咨询与建议

限定检索结果

文献类型

  • 3,518 篇 期刊文献
  • 2,358 篇 会议
  • 4 册 图书

馆藏范围

  • 5,880 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,660 篇 工学
    • 2,391 篇 计算机科学与技术...
    • 1,965 篇 软件工程
    • 856 篇 信息与通信工程
    • 469 篇 生物工程
    • 454 篇 电气工程
    • 360 篇 控制科学与工程
    • 354 篇 电子科学与技术(可...
    • 277 篇 光学工程
    • 266 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 199 篇 化学工程与技术
    • 185 篇 仪器科学与技术
    • 136 篇 动力工程及工程热...
    • 131 篇 核科学与技术
    • 128 篇 力学(可授工学、理...
    • 120 篇 交通运输工程
    • 114 篇 网络空间安全
  • 2,810 篇 理学
    • 1,453 篇 物理学
    • 1,025 篇 数学
    • 547 篇 生物学
    • 387 篇 统计学(可授理学、...
    • 249 篇 化学
    • 152 篇 地球物理学
    • 137 篇 系统科学
  • 850 篇 管理学
    • 472 篇 管理科学与工程(可...
    • 422 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 236 篇 医学
    • 204 篇 临床医学
    • 170 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 125 篇 法学
  • 63 篇 经济学
  • 59 篇 农学
  • 27 篇 教育学
  • 19 篇 文学
  • 13 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 227 篇 bosons
  • 171 篇 feature extracti...
  • 153 篇 hadron colliders
  • 139 篇 semantics
  • 129 篇 training
  • 124 篇 deep learning
  • 113 篇 computational mo...
  • 108 篇 data models
  • 97 篇 accuracy
  • 73 篇 machine learning
  • 72 篇 neural networks
  • 69 篇 convolution
  • 66 篇 predictive model...
  • 66 篇 federated learni...
  • 64 篇 photons
  • 60 篇 data mining
  • 58 篇 generative adver...
  • 56 篇 deep neural netw...
  • 55 篇 robustness
  • 52 篇 optimization

机构

  • 891 篇 yerevan physics ...
  • 870 篇 centro brasileir...
  • 845 篇 university of de...
  • 844 篇 charles universi...
  • 840 篇 department of ph...
  • 817 篇 institute rudjer...
  • 811 篇 university of so...
  • 799 篇 helsinki institu...
  • 786 篇 rwth aachen univ...
  • 781 篇 academy of scien...
  • 781 篇 university of cy...
  • 773 篇 institute of hig...
  • 765 篇 university of sp...
  • 758 篇 indian institute...
  • 747 篇 national and kap...
  • 745 篇 ghent university...
  • 738 篇 vrije universite...
  • 736 篇 deutsches elektr...
  • 735 篇 infn sezione di ...
  • 732 篇 universidad san ...

作者

  • 578 篇 lowette s.
  • 577 篇 waltenberger w.
  • 523 篇 tavernier s.
  • 501 篇 lemaitre v.
  • 496 篇 adam w.
  • 494 篇 skovpen k.
  • 494 篇 schieck j.
  • 493 篇 sznajder a.
  • 491 篇 tytgat m.
  • 486 篇 vannerom d.
  • 484 篇 tumasyan a.
  • 477 篇 alves g.a.
  • 467 篇 delaere c.
  • 466 篇 jeitler m.
  • 461 篇 giammanco a.
  • 458 篇 van mechelen p.
  • 451 篇 moraes a.
  • 446 篇 carvalho w.
  • 441 篇 delcourt m.
  • 438 篇 wulz c.-e.

