咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 177 篇 会议

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 251 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 63 篇 信息与通信工程
    • 37 篇 生物工程
    • 26 篇 控制科学与工程
    • 25 篇 电气工程
    • 23 篇 光学工程
    • 23 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 9 篇 安全科学与工程
    • 8 篇 机械工程
    • 8 篇 环境科学与工程(可...
  • 176 篇 理学
    • 90 篇 数学
    • 60 篇 物理学
    • 41 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 14 篇 化学
    • 13 篇 地球物理学
    • 8 篇 系统科学
  • 134 篇 管理学
    • 104 篇 图书情报与档案管...
    • 35 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 14 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 12 篇 法学
    • 10 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 4 篇 文学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 16 篇 deep learning
  • 13 篇 information retr...
  • 12 篇 generative adver...
  • 12 篇 training
  • 11 篇 graph neural net...
  • 9 篇 convolution
  • 9 篇 knowledge graph
  • 9 篇 forecasting
  • 8 篇 feature extracti...
  • 7 篇 learning systems
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 image segmentati...
  • 6 篇 computational li...
  • 6 篇 natural language...
  • 5 篇 surveys
  • 5 篇 reinforcement le...
  • 5 篇 big data
  • 5 篇 prototypes

机构

  • 146 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 27 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 school of comput...
  • 20 篇 cas key lab of n...
  • 17 篇 data intelligenc...
  • 12 篇 institute for ai...
  • 11 篇 key lab. of inte...
  • 11 篇 school of comput...
  • 11 篇 baidu inc
  • 10 篇 cas key laborato...
  • 10 篇 peng cheng labor...
  • 10 篇 zhejiang lab
  • 9 篇 institute of com...
  • 9 篇 tianjin key labo...
  • 8 篇 haihe lab of ita...
  • 8 篇 linke lab school...
  • 7 篇 cas key laborato...

作者

  • 176 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 55 篇 zhang ruqing
  • 55 篇 fan yixing
  • 49 篇 lan yanyan
  • 43 篇 shen huawei
  • 30 篇 pang liang
  • 26 篇 jin xiaolong
  • 26 篇 bi keping
  • 22 篇 cao qi
  • 20 篇 de rijke maarten
  • 20 篇 xueqi cheng
  • 19 篇 xu jun
  • 18 篇 chen wei
  • 15 篇 li zixuan
  • 15 篇 guan saiping
  • 13 篇 sun xiaoming
  • 13 篇 bai long
  • 10 篇 xiaolong jin
  • 10 篇 huang qingming

