咨询与建议

限定检索结果

文献类型

  • 1,527 篇 期刊文献
  • 1,337 篇 会议
  • 1 册 图书

馆藏范围

  • 2,865 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,928 篇 工学
    • 1,344 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 451 篇 信息与通信工程
    • 219 篇 生物工程
    • 203 篇 控制科学与工程
    • 201 篇 电气工程
    • 169 篇 电子科学与技术(可...
    • 133 篇 光学工程
    • 104 篇 生物医学工程(可授...
    • 102 篇 机械工程
    • 101 篇 化学工程与技术
    • 79 篇 网络空间安全
    • 76 篇 仪器科学与技术
    • 54 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 47 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,014 篇 理学
    • 496 篇 数学
    • 273 篇 物理学
    • 254 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 513 篇 管理学
    • 276 篇 图书情报与档案管...
    • 248 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 103 篇 医学
    • 84 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 17 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 113 篇 semantics
  • 80 篇 feature extracti...
  • 69 篇 deep learning
  • 66 篇 training
  • 64 篇 accuracy
  • 50 篇 federated learni...
  • 47 篇 computational mo...
  • 40 篇 machine learning
  • 36 篇 data mining
  • 35 篇 graph neural net...
  • 34 篇 image segmentati...
  • 34 篇 privacy
  • 33 篇 object detection
  • 32 篇 optimization
  • 30 篇 data models
  • 30 篇 adaptation model...
  • 27 篇 reinforcement le...
  • 27 篇 neural networks
  • 27 篇 forecasting
  • 26 篇 generative adver...

机构

  • 168 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 74 篇 key laboratory o...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 52 篇 shandong enginee...
  • 49 篇 network and data...
  • 48 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 tianjin key labo...
  • 35 篇 college of cyber...
  • 35 篇 zhejiang lab
  • 34 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 school of comput...
  • 28 篇 hubei key labora...
  • 28 篇 key lab of infor...
  • 28 篇 national enginee...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei engineerin...

作者

  • 189 篇 cheng xueqi
  • 147 篇 guo jiafeng
  • 48 篇 zhang ruqing
  • 47 篇 fan yixing
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 35 篇 jin xiaolong
  • 30 篇 liu jun
  • 29 篇 pang liang
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 23 篇 bi keping
  • 22 篇 chen enhong
  • 21 篇 de rijke maarten
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 20 篇 xu jun
  • 19 篇 hu shengshan
  • 19 篇 chen yanping

语言

  • 2,403 篇 英文
  • 421 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2865 条 记 录,以下是561-570 订阅
排序:
Multi-video Moment Ranking with Multimodal Clue
arXiv
收藏 引用
arXiv 2023年
作者: Hou, Danyang Pang, Liang Lan, Yanyan Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology CAS Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS Beijing China University of Chinese Academy of Sciences Beijing China Institute for AI Industry Research Tsinghua University Beijing China
Video corpus moment retrieval (VCMR) is the task of retrieving a relevant video moment from a large corpus of untrimmed videos via a natural language query. State-of-the-art work for VCMR is based on two-stage method.... 详细信息
来源: 评论
Locate Then Generate: Bridging Vision and Language with Bounding Box for Scene-Text VQA
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Yongxin Liu, Zhen Liang, Yukang Li, Xin Liu, Hao Bao, Changcun Xu, Linli School of Data Science University of Science and Technology of China China School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence China Tencent YouTu Lab China
In this paper, we propose a novel multi-modal framework for Scene Text Visual Question Answering (STVQA), which requires models to read scene text in images for question answering. Apart from text or visual objects, w... 详细信息
来源: 评论
Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master key  23
Scalable Client-side Encrypted Deduplication beyond Secret S...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Chen, Yuchen Ha, Guanxiong Shan, Xuan Jia, Chunfu Jia, Qiaowen Nankai University The College of Cyber Science Tianjin China Tianjin Key Laboratory of Network and Data Security Technology DISSec Tianjin300350 China University of Chinese Academy of Sciences Beijing100049 China
Individuals and companies increasingly adopt encrypted deduplication systems for their enhanced security and efficiency benefits. Server-aided encrypted deduplication systems are the state-of-the-art scheme to resist ... 详细信息
来源: 评论
Multi-label Text Classification for Judicial Texts via Dual Graph and label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Image recognition and detection based on fast area convolutional neural network
Image recognition and detection based on fast area convoluti...
收藏 引用
2021 International Conference on Computer, Communication, Control, Automation and Robotics, CCCAR 2021
作者: Zhang, Hanwen Qin, Zhen Xie, Hua School of Automation Engineering UESTC Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China China
Nowadays, image recognition and detection technologies based on traditional artificial neural networks and convolutional neural networks are slightly inadequate in terms of training and recognition time and accuracy, ... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
From Relevance to Utility: Evidence Retrieval with Feedback for Fact Verification
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hengran Zhang, Ruqing Guo, Jiafeng de Rijke, Maarten Fan, Yixing Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Amsterdam Netherlands The University of Amsterdam Netherlands
Retrieval-enhanced methods have become a primary approach in fact verification (FV);it requires reasoning over multiple retrieved pieces of evidence to verify the integrity of a claim. To retrieve evidence, existing w... 详细信息
来源: 评论
MITF:Cross-modal Image-text Retrieval Method with Mapping Images to Text Features  23
收藏 引用
23rd Chinese National Conference on Computational Linguistics, CCL 2024
作者: Lou, Xinyue Li, You Qi, Rui Chen, Yufeng Xu, Jinan School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China Beijing Key Lab of Traffic Data Analysis and Mining Beijing100044 China
To address the cross-modal image-text retrieval challenge, it’s essential to close the semantic gap between vision and language. However, the prevailing dual-stream model which separates image encoder and text encode... 详细信息
来源: 评论
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System  10
Trajectory Privacy Protection with Pricing Awareness on Ride...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Jia, Sihui Long, Saiqin Zheng, Zhirun Deng, Qingyong Wang, Ping Tian, Shujuan Xiangtan University School of Computer Science and School of Cyberspace Science Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan China Jinan University School of Information Science and Technology Guangzhou China Xiangtan University School of Mathematics and Compulational Science Xiangtan China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin China
With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work add... 详细信息
来源: 评论
Breaking IoT data Silos: Trustworthy data Trading with Consortium Blockchain and Zero-Knowledge Proof
Breaking IoT Data Silos: Trustworthy Data Trading with Conso...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wanshan Liu Yubing Han Guijuan Wang Yao Huang Anming Dong Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Big Data Institute Qilu University of Technology Jinan China
The Internet of Things (IoT) connects numerous de-vices and sensors, generating data with significant informational and economic value. However, data silos hinder effective data utilization and trading, leading to the... 详细信息
来源: 评论