咨询与建议

限定检索结果

文献类型

  • 1,521 篇 期刊文献
  • 1,337 篇 会议
  • 1 册 图书

馆藏范围

  • 2,859 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,928 篇 工学
    • 1,343 篇 计算机科学与技术...
    • 1,127 篇 软件工程
    • 450 篇 信息与通信工程
    • 219 篇 生物工程
    • 203 篇 控制科学与工程
    • 201 篇 电气工程
    • 170 篇 电子科学与技术(可...
    • 132 篇 光学工程
    • 104 篇 生物医学工程(可授...
    • 102 篇 机械工程
    • 101 篇 化学工程与技术
    • 78 篇 网络空间安全
    • 76 篇 仪器科学与技术
    • 54 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 48 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,013 篇 理学
    • 496 篇 数学
    • 273 篇 物理学
    • 253 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 512 篇 管理学
    • 276 篇 图书情报与档案管...
    • 247 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 17 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 113 篇 semantics
  • 80 篇 feature extracti...
  • 69 篇 deep learning
  • 66 篇 training
  • 64 篇 accuracy
  • 50 篇 federated learni...
  • 47 篇 computational mo...
  • 39 篇 machine learning
  • 36 篇 data mining
  • 35 篇 graph neural net...
  • 34 篇 image segmentati...
  • 34 篇 privacy
  • 33 篇 object detection
  • 32 篇 optimization
  • 30 篇 data models
  • 30 篇 adaptation model...
  • 27 篇 reinforcement le...
  • 27 篇 neural networks
  • 27 篇 forecasting
  • 26 篇 generative adver...

机构

  • 170 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 73 篇 key laboratory o...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 52 篇 shandong enginee...
  • 49 篇 network and data...
  • 48 篇 college of compu...
  • 47 篇 school of comput...
  • 44 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 36 篇 school of cyber ...
  • 35 篇 college of cyber...
  • 34 篇 school of comput...
  • 31 篇 school of comput...
  • 29 篇 peng cheng labor...
  • 28 篇 hubei key labora...
  • 28 篇 national enginee...
  • 27 篇 key lab of infor...
  • 26 篇 hubei engineerin...

作者

  • 188 篇 cheng xueqi
  • 149 篇 guo jiafeng
  • 48 篇 zhang ruqing
  • 45 篇 fan yixing
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 36 篇 jin xiaolong
  • 31 篇 liu jun
  • 30 篇 pang liang
  • 28 篇 jin hai
  • 25 篇 meng deyu
  • 23 篇 bi keping
  • 22 篇 chen enhong
  • 21 篇 de rijke maarten
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 20 篇 xu jun
  • 19 篇 hu shengshan
  • 19 篇 li zixuan

