咨询与建议

限定检索结果

文献类型

  • 1,527 篇 期刊文献
  • 1,337 篇 会议
  • 1 册 图书

馆藏范围

  • 2,865 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,928 篇 工学
    • 1,344 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 451 篇 信息与通信工程
    • 219 篇 生物工程
    • 203 篇 控制科学与工程
    • 201 篇 电气工程
    • 169 篇 电子科学与技术(可...
    • 133 篇 光学工程
    • 104 篇 生物医学工程(可授...
    • 102 篇 机械工程
    • 101 篇 化学工程与技术
    • 79 篇 网络空间安全
    • 76 篇 仪器科学与技术
    • 54 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 47 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,014 篇 理学
    • 496 篇 数学
    • 273 篇 物理学
    • 254 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 513 篇 管理学
    • 276 篇 图书情报与档案管...
    • 248 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 103 篇 医学
    • 84 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 17 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 113 篇 semantics
  • 80 篇 feature extracti...
  • 69 篇 deep learning
  • 66 篇 training
  • 64 篇 accuracy
  • 50 篇 federated learni...
  • 47 篇 computational mo...
  • 40 篇 machine learning
  • 36 篇 data mining
  • 35 篇 graph neural net...
  • 34 篇 image segmentati...
  • 34 篇 privacy
  • 33 篇 object detection
  • 32 篇 optimization
  • 30 篇 data models
  • 30 篇 adaptation model...
  • 27 篇 reinforcement le...
  • 27 篇 neural networks
  • 27 篇 forecasting
  • 26 篇 generative adver...

机构

  • 168 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 74 篇 key laboratory o...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 52 篇 shandong enginee...
  • 49 篇 network and data...
  • 48 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 tianjin key labo...
  • 35 篇 college of cyber...
  • 35 篇 zhejiang lab
  • 34 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 school of comput...
  • 28 篇 hubei key labora...
  • 28 篇 key lab of infor...
  • 28 篇 national enginee...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei engineerin...

作者

  • 189 篇 cheng xueqi
  • 147 篇 guo jiafeng
  • 48 篇 zhang ruqing
  • 47 篇 fan yixing
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 35 篇 jin xiaolong
  • 30 篇 liu jun
  • 29 篇 pang liang
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 23 篇 bi keping
  • 22 篇 chen enhong
  • 21 篇 de rijke maarten
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 20 篇 xu jun
  • 19 篇 hu shengshan
  • 19 篇 chen yanping

