咨询与建议

限定检索结果

文献类型

  • 3,627 篇 期刊文献
  • 2,477 篇 会议
  • 4 册 图书

馆藏范围

  • 6,108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,819 篇 工学
    • 2,506 篇 计算机科学与技术...
    • 2,033 篇 软件工程
    • 896 篇 信息与通信工程
    • 507 篇 电气工程
    • 475 篇 生物工程
    • 405 篇 控制科学与工程
    • 368 篇 电子科学与技术(可...
    • 283 篇 光学工程
    • 273 篇 生物医学工程(可授...
    • 222 篇 机械工程
    • 202 篇 化学工程与技术
    • 199 篇 仪器科学与技术
    • 139 篇 动力工程及工程热...
    • 134 篇 核科学与技术
    • 133 篇 网络空间安全
    • 130 篇 力学(可授工学、理...
    • 127 篇 交通运输工程
  • 2,866 篇 理学
    • 1,472 篇 物理学
    • 1,040 篇 数学
    • 558 篇 生物学
    • 393 篇 统计学(可授理学、...
    • 263 篇 化学
    • 158 篇 地球物理学
    • 138 篇 系统科学
  • 884 篇 管理学
    • 497 篇 管理科学与工程(可...
    • 435 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 246 篇 医学
    • 215 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 129 篇 法学
  • 65 篇 经济学
  • 63 篇 农学
  • 35 篇 教育学
  • 19 篇 文学
  • 13 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 228 篇 bosons
  • 186 篇 feature extracti...
  • 153 篇 hadron colliders
  • 146 篇 semantics
  • 142 篇 training
  • 128 篇 deep learning
  • 126 篇 computational mo...
  • 119 篇 accuracy
  • 117 篇 data models
  • 92 篇 federated learni...
  • 77 篇 machine learning
  • 76 篇 neural networks
  • 72 篇 convolution
  • 68 篇 predictive model...
  • 65 篇 data mining
  • 65 篇 robustness
  • 64 篇 photons
  • 59 篇 deep neural netw...
  • 59 篇 generative adver...
  • 59 篇 optimization

机构

  • 896 篇 yerevan physics ...
  • 875 篇 centro brasileir...
  • 851 篇 university of de...
  • 849 篇 charles universi...
  • 844 篇 department of ph...
  • 822 篇 institute rudjer...
  • 816 篇 university of so...
  • 804 篇 helsinki institu...
  • 795 篇 academy of scien...
  • 789 篇 rwth aachen univ...
  • 786 篇 university of cy...
  • 777 篇 institute of hig...
  • 771 篇 university of sp...
  • 767 篇 indian institute...
  • 758 篇 national and kap...
  • 747 篇 ghent university...
  • 743 篇 infn sezione di ...
  • 743 篇 deutsches elektr...
  • 742 篇 vrije universite...
  • 739 篇 panjab universit...

作者

  • 585 篇 lowette s.
  • 584 篇 waltenberger w.
  • 530 篇 tavernier s.
  • 506 篇 lemaitre v.
  • 502 篇 adam w.
  • 500 篇 skovpen k.
  • 500 篇 schieck j.
  • 498 篇 sznajder a.
  • 496 篇 tytgat m.
  • 491 篇 vannerom d.
  • 488 篇 tumasyan a.
  • 481 篇 alves g.a.
  • 472 篇 delaere c.
  • 471 篇 jeitler m.
  • 465 篇 van mechelen p.
  • 464 篇 giammanco a.
  • 452 篇 moraes a.
  • 449 篇 carvalho w.
  • 440 篇 delcourt m.
  • 439 篇 wulz c.-e.

