咨询与建议

限定检索结果

文献类型

  • 1,531 篇 期刊文献
  • 1,283 篇 会议
  • 1 册 图书

馆藏范围

  • 2,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,329 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 443 篇 信息与通信工程
    • 221 篇 生物工程
    • 213 篇 电气工程
    • 185 篇 控制科学与工程
    • 160 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 107 篇 机械工程
    • 105 篇 生物医学工程(可授...
    • 102 篇 化学工程与技术
    • 77 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 52 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
  • 1,014 篇 理学
    • 497 篇 数学
    • 277 篇 物理学
    • 255 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 92 篇 化学
    • 75 篇 系统科学
  • 517 篇 管理学
    • 275 篇 图书情报与档案管...
    • 252 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 108 篇 医学
    • 88 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 86 篇 法学
    • 64 篇 社会学
  • 44 篇 经济学
    • 44 篇 应用经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 111 篇 semantics
  • 76 篇 feature extracti...
  • 66 篇 training
  • 65 篇 deep learning
  • 54 篇 accuracy
  • 42 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 35 篇 data mining
  • 35 篇 graph neural net...
  • 34 篇 object detection
  • 33 篇 image segmentati...
  • 31 篇 privacy
  • 30 篇 optimization
  • 28 篇 data models
  • 27 篇 forecasting
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 reinforcement le...
  • 25 篇 knowledge graph

机构

  • 164 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 49 篇 network and data...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 46 篇 school of comput...
  • 46 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of cyber ...
  • 28 篇 key lab of infor...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 cas key lab of n...

作者

  • 185 篇 cheng xueqi
  • 143 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 zhang ruqing
  • 42 篇 fan yixing
  • 34 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 22 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 de rijke maarten
  • 20 篇 chen yanping
  • 20 篇 xu jun
  • 19 篇 cao qi
  • 18 篇 pan jeng-shyang

语言

  • 2,632 篇 英文
  • 142 篇 其他
  • 43 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2815 条 记 录,以下是71-80 订阅
排序:
Practical Two-Factor Authentication Protocol for Real-Time data Access in WSNs
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Xu, Meijia Wang, Ding Nankai University College of Cryptology and Cyber Science Tianjin300350 China Tianjin300350 China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
With the rapid development of sensors and communication technologies, the Internet of Things (IoT) paradigm has increasingly expanded to cover various daily, industrial, and military applications. As a core component ... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
Subpart Suppression network for Few-Shot Object Counting
Subpart Suppression Network for Few-Shot Object Counting
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lanxin Liu Xinyan Liu Guorong Li School of Computer Science and Technology Key Lab of Big Data Mining and Knowledge Management University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Weihai)
Few-shot object counting and detection aim to count objects along with their bounding boxes specified by exemplar bounding boxes. Current mainstream methods predict density maps by applying similarity between exemplar... 详细信息
来源: 评论
Brain-Conditional Multimodal Synthesis: A Survey and Taxonomy
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1080-1099页
作者: Mai, Weijian Zhang, Jian Fang, Pengfei Zhang, Zhijun South China University of Technology School of Automation Science and Engineering Guangzhou510640 China Southeast University School of Computer Science and Engineering Nanjing210096 China South China University of Technology Key Library of Autonomous Systems and Network Control Ministry of Education The School of Automation Science and Engineering Guangzhou510640 China Institute for Super Robotics Huangpu Guangzhou510555 China Nanchang University Jiangxi Thousand Talents Plan Nanchang330031 China Jishou University College of Computer Science and Engineering Jishou416000 China Guangdong Artificial Intelligence and Digital Economy Laboratory Pazhou Lab Guangzhou510335 China Shaanxi University of Technology Shaanxi Provincial Key Laboratory of Industrial Automation School of Mechanical Engineering Hanzhong723001 China Changsha Normal University School of Information Science and Engineering Changsha410100 China Guangdong University of Petrochemical Technology School of Automation Science and Engineering Institute of Artificial Intelligence and Automation Maoming525000 China
In the era of artificial intelligence generated content (AIGC), conditional multimodal synthesis technologies (e.g., text-to-image) are dynamically reshaping the natural content. Brain signals, serving as potential re... 详细信息
来源: 评论
A contrastive learning framework of graph reconstruction and hypergraph learning for key node identification
收藏 引用
Chaos, Solitons and Fractals 2025年 197卷
作者: Huang, Xu-Dong Zhang, Xian-Jie Zhang, Hai-Feng Data Intelligence Lab Research Center For Data To Cyberspace School of Cyber Science and Technology University of Science and Technology of China Hefei Anhui230026 China The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Mathematical Science Anhui University Hefei Anhui230601 China
With the emergence of complex networks in various domains, the key node identification has become one of the critical issues that needs to be studied. Traditional index methods typically focus on single structural inf... 详细信息
来源: 评论
TinyML-Based Approach for Dynamic Transmission Power in LoRaWAN network  18th
TinyML-Based Approach for Dynamic Transmission Power in Lo...
收藏 引用
18th China Conference on Wireless Sensor networks, CWSN 2024
作者: Lodhi, Muhammad Ali Wang, Lei Qureshi, Khalid Ibrahim Mahmood, Khalid Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Technology Dalian University of Technology Dalian China Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Douliu64002 Taiwan
The Blind Adaptive Rate (B-ADR) algorithm, designed by Semtech for LoRaWAN networks, is tailored for mobile applications to allocate the spreading factor before each uplink transmission. This enhances reliability even... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Miao, Haonan Zhao, Peizheng Sun, Yuqi Nan, Fang Zhang, Xiaolong Wu, Yaqiang Tian, Feng School of Computer Science and Technology Xi'an Jiaotong University Xi'an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China School of Advanced Technology Xi'an Jiaotong-Liverpool University Suzhou215123 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
Towards precision diagnosis: a novel hybrid DC-CAD model for lung disease detection leveraging multi-scale capsule networks and temporal dynamics
收藏 引用
Complex and Intelligent Systems 2025年 第6期11卷 1-24页
作者: Aggrey, Esther Stacy E. B. Zhen, Qin Kodjiku, Seth Larweh Fiasam, Linda Delali Sey, Collins Ukwuoma, Chiagoziem C. Aidoo, Evans Osei-Mensah, Emmanuel School of Information and Software Engineering Chengdu 610054 China The Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 610054 China School of Computer Science and Technology Hangzhou 310018 China College of Nuclear Technology and Automation Engineering Chengdu China School of Computer Science and Informatics Huddersfield United Kingdom
The early detection of lung diseases, including cancer, is essential for improving patient outcomes. However, traditional diagnostic approaches and standard deep learning models often face challenges in effectively an... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论