咨询与建议

限定检索结果

文献类型

  • 487 篇 期刊文献
  • 430 篇 会议
  • 1 册 图书

馆藏范围

  • 918 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 424 篇 计算机科学与技术...
    • 347 篇 软件工程
    • 162 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 66 篇 控制科学与工程
    • 53 篇 光学工程
    • 52 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 网络空间安全
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 21 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 364 篇 理学
    • 181 篇 数学
    • 119 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 183 篇 管理学
    • 101 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 31 篇 医学
    • 25 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 deep learning
  • 28 篇 semantics
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 reinforcement le...
  • 11 篇 authentication
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 9 篇 federated learni...
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 92 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 28 篇 cas key lab of n...
  • 22 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 beijing electron...
  • 19 篇 key lab of broad...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 117 篇 guo jiafeng
  • 111 篇 cheng xueqi
  • 53 篇 zhang ruqing
  • 53 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 20 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 liu yu-an
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.

语言

  • 843 篇 英文
  • 57 篇 其他
  • 18 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
918 条 记 录,以下是221-230 订阅
排序:
Mind Reasoning Manners: Enhancing Type Perception for Generalized Zero-shot Logical Reasoning over Text
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Fangzhi Liu, Jun Lin, Qika Zhao, Tianzhe Zhang, Jian Zhang, Lingling School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D National Engineering lab for Big Data Analytics Xi’an China
Logical reasoning task involves diverse types of complex reasoning over text, based on the form of multiple-choice question answering. Given the context, question and a set of options as the input, previous methods ac... 详细信息
来源: 评论
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription Generation of Traditional Chinese Medicine
arXiv
收藏 引用
arXiv 2023年
作者: Pu, Hua Mi, Jiacong Lu, Shan He, Jieyue School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Jiangsu Nanjing210018 China Nanjing Fenghuo Tiandi Communication Technology Co. Ltd Jiangsu Nanjing211161 China
Traditional Chinese medicine (TCM) prescription is the most critical form of TCM treatment, and uncovering the complex nonlinear relationship between symptoms and TCM is of great significance for clinical practice and... 详细信息
来源: 评论
CorpusBrain: Pre-train a Generative Retrieval Model for Knowledge-Intensive Language Tasks
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Jiangui Zhang, Ruqing Guo, Jiafeng Liu, Yiqun Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS University of Chinese Academy of Sciences Beijing China BNRist DCST Tsinghua University Beijing China
Knowledge-intensive language tasks (KILT) usually require a large body of information to provide correct answers. A popular paradigm to solve this problem is to combine a search system with a machine reader, where the... 详细信息
来源: 评论
MV-CC: Mask Enhanced Video Model for Remote Sensing Change Caption
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Ruixun Li, Kaiyu Song, Jiayi Sun, Dongwei Cao, Xiangyong The School of Automation Xi’an Jiaotong University Xi’an710049 China The School of Software Engineering Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China
Remote sensing image change caption (RSICC) aims to provide natural language descriptions for bi-temporal remote sensing images. Since Change Caption (CC) task requires both spatial and temporal features, previous wor... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peijie Xian Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen Univ. Shenzhen China Shaanxi Key Lab. of Information Comm. Network and Security Xi’an Univ. of Posts & Telecomm. Xi’an China School of Information Technology Carleton Univ. Ottawa Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
YOLO_v3-Based Pulmonary Nodules Recognition System  10th
YOLO_v3-Based Pulmonary Nodules Recognition System
收藏 引用
10th International Conference on Computer Engineering and networks, CENet 2020
作者: Deng, Wenhao Wang, Zhiqiang Ren, Xiaorui Zhang, Xusheng Wang, Bing Yang, Tao State Information Center Beijing China Beijing Electronic Science and Technology Institute Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China Guangdong Hangyu Satellite Technology Co. Ltd. Shantou China
The incidence of pneumonia and lung cancer is high in China. Lung CT images are widely used in the screening and adjuvant treatment of lung diseases due to their advantages of a thin layer, high definition, and low no... 详细信息
来源: 评论
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protec...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Changnan Jiang Chunhe Xia Mengyao Liu Rui Fang Pengfei Li Huacheng Li Tianbo Wang Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing China
The federated Android malware classifier has attracted much attention owing to its advantages of privacy protection and multi-party joint modeling. However, the research indicates that the gradient transmitted within ... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Proposal of a free-space-to-chip pipeline for transporting single atoms
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Aiping Liu, Jiawei Kang, Zhanfei Chen, Guang-Jie Xu, Xin-Biao Ren, Xifeng Guo, Guang-Can Wang, Qin Zou, Chang-Ling Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing210003 China CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Hefei230026 China
A free-space-to-chip pipeline is proposed to efficiently transport single atoms from a magneto-optical trap to an on-chip evanescent field trap. Due to the reflection of the dipole laser on the chip surface, the conve... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论