语言

  • 4,808 篇 英文
  • 1,214 篇 其他
  • 112 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
6108 条 记 录,以下是121-130 订阅
排序:
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV
A Pseudonym Exchange-Based Traceable Location Privacy Protec...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ma, Weigang Yu, Yaping Wang, Yichuan Liu, Xiaoxue Wang, Zhoukai School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Internet of Vehicles (IoV) is a network built by communicating entities such as vehicles and roadside infrastructure, etc. The entities can communicate with each other, sharing data and providing services. However, th... 详细信息
来源: 评论
Distributed Routing and data Scheduling in IPNs With GNN-Based Multiagent DRL
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21565-21576页
作者: Zhou, Xixuan Xu, Ruoyu Tian, Xiaojian Zhang, Yueyue Liang, Yu Chen, Xiaoliang Zhu, Zuqing University of Science and Technology of China School of Information Science and Technology Hefei230027 China Eastview Secondary School BarrieONL4M 5S1 Canada Shanghai Satellite Network Research Institute Shanghai200120 China Shanghai Key Laboratory of Satellite Network Shanghai200120 China
As deep space exploration missions grow in complexity, efficient data transfer in interplanetary networks (IPNs) becomes paramount. However, the vast distances, limited bandwidth, and dynamic nature of IPNs pose signi... 详细信息
来源: 评论
Video Summarization Using Denoising Diffusion Probabilistic Model  39
Video Summarization Using Denoising Diffusion Probabilistic ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Shang, Zirui Zhu, Yubo Li, Hongxi Yang, Shuo Wu, Xinxiao Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China
Video summarization aims to eliminate visual redundancy while retaining key parts of video to construct concise and comprehensive synopses. Most existing methods use discriminative models to predict the importance sco... 详细信息
来源: 评论
Design and implementation of handlebar defect detection method based on machine recognition
Design and implementation of handlebar defect detection meth...
收藏 引用
2024 International Conference on Computer Graphics, Artificial Intelligence, and data Processing, ICCAID 2024
作者: Zhang, Tong Ren, Sunan Zhang, Wenjing Liu, Yajun School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China
As an important part of electric vehicles, handlebar installation defects are an important factor in the failure of electric vehicles. In the production process, many large-scale manufacturers still assemble the handl... 详细信息
来源: 评论
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and Computer science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
Self-Evaluation of Large Language Model based on Glass-box F...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
Generating Adversarial Patterns in Facial Recognition with Visual Camouflage
收藏 引用
Journal of Shanghai Jiaotong University (science) 2024年 1-12页
作者: Bao, Qirui Mei, Haiyang Wei, Huilin Lü, Zheng Wang, Yuxin Yang, Xin Key Laboratory of Social Computing and Cognitive Intelligence of Ministry of Education School of Control Science and EngineeringSchool of Computer Science and Technology Dalian University of Technology Liaoning Dalian116024 China Systems Engineering Institute Academy of Military Sciences Beijing100141 China
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ... 详细信息
来源: 评论
Camera-Invariant Meta-Learning network for Single-Camera-Training Person Reidentification
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 22381-22392页
作者: Pei, Jiangbo Jiang, Zhuqing Men, Aidong Wang, Haiying Luo, Haiyong Wen, Shiping Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System and Network Culture School of Artificial Intelligence Beijing100876 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Australian AI Institute Faculty of Engineering and Information Technology University of Technology Sydney UltimoNSW2007 Australia
Single-camera-training person reidentification (SCT re-ID) aims to train a reidentification (re-ID) model using single-camera-training (SCT) datasets where each person appears in only one camera. The main challenge of... 详细信息
来源: 评论
Adversarial Attacks Against Black-Box network Intrusion Detection Based on Heuristic Algorithm  10
Adversarial Attacks Against Black-Box Network Intrusion Dete...
收藏 引用
10th International Conference on Computer and Communications, ICCC 2024
作者: Liu, Ning Wu, Huijuan Zhang, Yuchen Wang, Changji School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu China
Machine learning has become an increasingly utilized approach for developing network Intrusion Detection Systems (NIDS) for identifying anomalies associated with malicious network intrusions. Even in a black-box attac... 详细信息
来源: 评论
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论