咨询与建议

限定检索结果

文献类型

  • 491 篇 期刊文献
  • 416 篇 会议

馆藏范围

  • 907 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 603 篇 工学
    • 451 篇 计算机科学与技术...
    • 369 篇 软件工程
    • 166 篇 信息与通信工程
    • 81 篇 生物工程
    • 72 篇 电气工程
    • 67 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 27 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 15 篇 网络空间安全
    • 14 篇 航空宇航科学与技...
  • 366 篇 理学
    • 181 篇 数学
    • 109 篇 物理学
    • 91 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 35 篇 化学
    • 29 篇 系统科学
    • 19 篇 地球物理学
  • 194 篇 管理学
    • 117 篇 图书情报与档案管...
    • 85 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 7 篇 农学
  • 5 篇 教育学

主题

  • 42 篇 semantics
  • 32 篇 training
  • 30 篇 feature extracti...
  • 29 篇 deep learning
  • 19 篇 knowledge graph
  • 19 篇 computational mo...
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 15 篇 conferences
  • 15 篇 data models
  • 14 篇 data mining
  • 14 篇 graph neural net...
  • 14 篇 federated learni...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 169 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 43 篇 school of comput...
  • 33 篇 key laboratory o...
  • 31 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 gansu provincial...
  • 12 篇 institute of art...
  • 12 篇 chongqing key la...
  • 12 篇 institute for ai...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 22 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 16 篇 xueqi cheng
  • 14 篇 sun xiaoming
  • 12 篇 niyato dusit
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 844 篇 英文
  • 54 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
907 条 记 录,以下是461-470 订阅
排序:
Threshold-independent method for single-shot readout of spin qubits in semiconductor quantum dots
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Rui-Zi Zhu, Sheng-Kai Zhang, Xin Zhou, Yuan Ni, Ming Ma, Rong-Long Luo, Gang Kong, Zhen-Zhen Wang, Gui-Lei Cao, Gang Li, Hai-Ou Guo, Guo-Ping CAS Key Laboratory of Quantum Information University of Science and Technology of China Anhui Hefei230026 China CAS Center For Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Hefei230026 China Key Laboratory of Microelectronics Devices and Integrated Technology Institute of Microelectronics Chinese Academy of Sciences Beijing100029 China Beijing Superstring Academy of Memory Technology Beijing100176 China Origin Quantum Computing Company Limited Anhui Hefei230026 China
The single-shot readout data process is essential for the realization of high-fidelity qubits and fault-tolerant quantum algorithms in semiconductor quantum dots. However, the fidelity and visibility of the readout pr... 详细信息
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
Audio-Visual Target Speaker Extraction with Reverse Selective Auditory Attention
arXiv
收藏 引用
arXiv 2024年
作者: Tao, Ruijie Qian, Xinyuan Jiang, Yidi Li, Junjie Wang, Jiadong Li, Haizhou Department of Electrical and Computer Engineering National University of Singapore Singapore Department of Computer Science and Technology University of Science and Technology Beijing Beijing100083 China Chinese University of Hong Kong Shenzhen518172 China Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big data Shenzhen518172 China Department of Electrical and Computer Engineering National University of Singapore 119077 Singapore University of Bremen 28359 Germany
Audio-visual target speaker extraction (AV-TSE) aims to extract the specific person’s speech from the audio mixture given auxiliary visual cues. Previous methods usually search for the target voice through speech-lip... 详细信息
来源: 评论
Continuous Distributed Processing of Software Defined Radar
Continuous Distributed Processing of Software Defined Radar
收藏 引用
IEEE International Conference on Radar
作者: Bing Li Qiang Qiu Shiqi Gong Yongjun Liu Yu Lei CAS Key Lab of Network Data Science and Technology Chinese Academy of Sciences Institute of Computing Technology Beijing China State Key Laboratory of Internet of Things for Smart City University of Macau Macau China National Laboratory of Radar Signal Processing Xidian University Xi'an China Golaxy Data Technology Co. Ltd. Beijing China
Software-defined radar has been an active research field for more than ten years. However, the low performance and low scalability of the traditional processing techniques of SDR make it hard to deal with complex rada... 详细信息
来源: 评论
Simultaneous q-Space Sampling Optimization and Reconstruction for Fast and High-fidelity Diffusion Magnetic Resonance Imaging
