咨询与建议

限定检索结果

文献类型

  • 484 篇 期刊文献
  • 431 篇 会议
  • 1 册 图书

馆藏范围

  • 916 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 650 篇 工学
    • 421 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 163 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 65 篇 控制科学与工程
    • 50 篇 电气工程
    • 47 篇 光学工程
    • 41 篇 机械工程
    • 30 篇 仪器科学与技术
    • 30 篇 网络空间安全
    • 27 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 21 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 367 篇 理学
    • 182 篇 数学
    • 120 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 182 篇 管理学
    • 100 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 31 篇 医学
    • 25 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 29 篇 deep learning
  • 28 篇 semantics
  • 15 篇 wireless sensor ...
  • 13 篇 training
  • 12 篇 feature extracti...
  • 12 篇 information retr...
  • 11 篇 reinforcement le...
  • 11 篇 authentication
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 federated learni...
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 9 篇 accuracy
  • 9 篇 quantum cryptogr...

机构

  • 92 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 28 篇 cas key lab of n...
  • 22 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 beijing electron...
  • 18 篇 institute of qua...
  • 18 篇 key lab of broad...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 10 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 117 篇 guo jiafeng
  • 111 篇 cheng xueqi
  • 53 篇 zhang ruqing
  • 53 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 20 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 liu yu-an
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.

