咨询与建议

限定检索结果

文献类型

  • 3,586 篇 期刊文献
  • 2,343 篇 会议
  • 4 册 图书

馆藏范围

  • 5,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,745 篇 工学
    • 2,442 篇 计算机科学与技术...
    • 1,996 篇 软件工程
    • 878 篇 信息与通信工程
    • 510 篇 电气工程
    • 470 篇 生物工程
    • 378 篇 控制科学与工程
    • 363 篇 电子科学与技术(可...
    • 282 篇 光学工程
    • 267 篇 生物医学工程(可授...
    • 222 篇 机械工程
    • 203 篇 化学工程与技术
    • 187 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 134 篇 核科学与技术
    • 131 篇 交通运输工程
    • 129 篇 力学(可授工学、理...
    • 127 篇 网络空间安全
  • 2,844 篇 理学
    • 1,461 篇 物理学
    • 1,045 篇 数学
    • 553 篇 生物学
    • 400 篇 统计学(可授理学、...
    • 254 篇 化学
    • 153 篇 地球物理学
    • 141 篇 系统科学
  • 871 篇 管理学
    • 487 篇 管理科学与工程(可...
    • 431 篇 图书情报与档案管...
    • 147 篇 工商管理
  • 244 篇 医学
    • 211 篇 临床医学
    • 175 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 128 篇 法学
  • 65 篇 经济学
  • 63 篇 农学
  • 30 篇 教育学
  • 19 篇 文学
  • 14 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 227 篇 bosons
  • 171 篇 feature extracti...
  • 153 篇 hadron colliders
  • 141 篇 semantics
  • 133 篇 training
  • 125 篇 deep learning
  • 115 篇 computational mo...
  • 108 篇 data models
  • 96 篇 accuracy
  • 73 篇 neural networks
  • 72 篇 machine learning
  • 70 篇 convolution
  • 69 篇 federated learni...
  • 68 篇 predictive model...
  • 64 篇 photons
  • 60 篇 data mining
  • 59 篇 generative adver...
  • 55 篇 deep neural netw...
  • 55 篇 robustness
  • 50 篇 image segmentati...

机构

  • 892 篇 yerevan physics ...
  • 871 篇 centro brasileir...
  • 846 篇 university of de...
  • 844 篇 charles universi...
  • 840 篇 department of ph...
  • 818 篇 institute rudjer...
  • 813 篇 university of so...
  • 800 篇 helsinki institu...
  • 785 篇 rwth aachen univ...
  • 781 篇 academy of scien...
  • 781 篇 university of cy...
  • 774 篇 institute of hig...
  • 764 篇 university of sp...
  • 761 篇 indian institute...
  • 750 篇 national and kap...
  • 746 篇 ghent university...
  • 739 篇 infn sezione di ...
  • 739 篇 vrije universite...
  • 738 篇 panjab universit...
  • 737 篇 deutsches elektr...

作者

  • 580 篇 lowette s.
  • 579 篇 waltenberger w.
  • 525 篇 tavernier s.
  • 503 篇 lemaitre v.
  • 500 篇 adam w.
  • 498 篇 skovpen k.
  • 497 篇 schieck j.
  • 496 篇 sznajder a.
  • 494 篇 tytgat m.
  • 488 篇 vannerom d.
  • 487 篇 tumasyan a.
  • 476 篇 alves g.a.
  • 469 篇 delaere c.
  • 468 篇 jeitler m.
  • 463 篇 giammanco a.
  • 461 篇 van mechelen p.
  • 455 篇 moraes a.
  • 448 篇 carvalho w.
  • 441 篇 delcourt m.
  • 440 篇 wulz c.-e.

语言

  • 5,518 篇 英文
  • 322 篇 其他
  • 105 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
5933 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
A fully connected polarization-entangled network via integrated spontaneous four-wave mixing engineering
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第6期Mechanics & Astronomy) .卷 76-83页
作者: Pingyu Zhu Yan Wang Yuxing Du Miaomiao Yu Kaikai Zhang Kun Wang Ping Xu Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and TechnologyNational University of Defense Technology Hefei National Laboratory
Quantum communication is rapidly developing and is gradually being commercialized due to its technological maturity. Establishing dense communication links among multiple users in a scalable and efficient way is of gr... 详细信息
来源: 评论
A data representation method using distance correlation
收藏 引用
Frontiers of Computer science 2025年 第1期19卷 1-14页
作者: Xinyan LIANG Yuhua QIAN Qian GUO keyin ZHENG Institute of Big Data Science and Industry Shanxi UniversityTaiyuan 030006China Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education Shanxi UniversityTaiyuan 030006China School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and TechnologyTaiyuan 030024China
Association in-between features has been demonstrated to improve the representation ability of data. However, the original association data reconstruction method may face two issues: the dimension of reconstructed dat... 详细信息
来源: 评论
Inductive Link Prediction in N-ary Knowledge Graphs  31
Inductive Link Prediction in N-ary Knowledge Graphs
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
N-ary Knowledge Graphs (NKGs), where a fact can involve more than two entities, have gained increasing attention. Link Prediction in NKGs (LPN) aims to predict missing elements in facts to facilitate the completion of... 详细信息
来源: 评论
Large Language Model-Based Event Relation Extraction with Rationales  31
Large Language Model-Based Event Relation Extraction with Ra...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Hu, Zhilei Li, Zixuan Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesSchool of Computer Science and Technology University of Chinese Academy of Sciences
Event Relation Extraction (ERE) aims to extract various types of relations between different events within texts. Although Large Language Models (LLMs) have demonstrated impressive capabilities in many natural languag... 详细信息
来源: 评论
Machine learning empowered UAV-based beamforming design in ISAC systems
收藏 引用
science China(Information sciences) 2025年 第5期68卷 285-286页
作者: Xiangyang DUAN Xiaoqi ZHANG Shuqiang XIA Zhongbin WANG Yihua MA Weijie YUAN State Key Laboratory of Mobile Network and Mobile Multimedia Technology Wireless and Computing Research InstituteZTE Corporation School of Electrical and Data Engineering University of Technology Sydney School of Automation and Intelligent Manufacturing Southern University of Science and Technology
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the...
来源: 评论
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
Revisiting SGX-Based Encrypted Deduplication via PoW-Before-Encryption and Eliminating Redundant Computations
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2037-2053页
作者: Ha, Guanxiong Ge, Xiaowei Jia, Chunfu Chen, Yuchen Su, Zhen Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Dissec Tianjin300350 China
Encrypted deduplication is attractive for outsourced storage as it provides both data confidentiality and storage savings. Conventional encrypted deduplication schemes protect data confidentiality based on expensive c... 详细信息
来源: 评论
Edge-Cloud Cooperation-Driven Intelligent Sustainability Evaluation Strategy Based on IoT and CPS for Energy-Intensive Manufacturing Industries
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12287-12297页
作者: Ma, Shuaiyin Huang, Yuming Chen, Yanping Xiao, Qinge Xu, Jun Leng, Jiewu Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an Key Laboratory of Big Data and Intelligent Computing School of Computer Science and Technology Xi’an710121 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Xidian University Advanced Manufacturing Technology Innovation Center Guangzhou Institute of Technology Guangzhou510555 China Guangdong University of Technology Guangdong Provincial Key Laboratory of Computer Integrated Manufacturing System State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment Guangzhou510006 China
The advancement of the Industry 5.0 in information technology has led to increased interest in integrating edge-cloud cooperation with Internet of Things (IoT) and cyber-physical system (CPS) designs. This integration... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论