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Jing Cheng, Jian Li, Cheng Fan, Wenxin Zou, Juan Wu, Ruoyou Wang, Shanshan Paul C. Lauterbur Research Center for Biomedical Imaging Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen China University of Chinese Academy of Sciences Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing China Peng Cheng Laboratory Guangdong Shenzhen China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangdong China Key Laboratory of Data Science and Intelligent Computing Institute of International Innovation Beihang University Yuhang District Hangzhou China
Diffusion Magnetic Resonance Imaging (dMRI) plays a crucial role in the noninvasive investigation of tissue microstructural properties and structural connectivity in the in vivo human brain. However, to effectively ca... 详细信息
来源: 评论
MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xiping Chen, Jing Wu, Cong He, Kun Xu, Haozhe Feng, Yebo Du, Ruiying Chen, Xianhao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Rizhao Institute of Information Technology Wuhan University Rizhao276800 China School of Computer Science and Engineering Nanyang Technological University Singapore Collaborative Innovation Center of Geospatial Technology Wuhan430079 China The Department of Electrical and Electronic Engineering HKU Musketeers Foundation Institute of Data Science University of Hong Kong Pok Fu Lam Hong Kong
Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using loudspeakers to bypass the vo... 详细信息
来源: 评论
Using Label-text Correlation and Deviation Punishment for Fine-grained Suicide Risk Detection in Social Media
Using Label-text Correlation and Deviation Punishment for Fi...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zepeng Li Zhengyi An Wenchuan Cheng Jiawei Zhou Bin Hu Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University Lanzhou China School of Medical Technology Beijing Institute of Technology Beijing China CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Chines Academy of Sciences Shanghai China
Suicide causes serious harm to individuals, families and society, and becomes a social problem of widespread concern. Therefore, it is necessary to find and intervene individuals at risk of suicide as soon as possible... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
IEEE International Conference on data science in Cyberspace (DSC)
作者: Honglei Yao Donglan Liu Yingxian Chang Xin Liu Chaofan Tang State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
The Temporal Structural Pattern in Scientific Collaborative Behavior from the Perspective of Complex network  23rd
The Temporal Structural Pattern in Scientific Collaborative...
收藏 引用
23rd International Symposium on Knowledge and Systems sciences, KSS 2024
作者: Zholdoshbaeva, Elina Zhang, Shuang Liu, Feifan Xia, Haoxiang Institute of Systems Engineering Dalian University of Technology No. 2 Linggong Road Liaoning Dalian116024 China Center for Big Data and Intelligent Decision-Making Dalian University of Technology Linggong Road Liaoning Dalian116024 China School of Business East China University of Science and Technology 130 Meilong Road Xuhui District Shanghai200237 China Institute for Advanced Intelligence Dalian University of Technology Linggong Road Liaoning Dalian116024 China Key Laboratory of Social Computing and Cognitive Intelligence Ministry of Education of China Linggong Road Liaoning Dalian116024 China
The rapid advancement of science has underscored the importance of collaboration among scientists. While many studies have explored the structure of collaboration networks, there is a lack of comprehensive quantitativ... 详细信息
来源: 评论
Few-Shot Knowledge Graph Completion based on data Enhancement
Few-Shot Knowledge Graph Completion based on Data Enhancemen...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zepeng Li Peilun Geng Shuo Cao Bin Hu Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University Lanzhou China School of Medical Technology Beijing Institute of Technology Beijing China Chines Academy of Sciences CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Shanghai China
Knowledge graphs (KGs) are widely used in various natural language processing applications. In order to expand the coverage of a KG, KG completion has attracted extensive attention. The commonly used embedding methods... 详细信息
来源: 评论