咨询与建议

限定检索结果

文献类型

  • 495 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 604 篇 工学
    • 452 篇 计算机科学与技术...
    • 369 篇 软件工程
    • 166 篇 信息与通信工程
    • 81 篇 生物工程
    • 73 篇 电气工程
    • 67 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 27 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 15 篇 网络空间安全
    • 14 篇 航空宇航科学与技...
  • 366 篇 理学
    • 181 篇 数学
    • 109 篇 物理学
    • 91 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 35 篇 化学
    • 29 篇 系统科学
    • 19 篇 地球物理学
  • 194 篇 管理学
    • 117 篇 图书情报与档案管...
    • 85 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 7 篇 农学
  • 5 篇 教育学

主题

  • 42 篇 semantics
  • 32 篇 training
  • 30 篇 feature extracti...
  • 29 篇 deep learning
  • 19 篇 knowledge graph
  • 19 篇 computational mo...
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 15 篇 conferences
  • 15 篇 data models
  • 14 篇 data mining
  • 14 篇 graph neural net...
  • 14 篇 federated learni...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 171 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 43 篇 school of comput...
  • 34 篇 key laboratory o...
  • 31 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 gansu provincial...
  • 12 篇 institute of art...
  • 12 篇 chongqing key la...
  • 12 篇 institute for ai...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 22 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 17 篇 xueqi cheng
  • 14 篇 sun xiaoming
  • 12 篇 niyato dusit
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 852 篇 英文
  • 54 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
915 条 记 录,以下是381-390 订阅
排序:
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
FedCache 2.0: Federated Edge Learning with Knowledge Caching and dataset Distillation
arXiv
收藏 引用
arXiv 2024年
作者: Pan, Quyang Sun, Sheng Wu, Zhiyuan Wang, Yuwei Liu, Min Gao, Bo Wang, Jingyuan The State Key Laboratory of Processors Institute of Computing Technology Chinese Academy of Sciences Beijing China The University of Chinese Academy of Sciences Beijing China The Zhongguancun Laboratory Beijing China The School of Computer and Information Technology The Engineering Research Center of Network Management Technology for High-Speed Railway Ministry of Education Beijing Jiaotong University Beijing China The School of Computer Science and Engineering Beihang Unversity Beijing China
Federated Edge Learning (FEL) has emerged as a promising approach for enabling edge devices to collaboratively train machine learning models while preserving data privacy. Despite its advantages, practical FEL deploym... 详细信息
来源: 评论
An Efficient Benders Decomposition Approach for Optimal Large-Scale network Slicing
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Wei-Kun Wu, Zheyu Zhang, Rui-Jin Liu, Ya-Feng Dai, Yu-Hong Luo, Zhi-Quan The School of Mathematics and Statistics Beijing Key Laboratory on MCAACI Beijing Institute of Technology Beijing100081 China The State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China The Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen518172 China
This paper considers the network slicing (NS) problem which attempts to map multiple customized virtual network requests to a common shared network infrastructure and allocate network resources to meet diverse service... 详细信息
来源: 评论
Traffic Engineering in Dynamic Hybrid Segment Routing networks
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论
Predicting RNA Secondary Structure on Universal Quantum Computer
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Ji Yan, Qipeng Li, Ye Lu, Min Cui, Ziwei Dou, Menghan Wang, Qingchun Wu, Yu-Chun Guo, Guo-Ping Origin Quantum Computing Company Limited Anfei Hefei230026 China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Anfei Hefei230088 China CAS Key Laboratory of Quantum Information School of Physics University of Science and Technology of China Hefei230026 China CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Hefei230026 China
It is the first step for understanding how RNA structure folds from base sequences that to know how its secondary structure is formed. Traditional energy-based algorithms are short of precision, particularly for non-n... 详细信息
来源: 评论
BaKGraSTeC: A Background Knowledge Graph Based Method for Short Text Classification
BaKGraSTeC: A Background Knowledge Graph Based Method for Sh...
收藏 引用
IEEE International Conference on Big Knowledge (ICBK)
作者: Xuhui Jiang Yinghan Shen Yuanzhuo Wang Xiaolong Jin Xueqi Cheng CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences
Short text classification is an important task in the area of natural language processing. Recent studies attempt to employ external knowledge to improve classification performance, but they ignore the correlation bet... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
A differential public PUF design for lightweight authentication  16
A differential public PUF design for lightweight authenticat...
收藏 引用
2021 International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, SMACD 2021 and 16th Conference on PhD Research in Microelectronics and Electronics, PRIME 2021
作者: Duan, Shengyu Sai, Gaole School of Computer Engineering and Science Shanghai University Shanghai200444 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology China
Physical Unclonable Functions (PUFs) have emerged as a promising primitive to provide a hardware keyless security mechanism for integrated circuit applications. Public PUFs (PPUFs) address the crucial PUF vulnerabilit... 详细信息
来源: 评论
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Bowen Wu, Chenggang Yew, Pen-Chung Zhang, Yinqian Xie, Mengyao Lai, Yuanming Kang, Yan Wang, Wei Wei, Qiang Wang, Zhe SKLP Institute of Computing Technology CAS Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Zhongguancun Laboratory Beijing China Computer Science & Engineering Department The University of Minnesota-Twin Cities MN55455 United States Department of Computer Science and Engineering The Southern University of Science and Technology Shenzhen518055 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Transient Execution Attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution to illegally access private data, and tra...
来源: 评论
Efficient Quantum Digital Signatures over Long Distances with Likely Bit Strings
arXiv
收藏 引用
arXiv 2024年
作者: Qin, Ji-Qian Yu, Zong-Wen Wang, Xiang-Bin State Key Laboratory of Low Dimensional Quantum Physics Department of Physics Tsinghua University Beijing100084 China Data Communication Science and Technology Research Institute Beijing100191 China Jinan Institute of Quantum technology SAICT Jinan250101 China Shanghai Branch CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics University of Science and Technology of China Shanghai201315 China Shenzhen Institute for Quantum Science and Engineering Physics Department Southern University of Science and Technology Shenzhen518055 China Frontier Science Center for Quantum Information Beijing100084 China
Quantum digital signatures (QDSs) can provide information-theoretic security of messages against forgery and repudiation. Compared with previous QDS protocols that focus on signing one-bit messages, hash function-base... 详细信息
来源: 评论