咨询与建议

限定检索结果

文献类型

  • 1,549 篇 期刊文献
  • 1,339 篇 会议
  • 1 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,953 篇 工学
    • 1,359 篇 计算机科学与技术...
    • 1,141 篇 软件工程
    • 459 篇 信息与通信工程
    • 219 篇 生物工程
    • 212 篇 电气工程
    • 211 篇 控制科学与工程
    • 173 篇 电子科学与技术(可...
    • 140 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 104 篇 机械工程
    • 102 篇 化学工程与技术
    • 84 篇 网络空间安全
    • 77 篇 仪器科学与技术
    • 56 篇 交通运输工程
    • 55 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 47 篇 材料科学与工程(可...
    • 46 篇 土木工程
  • 1,024 篇 理学
    • 500 篇 数学
    • 276 篇 物理学
    • 257 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 94 篇 化学
    • 75 篇 系统科学
  • 519 篇 管理学
    • 278 篇 图书情报与档案管...
    • 251 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 107 篇 医学
    • 88 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 18 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 114 篇 semantics
  • 80 篇 feature extracti...
  • 70 篇 deep learning
  • 66 篇 training
  • 64 篇 accuracy
  • 50 篇 federated learni...
  • 47 篇 computational mo...
  • 40 篇 machine learning
  • 36 篇 data mining
  • 36 篇 graph neural net...
  • 34 篇 image segmentati...
  • 34 篇 privacy
  • 33 篇 object detection
  • 32 篇 optimization
  • 30 篇 data models
  • 30 篇 adaptation model...
  • 29 篇 reinforcement le...
  • 28 篇 forecasting
  • 27 篇 neural networks
  • 26 篇 knowledge graph

机构

  • 170 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 74 篇 key laboratory o...
  • 71 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 52 篇 shandong enginee...
  • 50 篇 network and data...
  • 48 篇 college of compu...
  • 46 篇 school of comput...
  • 45 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 35 篇 college of cyber...
  • 34 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 school of comput...
  • 28 篇 hubei key labora...
  • 28 篇 key lab of infor...
  • 28 篇 national enginee...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei engineerin...

作者

  • 191 篇 cheng xueqi
  • 149 篇 guo jiafeng
  • 48 篇 zhang ruqing
  • 47 篇 fan yixing
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 36 篇 jin xiaolong
  • 31 篇 liu jun
  • 29 篇 pang liang
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 24 篇 bi keping
  • 22 篇 chen enhong
  • 21 篇 de rijke maarten
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 20 篇 xu jun
  • 20 篇 li zixuan
  • 19 篇 hu shengshan

