咨询与建议

限定检索结果

文献类型

  • 1,531 篇 期刊文献
  • 1,283 篇 会议
  • 1 册 图书

馆藏范围

  • 2,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,329 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 443 篇 信息与通信工程
    • 221 篇 生物工程
    • 213 篇 电气工程
    • 185 篇 控制科学与工程
    • 160 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 107 篇 机械工程
    • 105 篇 生物医学工程(可授...
    • 102 篇 化学工程与技术
    • 77 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 52 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
  • 1,014 篇 理学
    • 497 篇 数学
    • 277 篇 物理学
    • 255 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 92 篇 化学
    • 75 篇 系统科学
  • 517 篇 管理学
    • 275 篇 图书情报与档案管...
    • 252 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 108 篇 医学
    • 88 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 86 篇 法学
    • 64 篇 社会学
  • 44 篇 经济学
    • 44 篇 应用经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 111 篇 semantics
  • 76 篇 feature extracti...
  • 66 篇 training
  • 65 篇 deep learning
  • 54 篇 accuracy
  • 42 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 35 篇 data mining
  • 35 篇 graph neural net...
  • 34 篇 object detection
  • 33 篇 image segmentati...
  • 31 篇 privacy
  • 30 篇 optimization
  • 28 篇 data models
  • 27 篇 forecasting
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 reinforcement le...
  • 25 篇 knowledge graph

机构

  • 164 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 49 篇 network and data...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 46 篇 school of comput...
  • 46 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of cyber ...
  • 28 篇 key lab of infor...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 cas key lab of n...

作者

  • 185 篇 cheng xueqi
  • 143 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 zhang ruqing
  • 42 篇 fan yixing
  • 34 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 22 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 de rijke maarten
  • 20 篇 chen yanping
  • 20 篇 xu jun
  • 19 篇 cao qi
  • 18 篇 pan jeng-shyang

语言

  • 2,632 篇 英文
  • 142 篇 其他
  • 43 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2815 条 记 录,以下是51-60 订阅
排序:
Secure Similar Adjacent Vertex Query on Sparse Graph data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
Generative Retrieval for Book Search  25
Generative Retrieval for Book Search
收藏 引用
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and data Mining V.1
作者: Yubao Tang Ruqing Zhang Jiafeng Guo Maarten de Rijke Shihao Liu Shuaiqiang Wang Dawei Yin Xueqi Cheng CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of the Chinese Academy of Sciences Beijing China & University of Amsterdam Amsterdam Netherlands CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China & University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands Baidu Inc. Beijing China
In book search, relevant book information should be returned in response to a query. Books contain complex, multi-faceted information such as metadata, outlines, and main text, where the outline provides hierarchical ... 详细信息
来源: 评论
Towards Robust Universal Information Extraction: Benchmark, Evaluation, and Solution
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Jizhao Shi, Akang Li, Zixuan Bai, Long Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science Shenyang Aerospace University Shenyang China
In this paper, we aim to enhance the robustness of Universal Information Extraction (UIE) by introducing a new benchmark dataset, a comprehensive evaluation, and a feasible solution. Existing robust benchmark datasets... 详细信息
来源: 评论
Separate Source Channel Coding Is Still What You Need:An LLM-Based Rethinking
收藏 引用
ZTE Communications 2025年 第1期23卷 30-44页
作者: REN Tianqi LI Rongpeng ZHAO Mingmin CHEN Xianfu LIU Guangyi YANG Yang ZHAO Zhifeng ZHANG Honggang College of Information Science and Electronic Engineering Zhejiang UniversityHangzhou 310027China Shenzhen CyberAray Network Technology Co. Ltd.Shenzhen 518000China China Mobile Research Institute Beijing 100053China The Internet of Things Thrust The Hong Kong University of Science and Technology(Guangzhou)Guangzhou 511453China Zhejiang Lab Hangzhou 311121China Faculty of Data Science City University of MacaoMacao 999078China
Along with the proliferating research interest in semantic communication(Sem Com),joint source channel coding(JSCC)has dominated the attention due to the widely assumed existence in efficiently delivering information ... 详细信息
来源: 评论
TransMatch: Employing Bridging Strategy to Overcome Large Deformation for Feature Matching in Gastroscopy Scenario
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Zhu, Guosong Qin, Zhen Yu, Linfang Ding, Yi Qin, Zhiguang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu611731 China Industrial Research Institute Chengdu610000 China
Feature matching is widely applied in the image processing field. However, both traditional feature matching methods and previous deep learning-based methods struggle to accurately match the features with severe defor... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
AMTrans:Auto-Correlation Multi-Head Attention Transformer for Infrared Spectral Deconvolution
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1329-1341页
作者: Lei Gao Liyuan Cui Shuwen Chen Lizhen Deng Xiaokang Wang Xiaohong Yan Hu Zhu College of Electronic and Optical Engineering & College of Flexible Electronics(Future Technology) Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu Province Key Lab on Image Processing and Image Communication Nanjing University of Posts and TelecommunicationsNanjing 210003China National Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China School of Computer Science and Technology Hainan UniversityHaikou 570228China
Infrared spectroscopy analysis has found widespread applications in various fields due to advancements in technology and industry *** improve the quality and reliability of infrared spectroscopy signals,deconvolution ... 详细信息
来源: 评论
Understanding User Passwords through Parsing Tree
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ding Shan, Xuan Wu, Yuxuan Jia, Chunfu Nankai University College of Cryptology and Cyber Science Tianjin300350 China Ministry of Education of China Henan Key Laboratory of Network Cryptography Key Laboratory of Cyberspace Security China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Passwords are today's dominant form of authentication, and password guessing is the most effective method for evaluating password strength. Most password guessing models (e.g., PCFG, Markov, and RFGuess) regard pa... 详细信息
来源: 评论
Riemannian Complex Hermit Positive Definite Convolution network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Li, Yuke Jin, Haiyan Lin, Weisi Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep learning can learn high-level semantic features in Euclidean space effectively for PolSAR images, while they need to covert the complex covariance matrix into a feature vector or complex-valued vector as the netw... 详细信息
来源: 评论
Dynamic Offloading Control for Waste Sorting Based on Deep Q-network  24th
Dynamic Offloading Control for Waste Sorting Based on Deep...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Jing Wang, Xiaoyang Guo, Jianxiong Tang, Zhiqing Ding, Xingjian Wang, Tian Advanced Institute of Natural Sciences Beijing Normal University Zhuhai China Guangdong Key Lab of AI and Multi-modal Data Processing Department of Computer Science BNU-HKBU United International College Zhuhai China Faculty of Information Technology Beijing University of Technology Beijing China
With the increasing concern for environmental protection and resource optimization, efficient waste sorting has become a serious challenge today. In this paper, we propose a new offloading control problem that aims to... 详细信息
来源: 评论