语言

  • 2,403 篇 英文
  • 421 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2865 条 记 录,以下是251-260 订阅
Class-Incremental Few-Shot Event Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Kailin Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China
Event detection is one of the fundamental tasks in information extraction and knowledge graph. However, a realistic event detection system often needs to deal with new event classes constantly. These new classes usual... 详细信息
来源: 评论
Trust and Risk Based on Access Control Model in Social Internet of Things
收藏 引用
International Journal of network Security 2023年 第5期25卷 736-744页
作者: Zhang, Hongbin Liu, Jian Zhao, Dongmei Liu, Bin Wang, Yanmei Fan, Fan School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Scienc and Technology Shijiazhuang050000 China Hebei Geological Worker’s University Shijiazhuang050000 China
Integrating social networks and the Internet of Things has formed an emerging field of Social Internet of Things (IoT). Aiming to address the shortcomings of traditional TBAC (Trust based on Access Control) and ABAC (... 详细信息
来源: 评论
ModelLock: Locking Your Model With a Spell  24
ModelLock: Locking Your Model With a Spell
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Gao, Yifeng Sun, Yuhua Ma, Xingjun Wu, Zuxuan Jiang, Yu-Gang Shanghai Key Lab of Intell. Info. Processing School of Cs Fudan University Shanghai China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
This paper presents a novel model protection paradigm Model Locking that locks the performance of a finetuned model on private data to make it unusable or unextractable without the right key. Specifically, we proposed... 详细信息
来源: 评论
Nested Event Extraction upon Pivot Element Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Ren, Weicheng Li, Zixuan Jin, Xiaolong Bai, Long Su, Miao Liu, Yantao Guan, Saiping Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Nested Event Extraction (NEE) aims to extract complex event structures where an event contains other events as its arguments recursively. Nested events involve a kind of Pivot Elements (PEs) that simultaneously act as... 详细信息
来源: 评论
Selective Temporal Knowledge Graph Reasoning
arXiv
收藏 引用
arXiv 2024年
作者: Hou, Zhongni Jin, Xiaolong Li, Zixuan Bai, Long Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Temporal Knowledge Graph (TKG), which characterizes temporally evolving facts in the form of (subject, relation, object, timestamp), has attracted much attention recently. TKG reasoning aims to predict future facts ba... 详细信息
来源: 评论
A Method of Expressway Congestion Identification Based on the Electronic Toll Collection data  5th
A Method of Expressway Congestion Identification Based on th...
收藏 引用
5th International Conference on Smart Vehicular technology, Transportation, Communication and Applications, VTCA 2022
作者: Lin, Ziyang Zou, Fumin Guo, Feng Yu, Xiang Li, Nan Xia, Chenxi Fujian Key Lab for Automotive Electronics and Electric Drive Fujian University of Technology Fuzhou350118 China College of Computer and Data Science Fujian University Fuzhou350118 China
With the rapid development of domestic expressway ETC system, the trend of intelligent and digital for expressway management began to mature, which provides a solid foundation for the fully connected vehicle–road-clo... 详细信息
来源: 评论
iNet:visual analysis of irregular transition in multivariate dynamic networks
收藏 引用
Frontiers of Computer science 2022年 第2期16卷 124-139页
作者: Dongming HAN Jiacheng PAN Rusheng PAN Dawei ZHOU Nan CAO Jingrui HE Mingliang XU Wei CHEN State Key Lab of CAD&CG Zhejiang UniversityHangzhou 310058China Department of Computer Science and Engineering Arizona State UniversityArizona 85287America Tong Ji Intelligent Big Data Visualisation Lab(iDVx Lab) TongJi UniversityShanghai 200082China Department of Computer Science and Technology Zhengzhou UniversityZhengzhou 450001China
Multivariate dynamic networks indicate networks whose topology structure and vertex attributes are evolving along *** are common in multimedia *** detection is one of the essential tasks in analyzing these networks th... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
收藏 引用
IEEE Transactions on Computers 2025年 第7期74卷 2168-2182页
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong Xidian University School of Computer Science and Technology China Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China Jiangxi University of Finance and Economics School of Computing Nanchang330013 China Jiangxi University of Finance and Economics Nanchang330013 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Separate Source Channel Coding Is Still What You Need:An LLM-Based Rethinking
收藏 引用
ZTE Communications 2025年 第1期23卷 30-44页
作者: REN Tianqi LI Rongpeng ZHAO Mingmin CHEN Xianfu LIU Guangyi YANG Yang ZHAO Zhifeng ZHANG Honggang College of Information Science and Electronic Engineering Zhejiang UniversityHangzhou 310027China Shenzhen CyberAray Network Technology Co. Ltd.Shenzhen 518000China China Mobile Research Institute Beijing 100053China The Internet of Things Thrust The Hong Kong University of Science and Technology(Guangzhou)Guangzhou 511453China Zhejiang Lab Hangzhou 311121China Faculty of Data Science City University of MacaoMacao 999078China
Along with the proliferating research interest in semantic communication(Sem Com),joint source channel coding(JSCC)has dominated the attention due to the widely assumed existence in efficiently delivering information ... 详细信息
来源: 评论
Attack-in-the-Chain: Bootstrapping Large Language Models for Attacks Against Black-Box Neural Ranking Models  39
Attack-in-the-Chain: Bootstrapping Large Language Models for...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liu, Yu-An Zhang, Ruqing Guo, Jiafeng de Rijke, Maarten Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Neural ranking models (NRMs) have been shown to be highly effective in terms of retrieval performance. Unfortunately, they have also displayed a higher degree of sensitivity to attacks than previous generation models....
来源: 评论