijing100101 China Centre for Astrophysics and Supercomputing Swinburne University of Technology VIC3122 Australia INAF – Osservatorio Astronomico di Cagliari Via della Scienza 5 SelargiusI-09047 Italy Max-Planck-Institut für Radioastronomie Auf dem Hügel 69 BonnD-53121 Germany New Cornerstone Science Laboratory Department of Astronomy Tsinghua University Beijing100084 China Swinburne University of Technology VIC3122 Australia Faculty of Physics University of Bielefeld Bielefeld33501 Germany National Radio Astronomy Observatory Charlottesville22903 United States National Supercomputing Center in Jinan Qilu University of Technology Jinan250103 China Jinan Institute of Supercomputing Technology Jinan250103 China Research Center for Intelligent Computing Platforms Zhejiang Laboratory Hangzhou311100 China Institute for Astronomy School of Physics Zhejiang University Hangzhou310027 China College of Physics and Electronic Engineering Qilu Normal University Jinan250200 China Guizhou Provincial Key Laboratory of Radio Astronomy and Data Processing Guizhou Normal University Guiyang550001 China
来源: 评论
Impossible Differential Analysis on 8-Round PRINCE  9th
Impossible Differential Analysis on 8-Round PRINCE
收藏 引用
9th International Conference on Computer Engineering and networks, CENet2019
作者: Ding, Yaoling Jia, Keting Wang, An Shi, Ying School of Computer Science Beijing Institute of Technology Beijing100081 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a... 详细信息
来源: 评论
Graph Regularized Nonnegative Latent Factor Analysis Model for Temporal Link Prediction in Cryptocurrency Transaction networks  19
Graph Regularized Nonnegative Latent Factor Analysis Model f...
收藏 引用
19th IEEE International Conference on networking, Sensing and Control, ICNSC 2022
作者: Zhou, Yue Liu, ZhiGang Yuan, Ye Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China The Chongqing School University of Chinese Academy of Sciences Chongqing400714 China Southwest University College of Computer and Information Science Chongqing400715 China
With the development of blockchain technology, a cryptocurrency based on blockchain technology is becoming more and more popular. The huge cryptocurrency transaction network has therefore received widespread attention... 详细信息
来源: 评论
CMFDFormer: Transformer-based Copy-Move Forgery Detection with Continual Learning
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Yaqi Xia, Chao Xiao, Song Guan, Qingxiao Dong, Wenqian Zhang, Yifan Yu, Nenghai Beijing Electronic Science and Technology Institute Beijing100070 China The Computer Engineering College Jimei University Xiamen361021 China The State Key Laboratory of Integrated Service Network Xidian University Xi'An710071 China The CAS Key Laboratory of Electro-magnetic Space Information University of Science and Technology of China Hefei230026 China
Copy-move forgery detection aims at detecting duplicated regions in a suspected forged image, and deep learning based copy-move forgery detection methods are in the ascendant. These deep learning based methods heavily... 详细信息
来源: 评论