语言

  • 5,477 篇 英文
  • 308 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
5880 条 记 录,以下是81-90 订阅
排序:
Never Lost keys:A Novel key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
收藏 引用
China Communications 2022年 第7期19卷 172-184页
作者: Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei School of computer science and Engineering Xi’an University of TechnologyXi’an 710048China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an 710048China
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a... 详细信息
来源: 评论
Adversarial Learning data Augmentation for Graph Contrastive Learning in Recommendation  28th
Adversarial Learning Data Augmentation for Graph Contrastiv...
收藏 引用
28th International Conference on database Systems for Advanced Applications, DASFAA 2023
作者: Huang, Junjie Cao, Qi Xie, Ruobing Zhang, Shaoliang Xia, Feng Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China WeChat Tencent Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Recently, Graph Neural networks (GNNs) achieve remarkable success in Recommendation. To reduce the influence of data sparsity, Graph Contrastive Learning (GCL) is adopted in GNN-based CF methods for enhancing performa... 详细信息
来源: 评论
An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 2293-2309页
作者: Gang Xu Xinyu Fan Xiu-Bo Chen Xin Liu Zongpeng Li Yanhui Mao Kejia Zhang School of Information Science and Technology North China University of TechnologyBeijing100144China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing100876China School of Mathematical Science Heilongjiang UniversityHarbin150080China School of Digtial and Intelligence Industry Inner Mongolia University of Science and TechnologyBaotou014010China Institute for Network Sciences and Cyberspace Tsinghua UniversityBeijing100084China Yunnan Key Laboratory of Blockchain Application Technology Kunming650233China Yunnan Innovation Institute of Beihang University Kunming650233China
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern... 详细信息
来源: 评论
Boosting Meaningful Dependency Mining with Clustering and Covariance Analysis  40
Boosting Meaningful Dependency Mining with Clustering and Co...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Wang, Xi Jin, Ruochun Huang, Wanrong Tang, Yuhua Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Computer Science and Technology Department of Intelligent Data Science National University of Defense Technology Changsha China
Functional dependencies (FDs) form a valuable ingredient for various data management tasks. However, existing methods can hardly discover practical and interpretable FDs, especially in large noisy real-life datasets. ... 详细信息
来源: 评论
Learning to represent 2D human face with mathematical model
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第1期9卷 54-68页
作者: Liping Zhang Weijun Li Linjun Sun Lina Yu Xin Ning Xiaoli Dong AnnLab Institute of SemiconductorsChinese Academy of SciencesBeijingChina Center of Materials Science and Optoelectronics Engineering School of Integrated CircuitsUniversity of Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology BeijingChina
How to represent a human face pattern?While it is presented in a continuous way in human visual system,computers often store and process it in a discrete manner with 2D arrays of *** authors attempt to learn a continu... 详细信息
来源: 评论
MetaSLRCL: A Self-Adaptive Learning Rate and Curriculum Learning Based Framework for Few-Shot Text Classification  29
MetaSLRCL: A Self-Adaptive Learning Rate and Curriculum Lear...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Zhao, Kailin Jin, Xiaolong Guan, Saiping Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesSchool of Computer Science and Technology University of Chinese Academy of Sciences
Due to the lack of labeled data in many realistic scenarios, a number of few-shot learning methods for text classification have been proposed, among which the meta learning based ones have recently attracted much atte... 详细信息
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big data and Privacy computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
Credit assignment for trained neural networks based on Koopman operator theory
收藏 引用
Frontiers of Computer science 2024年 第1期18卷 251-253页
作者: Zhen LIANG Changyuan ZHAO Wanwei LIU Bai XUE Wenjing YANG Zhengbin PANG Institute for Quantum Information&State Key Laboratory of High Performance Computing National University of Defense TechnologyChangsha 410000China Institute of Software Chinese Academy of SciencesBeijing 100190China College of Computer Science and Technology National University of Defense TechnologyChangsha 410000China
1 Introduction Artificial neural networks(ANNs,also NNs)have recently emerged as leading candidate models for deep learning,popularly used in various areas[1–3].Behind the enormous success,ANNs are generally with com... 详细信息
来源: 评论
Temporal Knowledge Graph Question Answering: A Survey
arXiv
收藏 引用
arXiv 2024年
作者: Su, Miao Li, Zixuan Chen, Zhuo Bai, Long Jin, Xiaolong Guo, Jiafeng CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Knowledge Base Question Answering (KBQA) has been a long-standing field to answer questions based on knowledge bases. Recently, the evolving dynamics of knowledge have attracted a growing interest in Temporal Knowledg... 详细信息
来源: 评论
AutoQNN: An End-to-End Framework for Automatically Quantizing Neural networks
收藏 引用
Journal of Computer science & technology 2024年 第2期39卷 401-420页
作者: 龚成 卢冶 代素蓉 邓倩 杜承昆 李涛 College of Software Nankai UniversityTianjin 300350China College of Computer Science Nankai UniversityTianjin 300350China State Key Laboratory of Processors Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China
Exploring the expected quantizing scheme with suitable mixed-precision policy is the key to compress deep neural networks(DNNs)in high efficiency and *** exploration implies heavy workloads for domain experts,and an a... 详细信息
来源: 评论