咨询与建议

限定检索结果

文献类型

  • 1,520 篇 期刊文献
  • 1,296 篇 会议
  • 1 册 图书

馆藏范围

  • 2,817 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,331 篇 计算机科学与技术...
    • 1,123 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 206 篇 电气工程
    • 195 篇 控制科学与工程
    • 169 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 107 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 74 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 53 篇 安全科学与工程
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,012 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 517 篇 管理学
    • 276 篇 图书情报与档案管...
    • 251 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 66 篇 deep learning
  • 62 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 31 篇 optimization
  • 31 篇 privacy
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 25 篇 visualization

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 48 篇 network and data...
  • 47 篇 college of compu...
  • 47 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 33 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 29 篇 peng cheng labor...
  • 28 篇 key lab of infor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 shaanxi key labo...

作者

  • 185 篇 cheng xueqi
  • 141 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 33 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao

语言

  • 2,629 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2817 条 记 录,以下是381-390 订阅
排序:
Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers’ Autofill Functionality
Leaky Autofill: An Empirical Study on the Privacy Threat of ...
收藏 引用
Annual Computer Security Applications Conference
作者: Yanduo Fu Ding Wang College of Cyber Science Nankai University Tianjin China Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Password managers (PMs) provide users with convenient and robust functionalities to manage their credentials, highly recommended by security experts and major standard bodies. One of the most popular features is the a... 详细信息
来源: 评论
Generating Event-oriented Attribution for Movies via Two-Stage Prefix-Enhanced Multimodal LLM
arXiv
收藏 引用
arXiv 2024年
作者: Lyu, Yuanjie Xu, Tong Niu, Zihan Peng, Bo Ke, Jing Chen, Enhong The Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science University of Science and Technology of China Hefei230026 China
The prosperity of social media platforms has raised the urgent demand for semantic-rich services, e.g., event and storyline attribution. However, most existing research focuses on clip-level event understanding, prima... 详细信息
来源: 评论
Knowledge-Enhanced and Structure-Enhanced Representation Learning for Protein-Ligand Binding Affinity Prediction
SSRN
收藏 引用
SSRN 2024年
作者: Li, Mei Cao, Ye Liu, Xiaoguang Ji, Hua College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Protein-ligand binding affinity (PLA) prediction is an essential stage in drug screening and drug repositioning. Existing methods mainly focus on structurefree prediction of binding affinities and the investigation of... 详细信息
来源: 评论
TDID: Transparent and Efficient Decentralized Identity Management with Blockchain
TDID: Transparent and Efficient Decentralized Identity Manag...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Hao, Jiakun Gao, Jianbo Xiang, Peng Zhang, Jiashuo Chen, Ziming Hu, Hao Chen, Zhong School of Computer Science Peking University Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China Nanjing University State Key Lab for Novel Software Technology Jiangsu Nanjing China
Decentralized identity (DID) is an identity management framework aiming to return the ownership of an identity to its corresponding user. Recent studies propose to store the identifiers of DID issuers and implement id... 详细信息
来源: 评论
A Security Analysis of Honey Vaults
A Security Analysis of Honey Vaults
收藏 引用
IEEE Symposium on Security and Privacy
作者: Fei Duan Ding Wang Chunfu Jia College of Cyber Science Nankai University Tianjin China Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Honey encryption (HE) protected password vaults (called honey vaults) are promising tools that allow a user to store multiple passwords (called a password vault) and encrypt them with a master password using HE. In ca... 详细信息
来源: 评论
A Method to Explore the Synchronous Changes of High-Traffic Events Based on Dynamic networks  9
A Method to Explore the Synchronous Changes of High-Traffic ...
收藏 引用
9th International Conference on Fuzzy Systems and data Mining, FSDM 2023
作者: Huang, Yu-Wen Wang, Li-Na Zang, Chen-Rui College of Sciences Inner Mongolia University of Technology Hohhot010051 China Inner Mongolia Key Lab. of Statistical Analysis Theory for Life Data and Neural Network Modeling Hohhot010051 China Inner Mongolia Branch China Unicom Hohhot010050 China
With the rapid development of mobile communication technologies, the mobile network has evolved into a highly heterogeneous network structure. Based on dynamic networks, we mainly investigated a method to explore the ... 详细信息
来源: 评论
Hypergraph-enhanced Dual Semi-supervised Graph Classification  41
Hypergraph-enhanced Dual Semi-supervised Graph Classificatio...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Ju, Wei Mao, Zhengyang Yi, Siyu Qin, Yifang Gu, Yiyang Xiao, Zhiping Wang, Yifan Luo, Xiao Zhang, Ming School of Computer Science National Key Laboratory for Multimedia Information Processing Peking University-Anker Embodied AI Lab Peking University China School of Statistics and Data Science Nankai University China Department of Computer Science University of California Los Angeles United States School of Information Technology & Management University of International Business and Economics China
In this paper, we study semi-supervised graph classification, which aims at accurately predicting the categories of graphs in scenarios with limited labeled graphs and abundant unlabeled graphs. Despite the promising ... 详细信息
来源: 评论
A Lightweight Anonymous key Agreement Scheme in V2G networks  2
A Lightweight Anonymous Key Agreement Scheme in V2G Networks
收藏 引用
2nd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2022
作者: Chendong, Huang Feng, Wang Zhongming, Huang Fujian University of Technology School of Computer Science and Mathematics Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Electric vehicle access to the grid (V2G) technology enables bidirectional interaction of energy and information between electric vehicles and the grid. The energy transactions between electric vehicles and the power ... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
Generative Pre-trained Speech Language Model with Efficient Hierarchical Transformer
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Yongxin Su, Dan He, Liqiang Xu, Linli Yu, Dong School of Data Science University of Science and Technology of China China School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence China Tencent AI Lab China
While recent advancements in speech language models have achieved significant progress, they face remarkable challenges in modeling the long acoustic sequences of neural audio codecs. In this paper, we introduce Gener... 详细信息
来源: 评论