咨询与建议

限定检索结果

文献类型

  • 294 篇 会议
  • 246 篇 期刊文献

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 343 篇 工学
    • 271 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 91 篇 信息与通信工程
    • 76 篇 电气工程
    • 34 篇 控制科学与工程
    • 33 篇 网络空间安全
    • 32 篇 生物工程
    • 29 篇 电子科学与技术(可...
    • 20 篇 光学工程
    • 18 篇 机械工程
    • 18 篇 安全科学与工程
    • 17 篇 生物医学工程(可授...
    • 14 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 144 篇 理学
    • 82 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 11 篇 化学
  • 73 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 法学
    • 15 篇 社会学
    • 10 篇 法学
  • 17 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 25 篇 federated learni...
  • 23 篇 accuracy
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 14 篇 data privacy
  • 12 篇 neural networks
  • 11 篇 image segmentati...
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 10 篇 cryptography

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 college of compu...
  • 45 篇 shandong enginee...
  • 35 篇 college of cyber...
  • 17 篇 tianjin key labo...
  • 17 篇 state key labora...
  • 16 篇 shandong fundame...
  • 14 篇 tianjin key labo...
  • 12 篇 faculty of data ...
  • 12 篇 fujian provincia...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 haihe lab of ita...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 key laboratory o...

作者

  • 16 篇 qin zhen
  • 15 篇 li tao
  • 15 篇 qin zhiguang
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 fu fang-wei
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 10 篇 xiong jinbo
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 tian youliang
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 huang shenwei
  • 8 篇 chunfu jia

语言

  • 500 篇 英文
  • 35 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
540 条 记 录,以下是101-110 订阅
排序:
A Span-based Multimodal Variational Autoencoder for Semi-supervised Multimodal Named Entity Recognition
A Span-based Multimodal Variational Autoencoder for Semi-sup...
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Zhou, Baohang Zhang, Ying Song, Kehui Guo, Wenya Zhao, Guoqing Wang, Hongbin Yuan, Xiaojie College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Mashang Consumer Finanace Co Ltd
Multimodal named entity recognition (MNER) on social media is a challenging task which aims to extract named entities in free text and incorporate images to classify them into user-defined types. The existing semi-sup... 详细信息
来源: 评论
PM2F2N: Patient Multi-view Multi-modal Feature Fusion networks for Clinical Outcome Prediction
PM2F2N: Patient Multi-view Multi-modal Feature Fusion Networ...
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Zhang, Ying Zhou, Baohang Song, Kehui Sui, Xuhui Zhao, Guoqing Jiang, Ning Yuan, Xiaojie College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Mashang Consumer Finanace Co Ltd
Clinical outcome prediction is critical to the condition prediction of patients and management of hospital capacities. There are two kinds of medical data, including time series signals recorded by various devices and... 详细信息
来源: 评论
Exploration of Teaching Method of Students’ Independent Proposition
Exploration of Teaching Method of Students’ Independent Pro...
收藏 引用
International Conference on Guidance, Navigation and Control, ICGNC 2020
作者: Zhang, Jin Wang, Lizhi Quan, Weihong Li, Haoran Gong, Xiaoli College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Aiming at obsolescence and deficiencies of the question bank in the current teaching of computer major courses, we propose a teaching method of student independent proposition, which can not only enrich the question b... 详细信息
来源: 评论
Integrating Structural Semantic Knowledge for Enhanced Information Extraction Pre-training
Integrating Structural Semantic Knowledge for Enhanced Infor...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yi, Xiaoyang Bao, Yuru Zhang, Jian Qin, Yifang Lin, Faxin College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Information Extraction (IE), aiming to extract structured information from unstructured natural language texts, can significantly benefit from pre-trained language models. However, existing pre-training methods solely... 详细信息
来源: 评论
There are finitely many 5-vertex-critical (P6, bull)-free graphs
arXiv
收藏 引用
arXiv 2025年
作者: Ju, Yiao Jooken, Jorik Goedgebeur, Jan Huang, Shenwei College of Computer Science Nankai University Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China Department of Computer Science KU Leuven Campus Kulak-Kortrijk Kortrijk8500 Belgium Department of Applied Mathematics Computer Science and Statistics Ghent University Ghent9000 Belgium School of Mathematical Sciences and LPMC Nankai University Tianjin300071 China
In this paper, we are interested in 4-colouring algorithms for graphs that do not contain an induced path on 6 vertices nor an induced bull, i.e., the graph with vertex set {v1, v2, v3, v4, v5} and edge set {v1v2, v2v... 详细信息
来源: 评论
Design and Implementation of Rumor Governance System Based on Blockchain  2
Design and Implementation of Rumor Governance System Based o...
收藏 引用
2nd International Conference on Computer Science and Blockchain, CCSB 2022
作者: Li, Yutong Song, Jiazhen Wang, Jingrong Lu, Haori Nie, Peng College of Cyber Science Nankai University Tianjin300350 China Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Nowadays, the network rumor is constantly breeding and spreading. It becomes a big difficulty to trace the source and refute the rumors with high efficiency. For this, we designed and implemented an intelligent rumor ... 详细信息
来源: 评论
Exploration on the key Issues of the Teaching Method of Student Independent Proposition
Exploration on the Key Issues of the Teaching Method of Stud...
收藏 引用
International Conference on Guidance, Navigation and Control, ICGNC 2020
作者: Zhang, Jin Quan, Weihong Li, Haoran Wang, Lizhi Gong, Xiaoli Wu, Qian College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Tianjin University of Science and Technology Tianjin China
In order to figure out the solutions to difficulties facing the university online education platform in the expansion of the question bank, this paper proposes a teaching method of student independent proposition... 详细信息
来源: 评论
Design and Implementation of Cyber Space Threat Detection System Based on User Behavioral Logs  3
Design and Implementation of Cyber Space Threat Detection Sy...
收藏 引用
3rd International Conference on Electronic Information Engineering and Computer Communication, EIECC 2023
作者: Wang, Wenhao Li, Hao Nie, Peng College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Science and Technology on Communication Networks Laboratory Shijiazhuang China College of Cyber Science Nankai University Tianjin China
In contemporary society, the role of networks in daily work and business activities is increasingly prominent. The enterprise intranet, serving as a crucial bridge for maintaining work stability, asset security, and b... 详细信息
来源: 评论
Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers’ Autofill Functionality  40
Leaky Autofill: An Empirical Study on the Privacy Threat of ...
收藏 引用
40th Annual Computer security Applications Conference, ACSAC 2024
作者: Fu, Yanduo Wang, Ding College of Cyber Science Nankai University Tianjin300350 China Ministry of Education Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
Password managers (PMs) provide users with convenient and robust functionalities to manage their credentials, highly recommended by security experts and major standard bodies. One of the most popular features is the a... 详细信息
来源: 评论
Design and Implementation of Analyzer Management System Based on Elasticsearch  19th
Design and Implementation of Analyzer Management System Ba...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Sun, Jingqi Nie, Peng Xu, Licheng Zhang, Haiwei College of Cyber Science Nankai University Tianjin300350 China College of Computer Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Elasticsearch is one of the most popular full-text search and analytics engine. It can store, search, and analyze big volumes of data in near real time. Before searching, Elasticsearch will build multiple inverted ind... 详细信息
来源: 评论