咨询与建议

限定检索结果

文献类型

  • 1,527 篇 期刊文献
  • 1,337 篇 会议
  • 1 册 图书

馆藏范围

  • 2,865 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,928 篇 工学
    • 1,344 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 451 篇 信息与通信工程
    • 219 篇 生物工程
    • 203 篇 控制科学与工程
    • 201 篇 电气工程
    • 169 篇 电子科学与技术(可...
    • 133 篇 光学工程
    • 104 篇 生物医学工程(可授...
    • 102 篇 机械工程
    • 101 篇 化学工程与技术
    • 79 篇 网络空间安全
    • 76 篇 仪器科学与技术
    • 54 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 47 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,014 篇 理学
    • 496 篇 数学
    • 273 篇 物理学
    • 254 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 513 篇 管理学
    • 276 篇 图书情报与档案管...
    • 248 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 103 篇 医学
    • 84 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 17 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 113 篇 semantics
  • 80 篇 feature extracti...
  • 69 篇 deep learning
  • 66 篇 training
  • 64 篇 accuracy
  • 50 篇 federated learni...
  • 47 篇 computational mo...
  • 40 篇 machine learning
  • 36 篇 data mining
  • 35 篇 graph neural net...
  • 34 篇 image segmentati...
  • 34 篇 privacy
  • 33 篇 object detection
  • 32 篇 optimization
  • 30 篇 data models
  • 30 篇 adaptation model...
  • 27 篇 reinforcement le...
  • 27 篇 neural networks
  • 27 篇 forecasting
  • 26 篇 generative adver...

机构

  • 168 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 74 篇 key laboratory o...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 52 篇 shandong enginee...
  • 49 篇 network and data...
  • 48 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 tianjin key labo...
  • 35 篇 college of cyber...
  • 35 篇 zhejiang lab
  • 34 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 school of comput...
  • 28 篇 hubei key labora...
  • 28 篇 key lab of infor...
  • 28 篇 national enginee...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei engineerin...

作者

  • 189 篇 cheng xueqi
  • 147 篇 guo jiafeng
  • 48 篇 zhang ruqing
  • 47 篇 fan yixing
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 35 篇 jin xiaolong
  • 30 篇 liu jun
  • 29 篇 pang liang
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 23 篇 bi keping
  • 22 篇 chen enhong
  • 21 篇 de rijke maarten
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 20 篇 xu jun
  • 19 篇 hu shengshan
  • 19 篇 chen yanping

