咨询与建议

限定检索结果

文献类型

  • 200 篇 期刊文献
  • 172 篇 会议

馆藏范围

  • 372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 250 篇 工学
    • 207 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 54 篇 信息与通信工程
    • 35 篇 生物工程
    • 18 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 10 篇 光学工程
    • 10 篇 电气工程
    • 7 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 机械工程
    • 4 篇 安全科学与工程
  • 133 篇 理学
    • 77 篇 数学
    • 36 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 10 篇 化学
    • 9 篇 系统科学
  • 105 篇 管理学
    • 81 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 12 篇 法学
    • 10 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 文学
    • 3 篇 中国语言文学

主题

  • 19 篇 semantics
  • 13 篇 deep learning
  • 11 篇 knowledge graph
  • 11 篇 graph neural net...
  • 10 篇 information retr...
  • 9 篇 convolution
  • 8 篇 generative adver...
  • 8 篇 forecasting
  • 8 篇 training
  • 7 篇 machine learning
  • 6 篇 learning systems
  • 6 篇 computational mo...
  • 6 篇 feature extracti...
  • 5 篇 conferences
  • 5 篇 deep neural netw...
  • 5 篇 signal encoding
  • 5 篇 computational li...
  • 5 篇 natural language...
  • 4 篇 surveys
  • 4 篇 computer archite...

机构

  • 128 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 63 篇 cas key laborato...
  • 23 篇 school of comput...
  • 17 篇 data intelligenc...
  • 12 篇 institute for ai...
  • 11 篇 institute of com...
  • 10 篇 key lab. of inte...
  • 10 篇 state key lab of...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 7 篇 key lab of intel...
  • 7 篇 peng cheng labor...
  • 7 篇 school of cyber ...
  • 6 篇 data intelligenc...
  • 6 篇 semiconductor ne...
  • 6 篇 alibaba group
  • 5 篇 data intelligenc...
  • 5 篇 institute of inf...
  • 5 篇 key laboratory o...

作者

  • 134 篇 cheng xueqi
  • 103 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 40 篇 shen huawei
  • 35 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 jin xiaolong
  • 28 篇 zhang ruqing
  • 22 篇 cao qi
  • 18 篇 xu jun
  • 17 篇 guan saiping
  • 17 篇 bai long
  • 16 篇 li zixuan
  • 13 篇 xueqi cheng
  • 13 篇 sun xiaoming
  • 10 篇 hou liang
  • 9 篇 huang qingming
  • 9 篇 huang junjie
  • 9 篇 chen wei
  • 8 篇 liu shenghua

