咨询与建议

限定检索结果

文献类型

  • 1,531 篇 期刊文献
  • 1,283 篇 会议
  • 1 册 图书

馆藏范围

  • 2,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,329 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 443 篇 信息与通信工程
    • 221 篇 生物工程
    • 213 篇 电气工程
    • 185 篇 控制科学与工程
    • 160 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 107 篇 机械工程
    • 105 篇 生物医学工程(可授...
    • 102 篇 化学工程与技术
    • 77 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 52 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
  • 1,014 篇 理学
    • 497 篇 数学
    • 277 篇 物理学
    • 255 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 92 篇 化学
    • 75 篇 系统科学
  • 517 篇 管理学
    • 275 篇 图书情报与档案管...
    • 252 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 108 篇 医学
    • 88 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 86 篇 法学
    • 64 篇 社会学
  • 44 篇 经济学
    • 44 篇 应用经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 111 篇 semantics
  • 76 篇 feature extracti...
  • 66 篇 training
  • 65 篇 deep learning
  • 54 篇 accuracy
  • 42 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 35 篇 data mining
  • 35 篇 graph neural net...
  • 34 篇 object detection
  • 33 篇 image segmentati...
  • 31 篇 privacy
  • 30 篇 optimization
  • 28 篇 data models
  • 27 篇 forecasting
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 reinforcement le...
  • 25 篇 knowledge graph

机构

  • 164 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 49 篇 network and data...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 46 篇 school of comput...
  • 46 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of cyber ...
  • 28 篇 key lab of infor...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 cas key lab of n...

作者

  • 185 篇 cheng xueqi
  • 143 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 zhang ruqing
  • 42 篇 fan yixing
  • 34 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 22 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 de rijke maarten
  • 20 篇 chen yanping
  • 20 篇 xu jun
  • 19 篇 cao qi
  • 18 篇 pan jeng-shyang

语言

  • 2,632 篇 英文
  • 142 篇 其他
  • 43 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2815 条 记 录,以下是1-10 订阅
排序:
SmartZone: Runtime Support for Secure and Efficient On-device Inference on ARM TrustZone
收藏 引用
IEEE Transactions on Computers 2025年 第6期74卷 2144-2158页
作者: Jian, Zhaolong Liu, Xu Dong, Qiankun Cheng, Longkai Xie, Xueshuo Li, Tao Nankai University College of Computer Science Tianjin China Tianjin Key Laboratory of Network Tianjin China Data Science Technology Tianjin China Haihe Lab of ITAI Tianjin China
On-device inference is a burgeoning paradigm that performs model inference locally on end devices, allowing private data to remain local. ARM TrustZone as a widely supported trusted execution environment has been appl... 详细信息
来源: 评论
Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5446-5463页
作者: Bi, Ye Jia, Chunfu Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology DISSEC Tianjin300350 China
The booming 5 G cellular networks sparked tremendous interest in supporting more sophisticated critical use cases through vehicle-to-network (V2N) communications. However, the inherent technical vulnerabilities and de... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
A Novel Approach to Cloud Security: Publicly Verifiable Remote Signcryption Framework
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14828-14844页
作者: Ali, Mohammad Liu, Ximeng Amirkabir University of Technology Department of Mathematics and Computer Science Tehran Iran Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou350108 China
In communication systems, ensuring both data integrity and confidentiality is crucial. Traditional methods, such as encryption and signature schemes, handle these aspects separately, leading to inefficiencies. Signcry... 详细信息
来源: 评论
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
Inductive Link Prediction in N-ary Knowledge Graphs  31
Inductive Link Prediction in N-ary Knowledge Graphs
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
N-ary Knowledge Graphs (NKGs), where a fact can involve more than two entities, have gained increasing attention. Link Prediction in NKGs (LPN) aims to predict missing elements in facts to facilitate the completion of... 详细信息
来源: 评论
ADLT: a novel method for effective detection of adversarial attacks in image retrieval
ADLT: a novel method for effective detection of adversarial ...
收藏 引用
2024 International Conference on Computer Vision and Image Processing, CVIP 2024
作者: Xu, Shiyue Zhang, Yu College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
The versatile application of deep learning has made it prone to vulnerabilities, particularly adversarial attacks, which have been increasingly prevalent as its scope expands. Attack methods based on adversarial queri... 详细信息
来源: 评论
Large Language Model-Based Event Relation Extraction with Rationales  31
Large Language Model-Based Event Relation Extraction with Ra...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Hu, Zhilei Li, Zixuan Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesSchool of Computer Science and Technology University of Chinese Academy of Sciences
Event Relation Extraction (ERE) aims to extract various types of relations between different events within texts. Although Large Language Models (LLMs) have demonstrated impressive capabilities in many natural languag... 详细信息
来源: 评论
Machine learning empowered UAV-based beamforming design in ISAC systems
收藏 引用
science China(Information sciences) 2025年 第5期68卷 285-286页
作者: Xiangyang DUAN Xiaoqi ZHANG Shuqiang XIA Zhongbin WANG Yihua MA Weijie YUAN State Key Laboratory of Mobile Network and Mobile Multimedia Technology Wireless and Computing Research InstituteZTE Corporation School of Electrical and Data Engineering University of Technology Sydney School of Automation and Intelligent Manufacturing Southern University of Science and Technology
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the...
来源: 评论
Robust Information Retrieval  25
Robust Information Retrieval
收藏 引用
18th ACM International Conference on Web Search and data Mining, WSDM 2025
作者: Liu, Yu-An Zhang, Ruqing Guo, Jiafeng de Rijke, Maarten CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Beyond effectiveness, the robustness of an information retrieval (IR) system is increasingly attracting attention. When deployed, a critical technology such as IR should not only deliver strong performance on average ... 详细信息
来源: 评论