咨询与建议

限定检索结果

文献类型

  • 198 篇 期刊文献
  • 176 篇 会议

馆藏范围

  • 374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 205 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 54 篇 信息与通信工程
    • 35 篇 生物工程
    • 18 篇 控制科学与工程
    • 11 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 10 篇 光学工程
    • 7 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 机械工程
    • 4 篇 安全科学与工程
  • 132 篇 理学
    • 77 篇 数学
    • 36 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 10 篇 化学
    • 8 篇 系统科学
  • 105 篇 管理学
    • 81 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 12 篇 法学
    • 10 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 文学
    • 3 篇 中国语言文学
    • 3 篇 外国语言文学

主题

  • 19 篇 semantics
  • 13 篇 deep learning
  • 11 篇 knowledge graph
  • 11 篇 graph neural net...
  • 10 篇 information retr...
  • 9 篇 convolution
  • 8 篇 generative adver...
  • 8 篇 forecasting
  • 8 篇 training
  • 7 篇 machine learning
  • 6 篇 learning systems
  • 6 篇 computational mo...
  • 6 篇 feature extracti...
  • 5 篇 conferences
  • 5 篇 deep neural netw...
  • 5 篇 signal encoding
  • 5 篇 computational li...
  • 5 篇 natural language...
  • 4 篇 surveys
  • 4 篇 computer archite...

机构

  • 127 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 23 篇 school of comput...
  • 17 篇 data intelligenc...
  • 12 篇 key lab. of inte...
  • 12 篇 institute for ai...
  • 11 篇 school of comput...
  • 11 篇 institute of com...
  • 10 篇 state key lab of...
  • 9 篇 key laboratory o...
  • 7 篇 key lab of intel...
  • 7 篇 peng cheng labor...
  • 7 篇 school of cyber ...
  • 6 篇 data intelligenc...
  • 6 篇 semiconductor ne...
  • 6 篇 alibaba group
  • 5 篇 data intelligenc...
  • 5 篇 institute of inf...
  • 5 篇 key laboratory o...

作者

  • 134 篇 cheng xueqi
  • 103 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 40 篇 shen huawei
  • 35 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 jin xiaolong
  • 28 篇 zhang ruqing
  • 22 篇 cao qi
  • 18 篇 xu jun
  • 17 篇 guan saiping
  • 17 篇 bai long
  • 16 篇 li zixuan
  • 14 篇 xueqi cheng
  • 13 篇 sun xiaoming
  • 10 篇 hou liang
  • 9 篇 huang qingming
  • 9 篇 huang junjie
  • 9 篇 chen wei
  • 8 篇 liu shenghua

语言

  • 354 篇 英文
  • 18 篇 其他
  • 2 篇 中文
检索条件"机构=CAS Key Lab of Network Data Science and Technology Institute of Computing Technology"
374 条 记 录,以下是111-120 订阅
排序:
HiSMatch: Historical Structure Matching based Temporal Knowledge Graph Reasoning
arXiv
收藏 引用
arXiv 2022年
作者: Li, Zixuan Hou, Zhongni Guan, Saiping Jin, Xiaolong Peng, Weihua Bai, Long Lyu, Yajuan Li, Wei Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Baidu Inc China
A Temporal Knowledge Graph (TKG) is a sequence of KGs with respective timestamps, which adopts quadruples in the form of (subject, relation, object, timestamp) to describe dynamic facts. TKG reasoning has facilitated ... 详细信息
来源: 评论
Complex Evolutional Pattern Learning for Temporal Knowledge Graph Reasoning
arXiv
收藏 引用
arXiv 2022年
作者: Li, Zixuan Guan, Saiping Jin, Xiaolong Peng, Weihua Lyu, Yajuan Zhu, Yong Bai, Long Li, Wei Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Baidu Inc China
A Temporal Knowledge Graph (TKG) is a sequence of KGs corresponding to different timestamps. TKG reasoning aims to predict potential facts in the future given the historical KG sequences. One key of this task is to mi... 详细信息
来源: 评论
A commentary of Digital contact tracing in MIT technology Review 2021
收藏 引用
Fundamental Research 2021年 第6期1卷 838-839页
作者: Xueqi Cheng CAS Key Laboratory of Network Data Science and Technology Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China
In 2020,the COVID-19 pandemic has brought“digital contact tracing”to the forefront of public *** the context of COVID-19,technology has offered public health investigators a new capability for locating infected indi... 详细信息
来源: 评论
Unifying and Improving Graph Convolutional Neural networks with Wavelet Denoising Filters  23
Unifying and Improving Graph Convolutional Neural Networks w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wan, Liangtian Li, Xiaona Han, Huijin Yan, Xiaoran Sun, Lu Ning, Zhaolong Xia, Feng Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Research Center of Big Data Intelligence Research Institute of Artificial Intelligence Zhejiang Lab Hangzhou China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian China School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Computing Technologies Rmit University Melbourne Australia
Graph convolutional neural network (GCN) is a powerful deep learning framework for network data. However, variants of graph neural architectures can lead to drastically different performance on different tasks. Model ... 详细信息
来源: 评论
Continuous Distributed Processing of Software Defined Radar
Continuous Distributed Processing of Software Defined Radar
收藏 引用
2021 CIE International Conference on Radar, Radar 2021
作者: Li, Bing Qiu, Qiang Gong, Shiqi Liu, Yongjun Lei, Yu Institute of Computing Technology CAS Key Lab of Network Data Science and Technology Chinese Academy of Sciences Beijing China State Key Laboratory of Internet of Things for Smart City University of Macau Macau China Xidian University National Laboratory of Radar Signal Processing Xi'an China Golaxy Data Technology Co. Ltd. Beijing China
Software-defined radar has been an active research field for more than ten years. However, the low performance and low scalability of the traditional processing techniques of SDR make it hard to deal with complex rada... 详细信息
来源: 评论
Adversarial Camouflage for Node Injection Attack on Graphs
arXiv
收藏 引用
arXiv 2022年
作者: Tao, Shuchang Cao, Qi Shen, Huawei Wu, Yunfan Hou, Liang Sun, Fei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Node injection attacks on Graph Neural networks (GNNs) have received increasing attention recently, due to their ability to degrade GNN performance with high attack success rates. However, our study indicates that the... 详细信息
来源: 评论
Knowledge Graph Embedding Based Graph Convolutional network for Link Prediction
Knowledge Graph Embedding Based Graph Convolutional Network ...
收藏 引用
International Conference on Advanced Cloud and Big data (CBD)
作者: Qiang Wu Qing He Henan Institute of Advanced Technology Zhengzhou University Zhengzhou P.R. China Key Lab of Intelligent Information Processing of Chinese Academy of Science (CAS) Institute of Computing Technology CAS Beijing China University of Chinese Academy of Science Beijing China
Knowledge Graph Embedding (KGE) aims to capture the inherent structural information within knowledge graphs (KGs) by means of representation learning. This is of paramount importance for various downstream tasks, incl...
来源: 评论
IVE: Accelerating Enumeration-Based Subgraph Matching via Exploring Isolated Vertices
IVE: Accelerating Enumeration-Based Subgraph Matching via Ex...
收藏 引用
International Conference on data Engineering
作者: Zite Jiang Shuai Zhang Xingzhong Hou Mengting Yuan Haihang You State Key Lab of Processors Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijinz China Zhongguancun Laboratory Beijing China School of Computer Science Wuhan University Wuhan China
The performance of the enumeration-based sub-graph matching, which searches all isomorphic subgraphs in the data graph, is crucial to various applications. The upper bound of the complexity for the enumeration-based m... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论