语言

  • 353 篇 英文
  • 17 篇 其他
  • 2 篇 中文
检索条件"机构=CAS Key Lab of Network Data Science and Technology Institute of Computing Technology"
372 条 记 录,以下是71-80 订阅
排序:
Classifier Guidance Enhances Diffusion-Based Adversarial Purification by Preserving Predictive Information  27
Classifier Guidance Enhances Diffusion-Based Adversarial Pur...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zhang, Mingkun Li, Jianing Chen, Wei Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial... 详细信息
来源: 评论
Modeling parameter interactions in ranking SVM  15
Modeling parameter interactions in ranking SVM
收藏 引用
24th ACM International Conference on Information and Knowledge Management, CIKM 2015
作者: Zhang, Yaogong Xu, Jun Lan, Yanyan Guo, Jiafeng Xie, Maoqiang Huang, Yalou Cheng, Xueqi College of Computer and Control Engineering Nankai University China CAS Key Lab. of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China College of Software Nankai University China
Ranking SVM, which formalizes the problem of learning a ranking model as that of learning a binary SVM on preference pairs of documents, is a state-of-the-art ranking model in information retrieval. The dual form solu... 详细信息
来源: 评论
Graph wavelet neural network  7
Graph wavelet neural network
收藏 引用
7th International Conference on Learning Representations, ICLR 2019
作者: Xu, Bingbing Shen, Huawei Cao, Qi Qiu, Yunqi Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China
We present graph wavelet neural network (GWNN), a novel graph convolutional neural network (CNN), leveraging graph wavelet transform to address the shortcomings of previous spectral graph CNN methods that depend on gr... 详细信息
来源: 评论
A Discriminative Semantic Ranker for Question Retrieval  21
A Discriminative Semantic Ranker for Question Retrieval
收藏 引用
11th ACM SIGIR International Conference on Theory of Information Retrieval, ICTIR 2021
作者: Cai, Yinqiong Fan, Yixing Guo, Jiafeng Zhang, Ruqing Lan, Yanyan Cheng, Xueqi University of Chinese Academy of Sciences Beijing China Cas Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute for Ai Industry Research Tsinghua University Beijing China
Similar question retrieval is a core task in community-based question answering (CQA) services. To balance the effectiveness and efficiency, the question retrieval system is typically implemented as multi-stage ranker... 详细信息
来源: 评论
Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence  6
Focus on the Stability of Large Systems: Toward Automatic Pr...
收藏 引用
6th IEEE International Conference on data science in Cyberspace, DSC 2021
作者: Song, Shiwen Wu, Qiong Zheng, Xin Wang, Peng Dou, Yuchen Li, Zhongwen Zhai, Lidong Institute Of Information Engineering Chinese Academy Of Sciences BeiJing China Bag Data Academy Zhongke Beijing China Institute Of Computing Technology Chinese Academy Of Sciences Cas Key Laboratory Of Network Data Science And Technology Beijing China
With the increase in the number of users and business volume, the business systems of Internet companies are becoming more and more complex, resulting in a surge in the number of alarms. A large number of dirty alarms... 详细信息
来源: 评论
Security risk assessment based on bayesian multi-step attack graphs
收藏 引用
Journal of Computational Information Systems 2015年 第11期11卷 3911-3918页
作者: Yang, Yunxue Jin, Shuyuan Fang, Binxing CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Security risk assessment is fundamental to the security of network systems. Attack graphs have been widely used to evaluate the likelihood of possible multi-step attacks that exploit multiple vulnerabilities in this f... 详细信息
来源: 评论
Selective Temporal Knowledge Graph Reasoning  30
Selective Temporal Knowledge Graph Reasoning
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Hou, Zhongni Jin, Xiaolong Li, Zixuan Bai, Long Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Temporal Knowledge Graph (TKG), which characterizes temporally evolving facts in the form of (subject, relation, object, timestamp), has attracted much attention recently. TKG reasoning aims to predict future facts ba... 详细信息
来源: 评论
Few-shot Link Prediction on Hyper-relational Facts  30
Few-shot Link Prediction on Hyper-relational Facts
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Hyper-relational facts, which consist of a primary triple (head entity, relation, tail entity) and auxiliary attribute-value pairs, are widely present in real-world Knowledge Graphs (KGs). Link Prediction on Hyper-rel... 详细信息
来源: 评论
Class-Incremental Few-Shot Event Detection  30
Class-Incremental Few-Shot Event Detection
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhao, Kailin Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China
Event detection is one of the fundamental tasks in information extraction and knowledge graph. However, a realistic event detection system often needs to deal with new event classes constantly. These new classes usual... 详细信息
来源: 评论
Graph based Tensor Recovery for Accurate Internet Anomaly Detection
Graph based Tensor Recovery for Accurate Internet Anomaly De...
收藏 引用
2018 IEEE Conference on Computer Communications, INFOCOM 2018
作者: Xie, Kun Li, Xiaocan Wang, Xin Xie, Gaogang Wen, Jigang Zhang, Dafang College of Computer Science and Electronics Engineering Hunan University China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Department of Electrical and Computer Engineering State University of New York at Stony Brook United States Institute of Computing Technology Chinese Academy of Sciences China
Detecting anomalous traffic is a crucial task of managing networks. Many anomaly detection algorithms have been proposed recently. However, constrained by their matrix-based traffic data model, existing algorithms oft... 详细信息
来源: 评论