咨询与建议

限定检索结果

文献类型

  • 1,506 篇 期刊文献
  • 1,284 篇 会议

馆藏范围

  • 2,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,908 篇 工学
    • 1,330 篇 计算机科学与技术...
    • 1,124 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 204 篇 电气工程
    • 196 篇 控制科学与工程
    • 167 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,011 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 74 篇 系统科学
  • 518 篇 管理学
    • 276 篇 图书情报与档案管...
    • 252 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 64 篇 deep learning
  • 61 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 30 篇 optimization
  • 30 篇 privacy
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 24 篇 reinforcement le...

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 47 篇 college of compu...
  • 47 篇 network and data...
  • 46 篇 shandong enginee...
  • 46 篇 school of comput...
  • 46 篇 tianjin key labo...
  • 35 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of cyber ...
  • 28 篇 key lab of infor...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 cas key lab of n...

作者

  • 185 篇 cheng xueqi
  • 142 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 34 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao
  • 18 篇 pan jeng-shyang

语言

  • 2,602 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2790 条 记 录,以下是211-220 订阅
排序:
CIR at the NTCIR-17 ULTRE-2 Task
arXiv
收藏 引用
arXiv 2023年
作者: Yu, Lulu Bi, Keping Guo, Jiafeng Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS University of Chinese Academy of Sciences Beijing China
The Chinese academy of sciences Information Retrieval team (CIR) has participated in the NTCIR-17 ULTRE-2 task. This paper describes our approaches and reports our results on the ULTRE-2 task. We recognize the issue o... 详细信息
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement network for Image Inpainting  29
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Zhao, Shengrong Liang, Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble Inference  29
Multilingual Knowledge Graph Completion via Multimodal Decou...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Xiaojing Jiang, Xuesong Yi, Fengge Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula... 详细信息
来源: 评论
Generative Retrieval for Book Search  25
Generative Retrieval for Book Search
收藏 引用
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and data Mining V.1
作者: Yubao Tang Ruqing Zhang Jiafeng Guo Maarten de Rijke Shihao Liu Shuaiqiang Wang Dawei Yin Xueqi Cheng CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of the Chinese Academy of Sciences Beijing China & University of Amsterdam Amsterdam Netherlands CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China & University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands Baidu Inc. Beijing China
In book search, relevant book information should be returned in response to a query. Books contain complex, multi-faceted information such as metadata, outlines, and main text, where the outline provides hierarchical ... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
What makes a successful rebuttal in computer science conferences?: A perspective on social interaction
What makes a successful rebuttal in computer science confere...
收藏 引用
作者: Huang, Junjie Huang, Win-bin Bu, Yi Cao, Qi Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Information Management Peking University Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
With an exponential increase in submissionsto top-tier Computer science (CS) conferences, more and more conferences have introduced a rebuttal stage to the conference peer review process. The rebuttal stage can be mod... 详细信息
来源: 评论
A Secure and Lightweight Client-Side Deduplication Approach for Resisting Side Channel Attacks
A Secure and Lightweight Client-Side Deduplication Approach ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuchen Chen Chunfu Jia Guanxiong Ha Xuan Shan Hang Chen The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security (DISSec) Data Security Technology Tianjin China
Client-side deduplication system is widely used in cloud storage systems to reduce storage and communication overhead by eliminating the storing and uploading of duplicate data. However, it is vulnerable to side chann... 详细信息
来源: 评论
Real-Time Semantic Segmentation Algorithm Based on Tversky Loss Function and Mixed Pooling
Real-Time Semantic Segmentation Algorithm Based on Tversky L...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Xu, Peng Zhao, Ziyi Ma, Sugang Xi'an Science and Technology Museum Shaanxi Xi'an710002 China School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China
In recent years, semantic segmentation methods based on deep learning have made remarkable developments. Despite achieving high segmentation accuracy, the performance of real-time segmentation methods cannot satisfy r... 详细信息
来源: 评论
Learning Dual-Domain Calibration and Distance-Driven Correlation Filter:A Probabilistic Perspective for UAV Tracking
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3741-3764页
作者: Taiyu Yan Yuxin Cao Guoxia Xu Xiaoran Zhao Hu Zhu Lizhen Deng Jiangsu Province Key Lab on Image Processing and Image Communication Nanjing University of Posts and TelecommunicationsNanjingChina School of Computer Science Qufu Normal UniversityQufuChina National Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjingChina
Unmanned Aerial Vehicle(UAV)tracking has been possible because of the growth of intelligent information technology in smart cities,making it simple to gather data at any time by dynamically monitoring events,people,th... 详细信息
来源: 评论