咨询与建议

限定检索结果

文献类型

  • 487 篇 期刊文献
  • 430 篇 会议
  • 1 册 图书

馆藏范围

  • 918 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 659 篇 工学
    • 422 篇 计算机科学与技术...
    • 347 篇 软件工程
    • 163 篇 信息与通信工程
    • 76 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 65 篇 控制科学与工程
    • 52 篇 光学工程
    • 52 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 仪器科学与技术
    • 30 篇 网络空间安全
    • 27 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 21 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 365 篇 理学
    • 181 篇 数学
    • 120 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 183 篇 管理学
    • 101 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 31 篇 医学
    • 25 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 deep learning
  • 28 篇 semantics
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 reinforcement le...
  • 11 篇 authentication
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 9 篇 federated learni...
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 92 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 28 篇 cas key lab of n...
  • 22 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 beijing electron...
  • 19 篇 key lab of broad...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 117 篇 guo jiafeng
  • 111 篇 cheng xueqi
  • 53 篇 zhang ruqing
  • 53 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 20 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 liu yu-an
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.

语言

  • 845 篇 英文
  • 55 篇 其他
  • 18 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
918 条 记 录,以下是401-410 订阅
排序:
Interpretation-Enabled Software Reuse Detection Based on a Multi-level Birthmark Model
Interpretation-Enabled Software Reuse Detection Based on a M...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Xi Xu Qinghua Zheng Zheng Yan Ming Fan Ang Jia Ting Liu Key Laboratory of Intelligent Networks and Network Security Ministry of Education China School of Computer Science and Technology Xi’an Jiaotong University China State Key Lab on Integrated Services Networks School of Cyber Engineering Xidian University China Department of Communications and Networking Aalto University Finland School of Cyber Science and Engineering Xi’an Jiaotong University China
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the oth... 详细信息
来源: 评论
INMO: A Model-Agnostic and Scalable Module for Inductive Collaborative Filtering
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yunfan Cao, Qi Shen, Huawei Tao, Shuchang Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology CAS University of Chinese Academy of Sciences Beijing China Data Intelligence System Research Center Institute of Computing Technology CAS China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS University of Chinese Academy of Sciences Beijing China
Collaborative filtering is one of the most common scenarios and popular research topics in recommender systems. Among existing methods, latent factor models, i.e., learning a specific embedding for each user/item by r... 详细信息
来源: 评论
Integrated Sensing and Communication Signals Toward 5G-A and 6G: A Survey
arXiv
收藏 引用
arXiv 2023年
作者: Wei, Zhiqing Qu, Hanyang Wang, Yuan Yuan, Xin Wu, Huici Du, Ying Han, Kaifeng Zhang, Ning Feng, Zhiyong The Key Laboratory of Universal Wireless Communications Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China The National Engineering Lab for Mobile Network Technologies Beijing University of Posts and Telecommunications Beijing100876 China Peng Cheng Laboratory Shenzhen518066 China Data61 CSIRO Sydney Australia The Department of Electrical and Computer Engineering University of Windsor WindsorONN9B 3P4 Canada The University of Science and Technology of China China Academy of Information and Communications Technology Beijing100191 China China Academy of Information and Communications Technology Beijing100191 China
Integrated sensing and communication (ISAC) has the advantages of efficient spectrum utilization and low hardware cost. It is promising to be implemented in the fifth-generation-advanced (5G-A) and sixth-generation (6... 详细信息
来源: 评论
Meta Mask Correction for Nuclei Segmentation in Histopathological Image
Meta Mask Correction for Nuclei Segmentation in Histopatholo...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Shi, Jiangbo Jia, Chang Gao, Zeyu Gong, Tieliang Wang, Chunbao Li, Chen Xi'An Jiao Tong University National Engineering Lab for Big Data Analytics Shaanxi Xi'an710049 China School of Computer Science and Technology Xi'An Jiao Tong University Shaanxi Xi'an710049 China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech.RandD Xi'An Jiao Tong University Shaanxi Xi'an710049 China Department of Pathology The First Affiliated Hospital of xi'An Jiaotong University Shaanxi Xi'an710061 China
Nuclei segmentation is a fundamental task in digital pathology analysis and can be automated by deep learning-based methods. However, the development of such an automated method requires a large amount of data with pr... 详细信息
来源: 评论
Pseudo-labeling Based Practical Semi-Supervised Meta-Training for Few-Shot Learning
arXiv
收藏 引用
arXiv 2022年
作者: Dong, Xingping Ouyang, Tianran Liao, Shengcai Du, Bo Shao, Ling School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan430072 China College of Information Technology United Arab Emirates University Al Ain United Arab Emirates UCAS-Terminus AI Lab University of Chinese Academy of Sciences Beijing100049 China
Most existing few-shot learning (FSL) methods require a large amount of labeled data in meta-training, which is a major limit. To reduce the requirement of labels, a semi-supervised meta-training (SSMT) setting has be... 详细信息
来源: 评论
Toward the Understanding of Deep Text Matching Models for Information Retrieval
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Lijuan Lan, Yanyan Pang, Liang Guo, Jiafeng Cheng, Xueqi Sogou Inc. Beijing China Institute for AI Industry Research Tsinghua University Beijing China Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Semantic text matching is a critical problem in information retrieval. Recently, deep learning techniques have been widely used in this area and obtained significant performance improvements. However, most models are ... 详细信息
来源: 评论
Weakly supervised learning for textbook question answering
TechRxiv
收藏 引用
TechRxiv 2021年
作者: Ma, Jie Chai, Qi Huang, Jingyue Liu, Jun You, Yang Zheng, Qinghua National Engineering Lab for Big Data Analytics School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China The High Performance Computing for Artificial intelligence Lab Department of Computer Science National University of Singapore 117417 Singapore
Textbook Question Answering (TQA) is the task of answering diagram and non-diagram questions given large multimodal contexts consisting of abundant text and diagrams. Deep text understandings and effective learning of... 详细信息
来源: 评论
A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation
收藏 引用
China Communications 2019年 第10期16卷 112-132页
作者: Lingtao Qi Haiping Huang Feng Li Reza Malekian Ruchuan Wang College of Computer Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China “Broadband Wireless Communication and Sensor Network Technology”Key Lab of Ministry of Education NUPTNanjing 210003China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 210016China Department of Computer Science and Media Technology Malmo UniversityMalmo 20506Sweden
With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profile... 详细信息
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
Adversarial Immunization for Certifiable Robustness on Graphs
arXiv
收藏 引用
arXiv 2020年
作者: Tao, Shuchang Shen, Huawei Cao, Qi Hou, Liang Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Despite achieving strong performance in semi-supervised node classification task, graph neural networks (GNNs) are vulnerable to adversarial attacks, similar to other deep learning models. Existing researches focus on... 详细信息
来源: 评论