语言

  • 2,273 篇 英文
  • 576 篇 其他
  • 43 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2889 条 记 录,以下是601-610 订阅
排序:
Breaking IoT data Silos: Trustworthy data Trading with Consortium Blockchain and Zero-Knowledge Proof
Breaking IoT Data Silos: Trustworthy Data Trading with Conso...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wanshan Liu Yubing Han Guijuan Wang Yao Huang Anming Dong Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Big Data Institute Qilu University of Technology Jinan China
The Internet of Things (IoT) connects numerous de-vices and sensors, generating data with significant informational and economic value. However, data silos hinder effective data utilization and trading, leading to the... 详细信息
来源: 评论
Wavelength-division-multiplexed Transmission and Dispersion Compensation Enabled by Soliton Microcombs and Cascaded Microrings
Wavelength-division-multiplexed Transmission and Dispersion ...
收藏 引用
CLEO: science and Innovations in CLEO 2024, CLEO: S and I 2024 - Part of Conference on Lasers and Electro-Optics
作者: Liu, Yuanbin Zhang, Hongyi Liu, Jiacheng Lu, Liangjun Du, Jiangbing Li, Yu He, Zuyuan Chen, Jianping Zhou, Linjie Poon, Andrew W. State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Lab of Navigation and Location Services Shanghai Institute for Advanced Communication and Data Science Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China SJTU-Pinghu Institute of Intelligent Optoelectronics Pinghu314200 China Photonic Device Laboratory Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Clear Water Bay Hong Kong
We demonstrate wavelength-division-multiplexed data transmission and dispersion compensation of 25 Gb/s × 9 on-off-keying signals over a 20-km singlemode fiber using an integrated single-soliton microcomb and a c... 详细信息
来源: 评论
Wavelength-division-multiplexed Transmission and Dispersion Compensation Enabled by Soliton Microcombs and Cascaded Microrings
Wavelength-division-multiplexed Transmission and Dispersion ...
收藏 引用
2024 Conference on Lasers and Electro-Optics, CLEO 2024
作者: Liu, Yuanbin Zhang, Hongyi Liu, Jiacheng Lu, Liangjun Du, Jiangbing Li, Yu He, Zuyuan Chen, Jianping Zhou, Linjie Poon, Andrew W. State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Lab of Navigation and Location Services Shanghai Institute for Advanced Communication and Data Science Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China SJTU-Pinghu Institute of Intelligent Optoelectronics Pinghu314200 China Photonic Device Laboratory Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Clear Water Bay Hong Kong
We demonstrate wavelength-division-multiplexed data transmission and dispersion compensation of 25 Gb/s × 9 on-off-keying signals over a 20-km singlemode fiber using an integrated single-soliton microcomb and a c... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A k-Nearest-Neighbor Machine Translation Method Combining Certainty Factor and Region Density  23
收藏 引用
23rd Chinese National Conference on Computational Linguistics, CCL 2024
作者: Qi, Rui Shi, Xiangyu Man, Zhibo Xu, Jinan Chen, Yufeng Beijing Jiaotong University School of Computer Science and Technology Beijing100044 China Beijing Key Lab of Traffic Data Analysis and Mining Beijing100044 China
k-Nearest-Neighbor Machine Translation (kNN-MT) is an important research direction in the field of neural machine translation in recent years. It can improve the translation quality without updating the model, but the... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Learning Subpocket Prototypes for Generalizable Structure-based Drug Design
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zaixi Liu, Qi Anhui Province Key Lab of Big Data Analysis and Application University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence China
Generating molecules with high binding affinities to target proteins (a.k.a. structure-based drug design) is a fundamental and challenging task in drug discovery. Recently, deep generative models have achieved remarka... 详细信息
来源: 评论
MDEC: Mamba-based Debiased Extended Contrast Learning in Sequential Recommendation
MDEC: Mamba-based Debiased Extended Contrast Learning in Seq...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yan Huang Zhenyu Yang Baojie Xu Wenyue Hu Zhibo Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recommender systems are critical for mitigating information overload, assisting users in uncovering their latent interests, and enhancing their overall experience. Sequential recommendation leverages users' histor... 详细信息
来源: 评论
TSEN: TRANSFORMER AND SNOWBALL GRAPH CONVOLUTION LEARNING FOR BRAIN FUNCTIONAL network CLASSIFICATION
arXiv
收藏 引用
arXiv 2023年
作者: Hu, Jinlong Huang, Yangmin Dong, Shoubin Guangdong Key Lab of Communication and Computer Network School of Computer Science and Engineering South China University of Technology Guangzhou China
Advanced deep learning methods, especially graph neural networks (GNNs), are increasingly expected to learn from brain functional network data and predict brain disorders. In this paper, we proposed a novel Transforme... 详细信息
来源: 评论
Transformer and Snowball Graph Convolution Learning for Brain Functional network Analysis
Transformer and Snowball Graph Convolution Learning for Brai...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jinlong Hu Yangmin Huang Shoubin Dong School of Computer Science and Engineering Guangdong Key Lab of Communication and Computer Network South China University of Technology Guangzhou China
Advanced deep learning methods, especially graph neural networks (GNNs), are increasingly expected to learn from brain functional network data and predict brain disorders. In this paper, we proposed a novel Transforme...
来源: 评论