咨询与建议

限定检索结果

文献类型

  • 487 篇 期刊文献
  • 430 篇 会议
  • 1 册 图书

馆藏范围

  • 918 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 424 篇 计算机科学与技术...
    • 347 篇 软件工程
    • 162 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 66 篇 控制科学与工程
    • 53 篇 光学工程
    • 52 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 网络空间安全
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 21 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 364 篇 理学
    • 181 篇 数学
    • 119 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 183 篇 管理学
    • 101 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 31 篇 医学
    • 25 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 deep learning
  • 28 篇 semantics
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 reinforcement le...
  • 11 篇 authentication
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 9 篇 federated learni...
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 92 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 28 篇 cas key lab of n...
  • 22 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 beijing electron...
  • 19 篇 key lab of broad...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 117 篇 guo jiafeng
  • 111 篇 cheng xueqi
  • 53 篇 zhang ruqing
  • 53 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 20 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 liu yu-an
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.

语言

  • 843 篇 英文
  • 57 篇 其他
  • 18 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
918 条 记 录,以下是181-190 订阅
排序:
An RTDNN-Based Hybrid Precoding and Combining Joint Optimization Algorithm for MUPC-MIMO Systems
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2025年
作者: Liu, Fulai Liu, Yubiao Yang, Xianghuan Duan, Zhuoyao Shi, Baozhu Ji, Li Du, Ruiyan Northeastern University at Qinhuangdao Lab of Key Technology of Millimeter-wave Large-scale MIMO System Hebei Key Laboratory of Marine Perception Network and Data Processing Qinhuangdao066004 China Hebei University College of Mathematics and Information Science Baoding071002 China Northeastern University School of Computer Science and Engineering Shenyang110819 China Qinhuangdao Vocational and Technical College Qinhuangdao066100 China School of Computer Science and Engineering Northeastern University Shenyang110004 China
To achieve a satisfactory balance between energy efficiency (EE) and spectral efficiency (SE) for hybrid precoding and combining (HPC), this paper presents a two-stage joint optimization HPC algorithm based on residua... 详细信息
来源: 评论
Improved Far-field Speaker Recognition Method Based Geometry Acoustic Simulation and SpecAugment
Improved Far-field Speaker Recognition Method Based Geometry...
收藏 引用
2021 International Conference on Intelligent Computing, Automation and Applications, ICAA 2021
作者: Lian, Yingzi Pang, Jing Inner Mongolia University of Technology College of Science Hohhot China Inner Mongolia Key Lab. of Statistical Analysis Theory for Life Data and Neural Network Modeling Inner Mongolia University of Technology Hohhot China
Deep learning method has made a great breakthrough in the field of speaker recognition. However, the performance of deep learning method based neural network often degrade in far-field speaker recognition task, with r... 详细信息
来源: 评论
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription Generation of Traditional Chinese Medicine
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription G...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Hua Pu Jiacong Mi Shan Lu Jieyue He School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Nanjing China Nanjing Fenghuo Tiandi Communication Technology Co. Ltd Nanjing China
Traditional Chinese medicine (TCM) prescription is the most critical form of TCM treatment, and uncovering the complex nonlinear relationship between symptoms and TCM is of great significance for clinical practice and...
来源: 评论
Dear-DIA^(XMBD): Deep Autoencoder Enables Deconvolution of Data-Independent Acquisition Proteomics
收藏 引用
Research 2024年 第1期6卷 707-720页
作者: Qingzu He Chuan-Qi Zhong Xiang Li Huan Guo Yiming Li Mingxuan Gao Rongshan Yu Xianming Liu Fangfei Zhang Donghui Guo Fangfu Ye Tiannan Guo Jianwei Shuai Jiahuai Han Department of Physics and Fujian Provincial Key Laboratory for Soft Functional Materials ResearchXiamen UniversityXiamen 361005China Oujiang Laboratory(Zhejiang Lab for Regenerative Medicine Vision and Brain Health)and Wenzhou InstituteUniversity of Chinese Academy of SciencesWenzhouZhejiang 325001China School of Life Sciences Xiamen UniversityXiamen 361102China State Key Laboratory of Cellular Stress Biology Innovation Center for Cell Signaling NetworkXiamen 361102China Department of Computer Science Xiamen UniversityXiamen 361005China National Institute for Data Science in Health and Medicine School of MedicineXiamen UniversityXiamen 361102China Bruker(Beijing)Scientific Technology Co.Ltd. BeijingChina Westlake Laboratory of Life Sciences and Biomedicine Key Laboratory of Structural Biology of Zhejiang ProvinceSchool of Life SciencesWestlake University18 Shilongshan RoadHangzhou 310024China Institute of Basic Medical Sciences Westlake Institute for Advanced Study18 Shilongshan RoadHangzhou 310024China Westlake Omics Ltd. Yunmeng Road 1HangzhouChina Department of Electronic Engineering Xiamen UniversityXiamen 361005China
Data-independent acquisition(DIA)technology for protein identification from mass spectrometry and related algorithms is developing *** spectrum-centric analysis of DIA data without the use of spectra library from data... 详细信息
来源: 评论
Human Attention Based Movie Summarization: Dataset and Baseline Model
Human Attention Based Movie Summarization: Dataset and Basel...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Zhao, Defang Zhu, Dandan Min, Xiongkuo Yue, Jiaomin Zhang, Kaiwei Zhou, Qiangqiang Zhai, Guangtao Yang, Xiaokang CloudWalk Technology Shanghai China School of Computer Science and Technology Donghua University Shanghai China Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Shanghai China School of Software Jiangxi Normal University Nanchang China Ai Institute Shanghai Jiao Tong University MOE Key Lab of Artificial Intelligence Shanghai China
The movie summarization model can automatically edit a condensed and succinct version of the movie by selecting the keyframes. Previous works mainly resort to hand-crafted heuristics and most of them are unsupervised.... 详细信息
来源: 评论
LegoNet: A Fast and Exact Unlearning Architecture
arXiv
收藏 引用
arXiv 2022年
作者: Yu, Sihao Sun, Fei Guo, Jiafeng Zhang, Ruqing Cheng, Xueqi University of Chinese Academy of Sciences Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Machine unlearning aims to erase the impact of specific training samples upon deleted requests from a trained model. Retraining the model on the retained data after deletion is an effective but not efficient way due t... 详细信息
来源: 评论
Pre-train a Discriminative Text Encoder for Dense Retrieval via Contrastive Span Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Ma, Xinyu Guo, Jiafeng Zhang, Ruqing Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Dense retrieval has shown promising results in many information retrieval (IR) related tasks, whose foundation is high-quality text representation learning for effective search. Some recent studies have shown that aut... 详细信息
来源: 评论
Visual Named Entity Linking: A New Dataset and A Baseline
arXiv
收藏 引用
arXiv 2022年
作者: Sun, Wenxiang Fan, Yixing Guo, Jiafeng Zhang, Ruqing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Visual Entity Linking (VEL) is a task to link regions of images with their corresponding entities in Knowledge Bases (KBs), which is beneficial for many computer vision tasks such as image retrieval, image caption, an... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论