语言

  • 786 篇 英文
  • 114 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
916 条 记 录,以下是431-440 订阅
排序:
Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices
Security of Medical Cyber-physical Systems: An Empirical Stu...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Zhiqiang Wang Pingchuan Ma Xiaoxiang Zou Jianyi Zhang Tao Yang Beijing Electronic Science and Technology Institute State Information Center National Computer Network Emergency Response Technical Team/Coordination Center of China Key Lab of Information Network Security Ministry of Public Security
Recent years have witnessed a boom of connected medical devices, which brings security issues in the meantime. Medical imaging devices, an essential part of medical cyber-physical systems, play a vital role in modern ... 详细信息
来源: 评论
Exact Decomposition of Joint Low Rankness and Local Smoothness Plus Sparse Matrices
arXiv
收藏 引用
arXiv 2022年
作者: Peng, Jiangjun Wang, Yao Zhang, Hongying Wang, Jianjun Meng, Deyu School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Shaan'xi Xi’an710049 China The Center for Intelligent Decision-making and Machine Learning School of Management Xian Jiaotong University Shaan'xi Xi’an China The College of Artificial Intelligence Southwest University Chongqing400715 China Macau Institute of Systems Engineering Macau University of Science and Technology Taipa China
It is known that the decomposition in low-rank and sparse matrices (L+S for short) can be achieved by several Robust PCA techniques. Besides the low rankness, the local smoothness (LSS) is a vitally essential prior fo... 详细信息
来源: 评论
A conditional-probability zone transformation coding method for categorical features  19
A conditional-probability zone transformation coding method ...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: He, Liang Shen, Chao Li, Yun National Key Laboratory of Science and Technology on Blind Signal Processing Chengdu Sichuan China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'an China
It has been a key issue for solving problems efficiently by machine learning models with code categorical features. The state-of-the-art one-hot coding is a widely accepted method to convert the categorical features i... 详细信息
来源: 评论
Optimization from Structured Samples for Coverage Functions
arXiv
收藏 引用
arXiv 2020年
作者: Chen, Wei Sun, Xiaoming Zhang, Jialin Zhang, Zhijie Microsoft Research Asia Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
We revisit the optimization from samples (OPS) model, which studies the problem of optimizing objective functions directly from the sample data. Previous results showed that we cannot obtain a constant approximation r... 详细信息
来源: 评论
YOLO_v3-Based Pulmonary Nodules Recognition System
YOLO_v3-Based Pulmonary Nodules Recognition System
收藏 引用
作者: Wenhao Deng Zhiqiang Wang Xiaorui Ren Xusheng Zhang Bing Wang Tao Yang Guangdong Hangyu Satellite Technology Co. Ltd. State Information Center Beijing Electronic Science and Technology Institute Key Lab of Information Network Security Ministry of Public Security
The incidence of pneumonia and lung cancer is high in *** CT images are widely used in the screening and adjuvant treatment of lung diseases due to their advantages of a thin layer, high definition, and low *** manual... 详细信息
来源: 评论
Climatic and Biotic Controls of Evapotranspiration Across Grassland Ecosystems on Tibetan Plateau
SSRN
收藏 引用
SSRN 2024年
作者: Peng, Siyuan Yang, Yue Luo, Dengnan Zeng, Xiang Liang, Minqi Tao, Long Zhang, Guangru Li, Pan Liao, Weijie Guo, Qun Cao, Ruochen Li, Yuzhe Zhang, Weirong Hu, Zhongmin School of Geography South China Normal University Shipai Campus Guangzhou510631 China Hainan Baoting Tropical Rainforest Ecosystem Observation and Research Station Key Laboratory of Agro-Forestry Environmental Processes and Ecological Regulation School of Ecology and Environment Hainan University Haikou570228 China Center for Eco-Environment Restoration Engineering of Hainan Province Hainan University Haikou570228 China Facility of Geographical Science Beijing Normal University Beijing100875 China Zhuhai Branch of State Key Laboratory of Earth Surface Processes and Resource Ecology Beijing Normal University Zhuhai519087 China School of Atmospheric Sciences Guangdong Province Data Center of Terrestrial and Marine Ecosystems Carbon Cycle Sun Yat-sen University Guangdong Zhuhai510245 China Key Lab of Ecosystem Network Observation and Modeling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing100101 China College of Resources and Environment University of Chinese Academy of Sciences Beijing101408 China International Institute for Earth System Sciences Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application Nanjing University Jiangsu210023 China Jiangsu Provincial Key Laboratory of Geographic Information Science and Technology Key Laboratory for Land Satellite Remote Sensing Applications of Ministry of Natural Resources School of Geography and Ocean Science Nanjing University Jiangsu210023 China Key Laboratory of Land Surface Pattern and Simulation Institute of Geographical Sciences and Natural Resources Research Chinese Academy of Sciences Beijing China
Understanding the spatial variations of evapotranspiration (ET) and its components on Tibetan Plateau (TP) is pivotal for grasping the regional water cycle and energy balance dynamics. Yet it is unclear how the change... 详细信息
来源: 评论
GraphWGAN: Graph Representation Learning with Wasserstein Generative Adversarial networks
GraphWGAN: Graph Representation Learning with Wasserstein Ge...
收藏 引用
International Conference on Big Data and Smart Computing (BIGCOMP)
作者: Rong Yan Huawei Shen Cao Qi Keting Cen Li Wang College of Big Data Taiyuan University Of Technology Taiyuan China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute of Computing Technology Beijing China
Graph representation learning aims to represent vertices as low-dimensional and real-valued vectors to facilitate subsequent downstream tasks, i.e., node classification, link predictions. Recently, some novel graph re... 详细信息
来源: 评论
Sharding for Blockchain based Mobile Edge Computing System: A Deep Reinforcement Learning Approach
Sharding for Blockchain based Mobile Edge Computing System: ...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Shijing Yuan Jie Li Jinghao Liang Yuxuan Zhu Xiang Yu Jianping Chen Chentao Wu Shanghai Jiao Tong University China Zhejiang Lab Research Center for Intelligent Network China University of Michigan-Shanghai Jiao Tong University Joint Institute Shanghai Jiao Tong University China Jiangsu Key Laboratory of Intelligent Building Energy Efficiency Suzhou University of Science and Technology China
With the growth of data scale in the mobile edge computing (MEC) network, data security of the MEC network has become a burning concern. The application of blockchain technology in MEC enhances data security and priva... 详细信息
来源: 评论
Ranking enhanced dialogue generation
arXiv
收藏 引用
arXiv 2020年
作者: Hao, Changying Pang, Liang Lan, Yanyan Sun, Fei Guo, Jiafeng Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China
How to effectively utilize the dialogue history is a crucial problem in multi-turn dialogue generation. Previous works usually employ various neural network architectures (e.g., recurrent neural networks, attention me... 详细信息
来源: 评论
Device-independent quantum secure direct communication against collective attacks
收藏 引用
science Bulletin 2020年 第1期65卷 12-20,M0003页
作者: Lan Zhou Yu-Bo Sheng Gui-Lu Long School of Science Nanjing University of Posts and TelecommunicationsNanjing 210003China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China State Key Laboratory of Low-dimensional Quantum Physics Beijing 100084China Department of Physics Tsinghua UniversityBeijing 100084China
"Device-independent"not only represents a relaxation of the security assumptions about the internal working of the quantum devices,but also can enhance the security of the quantum *** the paper,we put forwar... 详细信息
来源: 评论