语言

  • 2,403 篇 英文
  • 421 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2865 条 记 录,以下是511-520 订阅
FlexCare: Leveraging Cross-Task Synergy for Flexible Multimodal Healthcare Prediction
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Muhao Zhu, Zhenfeng Li, Youru Zheng, Shuai Zhao, Yawei He, Kunlun Zhao, Yao Institute of Information Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing China Medical Big Data Research Center Chinese PLA General Hospital Beijing China
Multimodal electronic health record (EHR) data can offer a holistic assessment of a patient's health status, supporting various predictive healthcare tasks. Recently, several studies have embraced the multitask le... 详细信息
来源: 评论
KGCRR: An Effective Metric-Driven Knowledge Graph Completion Framework by Designing a Novel Upper Bound Function with Adaptive Approximation to Reciprocal Rank  39
KGCRR: An Effective Metric-Driven Knowledge Graph Completion...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Kuan Yang, Kuo Liu, Jian Lu, Xiangkui Wu, Jun Zhou, Xuezhong School of Computer Science & Technology Beijing Jiaotong University Beijing100044 China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing100044 China MoE Key Lab of Big Data & Artificial Intelligence in Transportation Beijing Jiaotong University Beijing100044 China University of Science and Technology Beijing Beijing100083 China
Knowledge Graph Embedding (KGE) methods have achieved great success in predicting missing links in knowledge graphs, a task also known as Knowledge Graph Completion (KGC). Under this task, the Reciprocal Rank (RR) of ...
来源: 评论
A trajectory association strategy for multi-object tracking  6
A trajectory association strategy for multi-object tracking
收藏 引用
6th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2023
作者: Ma, Sugang Duan, Shuaipeng Pu, Lei Hou, Zhiqiang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an China School of Operational Support Rocket Force Engineering University Shaanxi Xi'an710025 China
When the multi-object tracking (MOT) algorithm confronts complex scenarios such as target occlusion and blurring, the trajectory missing and identity switching problems frequently occur. To address this issue, a traje... 详细信息
来源: 评论
Unlocking the Potential of Reverse Distillation for Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Xinyue Wang, Jianyuan Leng, Biao Zhang, Shuo School of Computer Science and Engineering Beihang University China School of Intelligence Science and Technology University of Science and Technology Beijing China Beijing Key Lab of Traffic Data Analysis and Mining School of Computer & Technology Beijing Jiaotong University China
Knowledge Distillation (KD) is a promising approach for unsupervised Anomaly Detection (AD). However, the student network’s over-generalization often diminishes the crucial representation differences between teacher ... 详细信息
来源: 评论
Retrieval-Augmented Code Generation for Universal Information Extraction
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Yucan Li, Zixuan Jin, Xiaolong Liu, Yantao Zeng, Yutao Liu, Wenxuan Li, Xiang Yang, Pan Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Platform and Content Group Tencent
Information Extraction (IE) aims to extract structural knowledge (e.g., entities, relations, events) from natural language texts, which brings challenges to existing methods due to task-specific schemas and complex te... 详细信息
来源: 评论
CausalDiff: Causality-Inspired Disentanglement via Diffusion Model for Adversarial Defense
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Mingkun Bi, Keping Chen, Wei Chen, Quanrun Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology CAS China Key Laboratory of Network Data Science and Technology Institute of Computing Technology CAS China School of Statistics University of International Business and Economics China CAS stands for Chinese Academy of Sciences China
Despite ongoing efforts to defend neural classifiers from adversarial attacks, they remain vulnerable, especially to unseen attacks. In contrast, humans are difficult to be cheated by subtle manipulations, since we ma... 详细信息
来源: 评论
TCMLLM-PR:evaluation of large language models for prescription recommendation in traditional Chinese medicine
收藏 引用
Digital Chinese Medicine 2024年 第4期7卷 343-355页
作者: TIAN Haoyu YANG Kuo DONG Xin ZHAO Chenxi YE Mingwei WANG Hongyan LIU Yiming HU Minjie ZHU Qiang YU Jian ZHANG Lei ZHOU Xuezhong Beijing Key Lab of Traffic Data Analysis and Mining School of Computer Science&TechnologyBeijing Jiaotong UniversityBeijing 100044China National Data Center of Traditional Chinese Medicine China Academy of Chinese Medical SciencesBeijing 100700China
Objective To develop and evaluate a fine-tuned large language model(LLM)for traditional Chinese medicine(TCM)prescription recommendation named *** First,we constructed an instruction-tuning dataset containing 68654 sa... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
6G-Enabled Edge AI for Metaverse:Challenges, Methods,and Future Research Directions
收藏 引用
Journal of Communications and Information networks 2022年 第2期7卷 107-121页
作者: Luyi Chang Zhe Zhang Pei Li Shan Xi Wei Guo Yukang Shen Zehui Xiong Jiawen Kang Dusit Niyato Xiuquan Qiao Yi Wu School of Data Science and Technology Heilongjiang UniversityHarbin 150080China Institute for Cryptology and Network Security Heilongjiang UniversityHarbin 150080China SenseTime Group Limited Shenzhen 518000China Pillar of Information Systems Technology and Design Singapore University of Technology and Design.Singapore 487372Singapore School of Automation.Guangdong University of Technology and Center for Intelligenl Batch Manufacturing based on IoT TechnologyGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798.Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications.Beijing 100876China
Sixth generation(6G)enabled edge intelligence opens up a new era of Internet of everything and makes it possible to interconnect people-devices-cloud anytime,*** and more next-generation wireless network smart service... 详细信息
来源: 评论
Causal Logic Discovery and Rule Validation Using Evolutionary Integration Model Global Fit U-Net
Causal Logic Discovery and Rule Validation Using Evolutionar...
收藏 引用
Natural Language Processing (ICNLP), International Conference on
作者: Xuelian Yang Fangyuan Du Kunjun Chen Hao Chen School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi’an China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Xi’an China
In order to explore the correlation between different MRI sequences and the results of U-Net segmentation of glioma subregions, this paper proposes an interpretable method based on an evolutionary integration algorith... 详细信息
来源: 评论