咨询与建议

限定检索结果

文献类型

  • 1,520 篇 期刊文献
  • 1,296 篇 会议
  • 1 册 图书

馆藏范围

  • 2,817 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,331 篇 计算机科学与技术...
    • 1,123 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 206 篇 电气工程
    • 195 篇 控制科学与工程
    • 169 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 107 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 74 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 53 篇 安全科学与工程
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,012 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 517 篇 管理学
    • 276 篇 图书情报与档案管...
    • 251 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 66 篇 deep learning
  • 62 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 31 篇 optimization
  • 31 篇 privacy
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 25 篇 visualization

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 48 篇 network and data...
  • 47 篇 college of compu...
  • 47 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 33 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 29 篇 peng cheng labor...
  • 28 篇 key lab of infor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 shaanxi key labo...

作者

  • 185 篇 cheng xueqi
  • 141 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 33 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao

语言

  • 2,629 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2817 条 记 录,以下是461-470 订阅
排序:
Fast Gumbel-Max Sketch and its Applications
Fast Gumbel-Max Sketch and its Applications
收藏 引用
作者: Zhang, Yuanming Wang, Pinghui Qi, Yiyan Cheng, Kuankuan Zhao, Junzhou Tian, Guangjian Guan, Xiaohong Xi'An Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Xi'an710049 China Huawei Noah's Ark Lab Hong Kong Tsinghua University Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Beijing100084 China
The well-known Gumbel-Max Trick for sampling elements from a categorical distribution (or more generally a non-negative vector) and its variants have been widely used in areas such as machine learning and information ... 详细信息
来源: 评论
Object Detection Algorithm Based on Second-Order Pooling network and Gaussian Mixture Attention  5
Object Detection Algorithm Based on Second-Order Pooling Net...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Ma, Sugang Li, Ningbo Yang, Xiaobao School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts and Telecommunications Shaanxi Xi'an China
To improve the feature representation ability of the YOLOX algorithm and obtain better detection performance, an object detection algorithm based on second-order pooling network and gaussian mixture attention is propo... 详细信息
来源: 评论
Secure fusion of encrypted remote sensing images based on Brovey
收藏 引用
science China(Information sciences) 2021年 第2期64卷 243-245页
作者: Junzhi YANG Guohua CHENG Meng SHEN School of Information and Electronics Beijing Institute of Technology School of Computer Science Beijing Institute of Technology Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security)
Dear editor,In the field of image fusion, panchromatic images captured by the Satellite Pour l'Observation de la Terre(SPOT) [1]have high spatial resolutions, whereas their spectral resolutions are relatively low.... 详细信息
来源: 评论
Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master key
Scalable Client-side Encrypted Deduplication beyond Secret S...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yuchen Chen Guanxiong Ha Xuan Shan Chunfu Jia Qiaowen Jia The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology and DISSec Tianjin China University of Chinese Academy of Sciences Beijing China
Individuals and companies increasingly adopt encrypted deduplication systems for their enhanced security and efficiency benefits. Server-aided encrypted deduplication systems are the state-of-the-art scheme to resist ... 详细信息
来源: 评论
SaTrack: LoS/NLoS State-Aware WiFi Indoor Tracking System
SaTrack: LoS/NLoS State-Aware WiFi Indoor Tracking System
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and networks (SECON)
作者: Yinnan Zhou Hao Zhou Luowei Li Siming Chen Zhi Liu Xiang-Yang Li LINKE Lab School of Computer Science and Technology University of Science and Technology of China CAS Key Laboratory of Wireless-Optical Communications University of Science and Technology of China Department of Computer and Network Engineering The University of Electro-Communications Tokyo Japan
WiFi-based technology is appealing for indoor localization due to the widely deployed infrastructures. Recently, path separation solutions have been proposed to address the multipath effects and achieve decimeter-leve... 详细信息
来源: 评论
UAV Visual Tracking Algorithm Based on Feature Fusion of the Attention Mechanism  5
UAV Visual Tracking Algorithm Based on Feature Fusion of the...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Ma, Sugang Zhang, Zixian Zhao, Zhixian Yang, Xiaobao Hou, Zhiqiang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts and Telecommunications Shaanxi Xi'an China
To enhance the expression ability of deep features and improve the tracking performance of the fully convolutional siamese network (SiamFC) in the UAV scene, we propose a UAV visual tracking algorithm based on feature... 详细信息
来源: 评论
Disentangled Hyperbolic Representation Learning for Heterogeneous Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Bai, Qijie Nie, Changli Zhang, Haiwei Dou, Zhicheng Yuan, Xiaojie The College of Computer Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China Gaoling School of Artificial Intelligence Renmin University of China Beijing China
Heterogeneous graphs have attracted a lot of research interests recently due to the success for representing complex real-world systems. However, existing methods have two pain points in embedding them into low-dimens... 详细信息
来源: 评论
DCSim: Computing and networking Integration based Container Scheduling Simulator for data Centers
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Jinlong Rao, Zhizhe Liu, Xingchen Deng, Lihao Dong, Shoubin Guangdong Key Lab of Multimodal Big Data Intelligent Analysis School of Computer Science and Engineering South China University of Technology Guangzhou China
The increasing prevalence of cloud-native technologies, particularly containers, has led to the widespread adoption of containerized deployments in data centers. The advancement of deep neural network models has incre... 详细信息
来源: 评论
A Novel Under-sampling Method with Gaussian Mixture and Jensen-Shannon Divergence  2022
A Novel Under-sampling Method with Gaussian Mixture and Jens...
收藏 引用
4th International Conference on Image, Video and Signal Processing, IVSP 2022
作者: Pan, Xueling Li, Guohe Liu, Shunxin Yu, Qiuyue Li, Ying Beijing Key Lab of Data Mining for Petroleum Data China University of Petroleum Beijing102249 China College of Information Science and Engineering China University of Petroleum Beijing102249 China Department of Computer Science and Technology China University of Petroleum-Beijing at Keramay China
Due to bias towards major class samples, the traditional classifier cannot obtain excellent performance in imbalanced data. The under-sampling approach is one of the effective methods in imbalance classification. Nowa... 详细信息
来源: 评论
Classifier Guidance Enhances Diffusion-based Adversarial Purification by Preserving Predictive Information
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Mingkun Li, Jianing Chen, Wei Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial... 详细信息
来源: 评论