咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 177 篇 会议

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 251 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 63 篇 信息与通信工程
    • 37 篇 生物工程
    • 26 篇 控制科学与工程
    • 25 篇 电气工程
    • 23 篇 光学工程
    • 23 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 9 篇 安全科学与工程
    • 8 篇 机械工程
    • 8 篇 环境科学与工程(可...
  • 176 篇 理学
    • 90 篇 数学
    • 60 篇 物理学
    • 41 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 14 篇 化学
    • 13 篇 地球物理学
    • 8 篇 系统科学
  • 134 篇 管理学
    • 104 篇 图书情报与档案管...
    • 35 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 14 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 12 篇 法学
    • 10 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 4 篇 文学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 16 篇 deep learning
  • 13 篇 information retr...
  • 12 篇 generative adver...
  • 12 篇 training
  • 11 篇 graph neural net...
  • 9 篇 convolution
  • 9 篇 knowledge graph
  • 9 篇 forecasting
  • 8 篇 feature extracti...
  • 7 篇 learning systems
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 image segmentati...
  • 6 篇 computational li...
  • 6 篇 natural language...
  • 5 篇 surveys
  • 5 篇 reinforcement le...
  • 5 篇 big data
  • 5 篇 prototypes

机构

  • 146 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 27 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 school of comput...
  • 20 篇 cas key lab of n...
  • 17 篇 data intelligenc...
  • 12 篇 institute for ai...
  • 11 篇 key lab. of inte...
  • 11 篇 school of comput...
  • 11 篇 baidu inc
  • 10 篇 cas key laborato...
  • 10 篇 peng cheng labor...
  • 10 篇 zhejiang lab
  • 9 篇 institute of com...
  • 9 篇 tianjin key labo...
  • 8 篇 haihe lab of ita...
  • 8 篇 linke lab school...
  • 7 篇 cas key laborato...

作者

  • 176 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 55 篇 zhang ruqing
  • 55 篇 fan yixing
  • 49 篇 lan yanyan
  • 43 篇 shen huawei
  • 30 篇 pang liang
  • 26 篇 jin xiaolong
  • 26 篇 bi keping
  • 22 篇 cao qi
  • 20 篇 de rijke maarten
  • 20 篇 xueqi cheng
  • 19 篇 xu jun
  • 18 篇 chen wei
  • 15 篇 li zixuan
  • 15 篇 guan saiping
  • 13 篇 sun xiaoming
  • 13 篇 bai long
  • 10 篇 xiaolong jin
  • 10 篇 huang qingming

语言

  • 455 篇 英文
  • 36 篇 其他
  • 3 篇 中文
检索条件"机构=Cas Key Lab of Network Data Science and Technology"
494 条 记 录,以下是181-190 订阅
排序:
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital Communications and networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
GCN-ALP: Addressing matching collisions in anchor link prediction
arXiv
收藏 引用
arXiv 2021年
作者: Gao, Hao Wang, Yongqing Lyu, Shanshan Shen, Huawei Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Nowadays online users prefer to join multiple social media for the purpose of socialized online service. The problem anchor link prediction is formalized to link user data with the common ground on user profile, conte... 详细信息
来源: 评论
Improved Far-field Speaker Recognition Method Based Geometry Acoustic Simulation and SpecAugment
Improved Far-field Speaker Recognition Method Based Geometry...
收藏 引用
2021 International Conference on Intelligent Computing, Automation and Applications, ICAA 2021
作者: Lian, Yingzi Pang, Jing Inner Mongolia University of Technology College of Science Hohhot China Inner Mongolia Key Lab. of Statistical Analysis Theory for Life Data and Neural Network Modeling Inner Mongolia University of Technology Hohhot China
Deep learning method has made a great breakthrough in the field of speaker recognition. However, the performance of deep learning method based neural network often degrade in far-field speaker recognition task, with r... 详细信息
来源: 评论
NeuInfer: Knowledge inference on N-ary facts  58
NeuInfer: Knowledge inference on N-ary facts
收藏 引用
58th Annual Meeting of the Association for Computational Linguistics, ACL 2020
作者: Guan, Saiping Jin, Xiaolong Guo, Jiafeng Wang, Yuanzhuo Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences
Knowledge inference on knowledge graph has attracted extensive attention, which aims to find out connotative valid facts in knowledge graph and is very helpful for improving the performance of many downstream applicat... 详细信息
来源: 评论
OAA: An Abstraction for Efficient Accelerator Adaptation in Deep Learning Frameworks
OAA: An Abstraction for Efficient Accelerator Adaptation in ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Zhengxian Lu Chengkun Du Xueshuo Xie Qiankun Dong Cheng Gong Tao Li College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Huawei Technologies Zhejiang China Haihe Lab of ITAI Tianjin China College of Software Nankai University Tianjin China
Deep learning frameworks rely on specific runtime and computation libraries to rewrite the backend for the adaptation of specialized accelerators, which is inefficient and hard to guarantee performance. This paper sol... 详细信息
来源: 评论
Unifying Perplexing Behaviors in Modified BP Attributions through Alignment Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Zheng, Guanhua Sang, Jitao Xu, Changsheng The University of Science and Technology of China Hefei230026 China The School of Computer and Information Technology The Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing100044 China The National Lab of Pattern Recognition Institute of Automation CAS Beijing100190 China The University of Chinese Academy of Sciences China
Attributions aim to identify input pixels that are relevant to the decision-making process. A popular approach involves using modified backpropagation (BP) rules to reverse decisions, which improves interpretability c...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Roland: Robust In-band Parallel Communication for Magnetic MIMO Wireless Power Transfer System
Roland: Robust In-band Parallel Communication for Magnetic M...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Wangqiu Zhou Hao Zhou Xiang Cui Xinyu Wang Xiaoyan Wang Zhi Liu LINKE Lab School of Computer Science and Technology University of Science and Technology of China CAS Key Laboratory of Wireless-Optical Communications University of Science and Technology of China Deqing Alpha Innovation Institute Huzhou China Graduate School of Science and Engineering Ibaraki University Ibaraki Japan Department of Computer and Network Engineering The University of Electro-Communications Tokyo Japan
In recent years, receiver (RX) feedback communication has attracted increasing attention to enhance the charging performance for magnetic resonant coupling (MRC) based wireless power transfer (WPT) systems. People pre...
来源: 评论