咨询与建议

限定检索结果

文献类型

  • 487 篇 期刊文献
  • 430 篇 会议
  • 1 册 图书

馆藏范围

  • 918 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 424 篇 计算机科学与技术...
    • 347 篇 软件工程
    • 162 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 66 篇 控制科学与工程
    • 53 篇 光学工程
    • 52 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 网络空间安全
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 21 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 364 篇 理学
    • 181 篇 数学
    • 119 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 183 篇 管理学
    • 101 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 31 篇 医学
    • 25 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 deep learning
  • 28 篇 semantics
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 reinforcement le...
  • 11 篇 authentication
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 9 篇 federated learni...
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 92 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 28 篇 cas key lab of n...
  • 22 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 beijing electron...
  • 19 篇 key lab of broad...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 117 篇 guo jiafeng
  • 111 篇 cheng xueqi
  • 53 篇 zhang ruqing
  • 53 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 20 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 liu yu-an
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.

语言

  • 843 篇 英文
  • 57 篇 其他
  • 18 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
918 条 记 录,以下是261-270 订阅
排序:
Cdga: A GAN-based Controllable Domain Generation Algorithm
Cdga: A GAN-based Controllable Domain Generation Algorithm
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: You Zhai Jian Yang Zixiang Wang Longtao He Liqun Yang Zhoujun Li State Key Lab of Software Development Environment Beihang University National Computer Network Emergency Response Technical Team Coordination Center of China School of Cyber Science and Technology Beihang University
Recently Command and Control (C&C) servers have attracted considerable attention in botnets and domain generation algorithms (DGAs) further enhance the stealth of C&C servers. However, Algorithmically Generate... 详细信息
来源: 评论
Learning an explicit hyper-parameter prediction function conditioned on tasks
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2023年 第1期24卷 8818-8891页
作者: Jun Shu Deyu Meng Zongben Xu School of Mathematics and Statistics and Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaan'xi Province P. R. China Pazhou Lab (Huangpu) Guangzhou Guangdong Province P. R. China School of Mathematics and Statistics and Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaan'xi Province P. R. China Pazhou Lab (Huangpu) Guangzhou Guangdong Province P. R. China and Macau Institute of Systems Engineering Macau University of Science and Technology Taipa Macau P. R. China
Meta learning has attracted much attention recently in machine learning community. Contrary to conventional machine learning aiming to learn inherent prediction rules to predict labels for new query data, meta learnin... 详细信息
来源: 评论
Chain-of-Thought Poisoning Attacks against R1-based Retrieval-Augmented Generation Systems
arXiv
收藏 引用
arXiv 2025年
作者: Song, Hongru Liu, Yu-An Zhang, Ruqing Guo, Jiafeng Fan, Yixing CAS Key Lab of Network Data Science and Technology ICT CAS University of Chinese Academy of Sciences Beijing China
Retrieval-augmented generation (RAG) systems can effectively mitigate the hallucination problem of large language models (LLMs), but they also possess inherent vulnerabilities. Identifying these weaknesses before the ... 详细信息
来源: 评论
Mixture Policy based Multi-Hop Reasoning over N-tuple Temporal Knowledge Graphs
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Zhongni Su, Miao Jin, Xiaolong Li, Zixuan Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS China University of Chinese Academy of Sciences China
Temporal Knowledge Graphs (TKGs), which utilize quadruples in the form of (subject, predicate, object, timestamp) to describe temporal facts, have attracted extensive attention. N-tuple TKGs (N-TKGs) further extend tr... 详细信息
来源: 评论
Evaluating natural language generation via unbalanced optimal transport  29
Evaluating natural language generation via unbalanced optima...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Chen, Yimeng Lan, Yanyan Xiong, Ruibin Pang, Liang Ma, Zhiming Cheng, Xueqi University of Chinese Academy of Sciences China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS China Academy of Mathematics and Systems Science CAS China
Embedding-based evaluation measures have shown promising improvements on the correlation with human judgments in natural language generation. In these measures, various intrinsic metrics are used in the computation, i... 详细信息
来源: 评论
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System
Trajectory Privacy Protection with Pricing Awareness on Ride...
收藏 引用
IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)
作者: Sihui Jia Saiqin Long Zhirun Zheng Qingyong Deng Ping Wang Shujuan Tian School of Computer Science and School of Cyberspace Science Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan University Xiangtan China School of Information Science and Technology Jinan University Guangzhou China School of Mathematics and Compulational Science Xiangtan University Xiangtan China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work add...
来源: 评论
A Deep Exploration of BitLocker Encryption and Security Analysis  20
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
20th IEEE International Conference on Communication technology, ICCT 2020
作者: Tan, Cheng Zhang, Lijun Bao, Liang Science and Technology on Communication Security Laboratory Chengdu China Security Ministry of Public Security Key Lab of Information Network Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论
Rate-Splitting Multiple Access Enabled Green Probabilistic Semantic Communication over Wireless networks
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2025年
作者: Xu, Ruopeng Yang, Zhaohui Mao, Yijie Huang, Chongwen Yang, Qianqian Xu, Lexi Xu, Wei Zhang, Zhaoyang Zhejiang University College of Information Science and Electronic Engineering China Hangzhou310027 China ShanghaiTech University School of Information Science and Technology Shanghai201210 China Zhejiang Prov. Key Lab. of Multi-Modal Communication Networks and Intelligent Information Processing Hangzhou310027 China China United Network Communications Corporation Research Institute Beijing100048 China Southeast University National Mobile Communications Research Laboratory Nanjing211189 China
In this paper, we propose a multi-user green probabilistic semantic communication (PSC) system for semantic communication (SemCom) facilitated by probabilistic knowledge graphs (PKGs), which are knowledge graphs (KGs)... 详细信息
来源: 评论
FAST: a dual-tier few-shot learning paradigm for whole slide image classification  24
FAST: a dual-tier few-shot learning paradigm for whole slide...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Kexue Fu Xiaoyuan Luo Linhao Qu Shuo Wang Ying Xiong Ilias Maglogiannis Longxiang Gao Manning Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Digital Medical Research Center School of Basic Medical Sciences Fudan University and Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Fudan University University of Piraeus
The expensive fine-grained annotation and data scarcity have become the primary obstacles for the widespread adoption of deep learning-based Whole Slide Images (WSI) classification algorithms in clinical practice. Unl...
来源: 评论
A Prior Embedding-Driven Architecture for Long Distance Blind Iris Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Xiong, Qi Zhang, Xinman Shen, Jun International College Hunan University of Arts and Sciences Changde415000 China School of Automation Science and Engineering Faculty of Electronic and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
Blind iris images, which result from unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, little existing literature offers a solutio... 详细信息
来源: 评论