语言

  • 2,397 篇 英文
  • 421 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2859 条 记 录,以下是231-240 订阅
排序:
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
On the Robustness of Generative Information Retrieval Models: An Out-of-Distribution Perspective  47th
On the Robustness of Generative Information Retrieval Mode...
收藏 引用
47th European Conference on Information Retrieval, ECIR 2025
作者: Liu, Yu-An Zhang, Ruqing Guo, Jiafeng Zhou, Changjiang de Rijke, Maarten Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Generative information retrieval methods retrieve documents by directly generating their identifiers. Much effort has been devoted to developing effective generative information retrieval (IR) models. Less attention h... 详细信息
来源: 评论
A Secure and Lightweight Client-Side Deduplication Approach for Resisting Side Channel Attacks
A Secure and Lightweight Client-Side Deduplication Approach ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuchen Chen Chunfu Jia Guanxiong Ha Xuan Shan Hang Chen The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security (DISSec) Data Security Technology Tianjin China
Client-side deduplication system is widely used in cloud storage systems to reduce storage and communication overhead by eliminating the storing and uploading of duplicate data. However, it is vulnerable to side chann... 详细信息
来源: 评论
Learning Dual-Domain Calibration and Distance-Driven Correlation Filter:A Probabilistic Perspective for UAV Tracking
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3741-3764页
作者: Taiyu Yan Yuxin Cao Guoxia Xu Xiaoran Zhao Hu Zhu Lizhen Deng Jiangsu Province Key Lab on Image Processing and Image Communication Nanjing University of Posts and TelecommunicationsNanjingChina School of Computer Science Qufu Normal UniversityQufuChina National Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjingChina
Unmanned Aerial Vehicle(UAV)tracking has been possible because of the growth of intelligent information technology in smart cities,making it simple to gather data at any time by dynamically monitoring events,people,th... 详细信息
来源: 评论
Frontiers of Artificial Intelligent and Quantitative Management: Preface for ITQM 2024
收藏 引用
Procedia Computer science 2024年 242卷 1-8页
作者: Filip, Florin Gheorghe Shi, Yong Pocatilu, Paul Ciurea, Cristian-Eugen Li, Jianping Tien, James M. Berg, Daniel Romanian Academy Information Science and Technology Section Bucharest Romania Research Centre on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing100190 China Key Lab of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing100190 China School of Economics and Management University of Chinese Academy of Sciences Beijing100190 China College of Information Science and Technology University of Nebraska at Omaha OmahaNE68182 United States Bucharest University of Economic Studies Bucharest Romania College of Engineering University of Miami Coral GablesFL33124 United States
来源: 评论
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
收藏 引用
science China(Information sciences) 2021年 第8期64卷 195-212页
作者: Yanyu HUANG Siyi LV Zheli LIU Xiangfu SONG Jin LI Yali YUAN Changyu Dong College of Cyber Science and the College of Computer Science Tianjin Key Laboratory of Network and Data Security TechnologyNankai University School of Computer Science and Technology Shandong University School of Computer Science Guangzhou University Department of Computer Science University of G?ttingen School of Computing Newcastle University
Symmetric searchable encryption(SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, however, most o... 详细信息
来源: 评论
Towards Robust Universal Information Extraction: Benchmark, Evaluation, and Solution
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Jizhao Shi, Akang Li, Zixuan Bai, Long Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science Shenyang Aerospace University Shenyang China
In this paper, we aim to enhance the robustness of Universal Information Extraction (UIE) by introducing a new benchmark dataset, a comprehensive evaluation, and a feasible solution. Existing robust benchmark datasets... 详细信息
来源: 评论
Generalized-Extended-State-Observer and Equivalent-Input-Disturbance Methods for Active Disturbance Rejection: Deep Observation and Comparison
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第4期10卷 957-968页
作者: Jinhua She Kou Miyamoto Qing-Long Han Min Wu Hiroshi Hashimoto Qing-Guo Wang School of Engineering Tokyo University of TechnologyHachiojiTokyo 192-0982Japan K.Miyamoto is with the Institute of Technology Shimizu CorporationKotoTokyo 135-0044Japan School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourneVIC 3122Australia School of Automation China University of GeosciencesWuhan 430074 Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of EducationWuhan 430074China School of Industrial Technology Advanced Institute of Industrial TechnologyTokyo 140-0011Japan Institute of Artificial Intelligence and Future Networks Beijing Normal UniversityZhuhai 519087 Guangdong Key Lab of AI and Multi-Modal Data Processing Guangdong Provincial Key Laboratory of Interdisciplinary Research and Application for Data Science BNUHKBU United International College Zhuhai 519087China
Active disturbance-rejection methods are effective in estimating and rejecting disturbances in both transient and steady-state *** paper presents a deep observation on and a comparison between two of those methods:the... 详细信息
来源: 评论
CVCA: A Complex-Valued Classifiable Autoencoder for MmWave Massive MIMO Physical Layer Authentication
CVCA: A Complex-Valued Classifiable Autoencoder for MmWave M...
收藏 引用
2023 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023
作者: Zeng, Xinyuan Wang, Chao Wang, Cheng-Cai Li, Zan Xidian University State Key Laboratory of Integrated Service Network Xi'an710071 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing210003 China School of Automation Science and Electrical Engineering Beihang University Beijing100191 China
For protecting millimeter wave (mmWave) communications from clone attacks, this paper employs the deep learning to propose a physical layer authentication (PLA) approach for detecting attackers and classifying multipl... 详细信息
来源: 评论
RF-Search: Searching Unconscious Victim in Smoke Scenes with RF-enabled Drone  23
RF-Search: Searching Unconscious Victim in Smoke Scenes with...
收藏 引用
29th Annual International Conference on Mobile Computing and networking, MobiCom 2023
作者: Zhang, Bin-Bin Zhang, Dongheng Song, Ruiyuan Wang, Binquan Hu, Yang Chen, Yan Research Center from Data to Cyberspace University of Science and Technology of China Hefei China Key Lab of Cyberspace Cultural Content Cognition Communication and Detection Ministry of Culture and Tourism Hefei China School of Cyber Science and Technology University of Science and Technology of China Hefei China
Toxic gases inhalation is the most common cause of death in fire scenes, which can make people unconscious and unable to save themselves. Hence, discovering the unconscious victims is crucial to improve their survival... 详细信息
来源: 评论