咨询与建议

限定检索结果

文献类型

  • 1,509 篇 期刊文献
  • 1,284 篇 会议
  • 1 册 图书

馆藏范围

  • 2,794 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,910 篇 工学
    • 1,331 篇 计算机科学与技术...
    • 1,124 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 204 篇 电气工程
    • 196 篇 控制科学与工程
    • 168 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,011 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 74 篇 系统科学
  • 518 篇 管理学
    • 276 篇 图书情报与档案管...
    • 252 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 65 篇 deep learning
  • 61 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 31 篇 privacy
  • 30 篇 optimization
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 24 篇 reinforcement le...

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 48 篇 network and data...
  • 47 篇 college of compu...
  • 46 篇 shandong enginee...
  • 46 篇 school of comput...
  • 46 篇 tianjin key labo...
  • 35 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of cyber ...
  • 28 篇 key lab of infor...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 cas key lab of n...

作者

  • 185 篇 cheng xueqi
  • 142 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 34 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao
  • 18 篇 pan jeng-shyang

语言

  • 2,606 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2794 条 记 录,以下是251-260 订阅
排序:
A novel network intrusion detection model based on two-phase detection and manually labeling
A novel network intrusion detection model based on two-phase...
收藏 引用
2021 International Conference on Internet of Things and Machine Learning, IoTML 2021
作者: Zhang, Yu Zhou, Yangbo Ma, Xiaowei Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
network intrusion detection system (NIDS) is a tool that can detect various network attacks by analyzing network traffic. In recent years, traditional machine learning and deep learning methods have been widely used i... 详细信息
来源: 评论
A Novel Distributed Anomaly Detection Algorithm for Low-density data
A Novel Distributed Anomaly Detection Algorithm for Low-dens...
收藏 引用
2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications, AEECA 2020
作者: Mei, Lin Zhang, Fengli University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu China
Anomaly detection becomes an interesting and significant problem in data mining area. It, in turn, generates many promising applications such as Intrusion Detection, Fraud Detection, Mobile cellular network fraud, and... 详细信息
来源: 评论
Euphemism Detection by Transformers and Relational Graph Attention network  3
Euphemism Detection by Transformers and Relational Graph Att...
收藏 引用
3rd Workshop on Figurative Language Processing, FigLang 2022, as part of EMNLP 2022
作者: Wang, Yuting Liu, Yiyi Zhang, Ruqing Fan, Yixing Guo, Jiafeng CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Euphemism is a type of figurative language broadly adopted in social media and daily conversations. People use euphemisms for politeness or to conceal what they are discussing. Euphemism detection is a challenging tas... 详细信息
来源: 评论
CarfRCNN: A Two-stage Effective Model for Instance Segmentation
CarfRCNN: A Two-stage Effective Model for Instance Segmentat...
收藏 引用
2021 International Conference on Intelligent Manufacturing and Industrial Automation, CIMIA 2021
作者: Chen, Yujie Zhao, Pengbiao Chen, Julin Network and Data Security Key Laboratory of Sichuan Province University of Electr Onic Science and Technology of China China
With the rapid development of deep learning, many instance segmentation models have achieved good results in accuracy and time. But here are still many problems. In this paper, we proposed a two-stage model CarfRCNN. ... 详细信息
来源: 评论
Locally smoothed neural networks  9
Locally smoothed neural networks
收藏 引用
9th Asian Conference on Machine Learning, ACML 2017
作者: Pang, Liang Lan, Yanyan Xu, Jun Guo, Jiafeng Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Convolutional Neural networks (CNN) and the locally connected layer are limited in capturing the importance and relations of different local receptive fields, which are often crucial for tasks such as face verificatio... 详细信息
来源: 评论
ICTNET at Trec 2019 Conversational Assistance Track  28
ICTNET at Trec 2019 Conversational Assistance Track
收藏 引用
28th Text REtrieval Conference, TREC 2019
作者: Hao, Changying Zhang, Yuanyuan Yang, Weifeng Zhao, Heng CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
In this paper we report on our participation in the TREC 2019 Conversational Assistance Track which focuses on Conversational Information Seeking(CIS)namely understand the dialogue context and retrieve candidate res... 详细信息
来源: 评论
In-situ synthesized SiC/TiC/SiTiOC hybrid nanofiber mats for broad-range temperature microwave absorption
收藏 引用
science China Technological sciences 2025年 第6期 183-196页
作者: Yashan HUO Yuetong QIAN Minshan ZHAO Lei ZHANG Yujia TAN Zhihui HE Peng MIAO Fuchun ZHANG Wei CUI Renchao CHE School of Physics and Electronic Information Yan'an University Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data Laboratory of Advanced Materials Shanghai Key Lab of Molecular Catalysis and Innovative Materials Academy for Engineering &Technology Advanced Coatings Research Center of Ministry of Education of China Fudan University School of Materials and Chemical Engineering Xi'an Technological University School of Materials Science & Engineering Tongji University College of Physics Donghua University
Efficient, temperature-insensitive electromagnetic attenuation materials are critical for high microwave absorption at high temperatures. This study presents SiC/TiC/SiTiOC hybrid nanofiber mats constructed using an i...
来源: 评论
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm  1st
Fuzzing Drone Control System Configurations Based on Qualit...
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Chang, Zhiwei Zhang, Hanfeng Yang, Yue Jia, Yan Xu, Sihan Li, Tong Liu, Zheli College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If these param... 详细信息
来源: 评论
Research on Improved MobileViT Image Tamper Localization Model
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3173-3192页
作者: Jingtao Sun Fengling Zhang Huanqi Liu Wenyan Hou School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and TelecommunicationsXi’an710121China
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing... 详细信息
来源: 评论
An Overview of General Theory of Security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao Information Security Center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 评论