语言

  • 455 篇 英文
  • 36 篇 其他
  • 3 篇 中文
检索条件"机构=Cas Key Lab of Network Data Science and Technology"
494 条 记 录,以下是131-140 订阅
排序:
MEFold: Memory-Efficient Optimization for Protein Language Models via Chunk and Quantization
MEFold: Memory-Efficient Optimization for Protein Language M...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yanfeng Jiang Ning Sun Zhengxian Lu Shuang Peng Yi Zhang Fei Yang Tao Li College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Hangzhou China Haihe Lab of ITAI Tianjin China
Protein language models are currently experiencing a surge in demand owing to their remarkable accuracy in protein structure prediction. Nevertheless, their applications are hindered by the significant computation and... 详细信息
来源: 评论
DFS-NER: Description Enhanced Few-shot NER via Prompt Learning and Meta-Learning
DFS-NER: Description Enhanced Few-shot NER via Prompt Learni...
收藏 引用
2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent technology (WI-IAT)
作者: Huinan Huang Yuming Feng Xiaolong Jin Saiping Guan Jiafeng Guo School of Computer Science and Technology University of Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences
Named Entity Recognition (NER) is a very common task in many social good related domains. Recently, deep learning based NER has gradually matured, but still faces the scarcity problem of labeled data in specific domai... 详细信息
来源: 评论
Community discovery method based on complex network of data fusion based on the super network perspective
收藏 引用
International Journal of Computers and Applications 2021年 第4期43卷 383-390页
作者: Pei, Li School of Computer Science & Technology Xi‘an University of Posts and Telecommunications Xi‘an China Shaanxi Key Laboratory of Network Data Intelligent Processing Xi‘an University of Posts and Telecommunications Xi‘an China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi‘an Jiaotong University Xi‘an China
To enhance the computational efficiency and precision of community discovery, a community discovery algorithm with the mixed label based on the minimum description length (MDI) of information compression is proposed i... 详细信息
来源: 评论
PRADA: Practical Black-Box Adversarial Attacks against Neural Ranking Models
arXiv
收藏 引用
arXiv 2022年
作者: Wu, Chen Zhang, Ruqing Guo, Jiafeng de Rijke, Maarten Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China University of Amsterdam Netherlands
Neural ranking models (NRMs) have shown remarkable success in recent years, especially with pre-trained language models. However, deep neural models are notorious for their vulnerability to adversarial examples. Adver... 详细信息
来源: 评论
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan... 详细信息
来源: 评论
A Discriminative Semantic Ranker for Question Retrieval  21
A Discriminative Semantic Ranker for Question Retrieval
收藏 引用
11th ACM SIGIR International Conference on Theory of Information Retrieval, ICTIR 2021
作者: Cai, Yinqiong Fan, Yixing Guo, Jiafeng Zhang, Ruqing Lan, Yanyan Cheng, Xueqi University of Chinese Academy of Sciences Beijing China Cas Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute for Ai Industry Research Tsinghua University Beijing China
Similar question retrieval is a core task in community-based question answering (CQA) services. To balance the effectiveness and efficiency, the question retrieval system is typically implemented as multi-stage ranker... 详细信息
来源: 评论
Type-Representation Enhanced Event Detection via Structure Encoder
Type-Representation Enhanced Event Detection via Structure E...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Yuming Feng Linmeng Huang Haozhe Liang Xiaolong Jin Saiping Guan Jiafeng Guo School of Computer Science and Technology University of Chinese Academy of Sciences Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Institute of Systems Engineering Academy of Military Science Beijing
Event detection, aiming to detect whether a sentence contains the type of events of interest, is one of the important tasks in information Extraction. There exist many methods for event detection, which usually treat ...
来源: 评论
Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence  6
Focus on the Stability of Large Systems: Toward Automatic Pr...
收藏 引用
6th IEEE International Conference on data science in Cyberspace, DSC 2021
作者: Song, Shiwen Wu, Qiong Zheng, Xin Wang, Peng Dou, Yuchen Li, Zhongwen Zhai, Lidong Institute Of Information Engineering Chinese Academy Of Sciences BeiJing China Bag Data Academy Zhongke Beijing China Institute Of Computing Technology Chinese Academy Of Sciences Cas Key Laboratory Of Network Data Science And Technology Beijing China
With the increase in the number of users and business volume, the business systems of Internet companies are becoming more and more complex, resulting in a surge in the number of alarms. A large number of dirty alarms... 详细信息
来源: 评论
UAV-Assisted Covert data Collection: When Remote Monitoring Meets Covert Communication
UAV-Assisted Covert Data Collection: When Remote Monitoring ...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Huasheng Su Xiaodong Xu Jing Zhao Jiaxi Zhou Key Lab. of WOC-CAS University of Science and Technology of China Hefei Anhui China Institute of Space Integrated Ground Network Hefei Anhui China
Unmanned aerial vehicle (UAV) assisted remote monitoring and data collection are prevailing applications thanks to its deployment flexibility and strong mobility. To meet security and privacy requirements, this work i...
来源: 评论
Software Module Clustering Using the Hierarchical Clustering Combination Method  7
Software Module Clustering Using the Hierarchical Clustering...
收藏 引用
7th International Conference on Cloud Computing and Big data Analytics, ICCCBDA 2022
作者: Xia, Hong Zhang, Yongkang Chen, Yanping Zhang, Hengshan Wang, Zhongmin Wang, Fengwei School of Computer Science and Technology Xi'An Univ. of P. and Telecom. Shaanxi Key Lab. of Network Data Analysis and Intelligent Processing Xi'an China Xi'An University of Posts and Telecommunications School of Computer Science and Technology Xi'an China ZTECorporation Shenzhen China
The scale of software applications has increased dramatically. Hierarchical clustering is a good method for modular recovery of software architecture. Because the different evaluation criteria of software types and cl... 详细信息
来源: 评论