咨询与建议

限定检索结果

文献类型

  • 1,513 篇 期刊文献
  • 1,296 篇 会议
  • 1 册 图书

馆藏范围

  • 2,810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,906 篇 工学
    • 1,325 篇 计算机科学与技术...
    • 1,117 篇 软件工程
    • 451 篇 信息与通信工程
    • 220 篇 生物工程
    • 203 篇 电气工程
    • 195 篇 控制科学与工程
    • 169 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 107 篇 生物医学工程(可授...
    • 102 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 74 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 53 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,012 篇 理学
    • 496 篇 数学
    • 275 篇 物理学
    • 253 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 515 篇 管理学
    • 276 篇 图书情报与档案管...
    • 250 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 104 篇 医学
    • 84 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 86 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 66 篇 deep learning
  • 62 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 31 篇 optimization
  • 31 篇 privacy
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 neural networks
  • 25 篇 generative adver...
  • 25 篇 knowledge graph
  • 25 篇 visualization

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 48 篇 network and data...
  • 47 篇 college of compu...
  • 47 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 32 篇 school of cyber ...
  • 31 篇 school of comput...
  • 29 篇 peng cheng labor...
  • 28 篇 key lab of infor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 shaanxi key labo...

作者

  • 185 篇 cheng xueqi
  • 141 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 33 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 23 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao

语言

  • 2,623 篇 英文
  • 145 篇 其他
  • 43 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2810 条 记 录,以下是421-430 订阅
排序:
Influencing factors and mechanism of high-temperature oxidation of high-entropy alloys: A review
收藏 引用
International Journal of Minerals,Metallurgy and Materials 2021年 第6期28卷 915-930页
作者: Ya Wei Yu Fu Zhi-min Pan Yi-chong Ma Hong-xu Cheng Qian-cheng Zhao Hong Luo Xiao-gang Li National Materials Corrosion and Protection Data Center Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing 100083China Key Laboratory for Corrosion and Protection of The Ministry of Education(MOE) Beijing 100083China BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan 528000China
High-temperature oxidation is a common failure in high-temperature environments,which widely occur in aircraft engines and aerospace thrusters;as a result,the development of anti-high-temperature oxidation materials h... 详细信息
来源: 评论
Perturbation-Invariant Adversarial Training for Neural Ranking Models: Improving the Effectiveness-Robustness Trade-Off
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Yu-An Zhang, Ruqing Zhang, Mingkun Chen, Wei de Rijke, Maarten Guo, Jiafeng Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Neural ranking models (NRMs) have shown great success in information retrieval (IR). But their predictions can easily be manipulated using adversarial examples, which are crafted by adding imperceptible perturbations ... 详细信息
来源: 评论
Communication-Efficient Distributed Learning with Local Immediate Error Compensation
arXiv
收藏 引用
arXiv 2024年
作者: Cheng, Yifei Shen, Li Xu, Linli Qian, Xun Wu, Shiwei Zhou, Yiming Zhang, Tie Tao, Dacheng Chen, Enhong The Anhui Province Key Lab of Big Data Analysis and Application State Key Laboratory of Cognitive Intelligence School of Data Science School of Computer Science University of Science and Technology China The JD Explore Academy China The Shanghai Artificial Intelligence Laboratory China
Gradient compression with error compensation has attracted significant attention with the target of reducing the heavy communication overhead in distributed learning. However, existing compression methods either perfo... 详细信息
来源: 评论
Attribute-Based data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
DenoiseRep: denoising model for representation learning  24
DenoiseRep: denoising model for representation learning
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Zhengrui Xu Guan'an Wang Xiaowen Huang Jitao Sang School of Computer Science and Technology Beijing Jiaotong University School of Computer Science and Technology Beijing Jiaotong University and Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University and Key Laboratory of Big Data & Artificial Intelligence in Transportation(Beijing Jiaotong University) Ministry of Education
The denoising model has been proven a powerful generative model but has little exploration of discriminative tasks. Representation learning is important in discriminative tasks, which is defined as "learning repr...
来源: 评论
CPSNet: Comprehensive Enhancement Representation for Polyp Segmentation Task
CPSNet: Comprehensive Enhancement Representation for Polyp S...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiati Cai Xiaogang Liu Hongjie Yang Yi Ding Ting Zhong Zhen Qin Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China Department of Gastroenterology and Hepatology University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Accurately segmenting polyp regions in colonoscopy images is crucial for the diagnosis and intervention of colorectal cancer. However, the task of polyp segmentation remains challenging due to the diverse size and sha... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Chinese Emergency Event Extraction Based on Contrastive Learning with Event Semantic Features  19
Chinese Emergency Event Extraction Based on Contrastive Lear...
收藏 引用
19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2023
作者: Sheng, Xinyi Gu, Jinguang Yan, Youcheng Xu, Fangfang Wuhan University of Science and Technology College of Computer Science and Technology Wuhan430065 China Institute of Big Data Science and Engineering Wuhan University of Science and Technology Wuhan430065 China The Key Lab. of Rich-Media Knowledge Org. and Serv. of Digit. Publ. Content Inst. of Sci. and Tech. Info. of China Beijing100038 China
Extracting emergency events from a large amount of unstructured information is essential for improving early warning and emergency response. Existing event extraction methods for specialist fields often rely on well-d... 详细信息
来源: 评论
Reversible data Hiding Using Convolutional Neural network and Digital Signal Processing Techniques  12
Reversible Data Hiding Using Convolutional Neural Network an...
收藏 引用
12th International Conference on Information technology in Medicine and Education, ITME 2022
作者: Qingmei, Peng Shaozi, Li Yaojin, Lin Xiehua, Yu University of Fujian Province Key Laboratory of Big Data and Artificial Intelligence MinNan Science and Technology University Quanzhou China Xiamen University School of Informatics Xiamen China Minnan Normal University School of Computer Science Lab of Data Science and Intelligence Application Zhangzhou China
Reversible data hiding is a data hiding process in which data is encrypted into an image as a means of authentication, and hidden data is used to hide the original image, and RDH is often used in areas where data auth... 详细信息
来源: 评论
TCM-FTP: Fine-Tuning Large Language Models for Herbal Prescription Prediction
TCM-FTP: Fine-Tuning Large Language Models for Herbal Prescr...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhou, Xingzhi Dong, Xin Li, Chunhao Bai, Yuning Xu, Yulong Cheung, Ka Chun Se, Simon Song, Xinpeng Zhang, Runshun Zho, Xuezhong Zhang, Nevin L. Hong Kong University of Science and Technology Department of Computer Science and Technology Hong Kong Hong Kong Beijing Jiaotong University Institute of Medical Intelligence Department of Artificial Intelligence Beijing Key Lab of Traffic Data Analysis and Mining School of Computer Science & Technology Beijing100044 China China Academy of Chinese Medical Sciences Guang'anmen Hospital Beijing China Henan University of Chinese Medicine School of Information Technology China Nvidia Nvaitc Hong Kong Hong Kong Nvidia Nvaitc Singapore
Traditional Chinese medicine (TCM) has relied on specific combinations of herbs in prescriptions to treat various symptoms and signs for thousands of years. Predicting TCM prescriptions poses a fascinating technical c... 详细信息
来源: 评论