咨询与建议

限定检索结果

文献类型

  • 321 篇 期刊文献
  • 173 篇 会议

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 343 篇 工学
    • 256 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 64 篇 信息与通信工程
    • 37 篇 生物工程
    • 27 篇 控制科学与工程
    • 25 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 光学工程
    • 16 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 9 篇 安全科学与工程
    • 8 篇 机械工程
    • 8 篇 环境科学与工程(可...
  • 178 篇 理学
    • 91 篇 数学
    • 60 篇 物理学
    • 41 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 14 篇 化学
    • 13 篇 地球物理学
    • 9 篇 系统科学
  • 134 篇 管理学
    • 104 篇 图书情报与档案管...
    • 35 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 16 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 11 篇 法学
    • 10 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 4 篇 文学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 16 篇 deep learning
  • 13 篇 information retr...
  • 12 篇 generative adver...
  • 12 篇 training
  • 11 篇 graph neural net...
  • 9 篇 convolution
  • 9 篇 knowledge graph
  • 9 篇 forecasting
  • 8 篇 feature extracti...
  • 7 篇 learning systems
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 image segmentati...
  • 6 篇 computational li...
  • 6 篇 natural language...
  • 5 篇 surveys
  • 5 篇 reinforcement le...
  • 5 篇 big data
  • 5 篇 prototypes

机构

  • 148 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 63 篇 cas key laborato...
  • 27 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 cas key lab of n...
  • 21 篇 school of comput...
  • 17 篇 data intelligenc...
  • 12 篇 institute for ai...
  • 11 篇 baidu inc
  • 10 篇 cas key laborato...
  • 10 篇 peng cheng labor...
  • 10 篇 zhejiang lab
  • 9 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 haihe lab of ita...
  • 9 篇 institute of com...
  • 9 篇 tianjin key labo...
  • 8 篇 linke lab school...
  • 7 篇 cas key laborato...

作者

  • 176 篇 cheng xueqi
  • 147 篇 guo jiafeng
  • 56 篇 zhang ruqing
  • 54 篇 fan yixing
  • 49 篇 lan yanyan
  • 43 篇 shen huawei
  • 30 篇 pang liang
  • 26 篇 jin xiaolong
  • 26 篇 bi keping
  • 22 篇 cao qi
  • 21 篇 de rijke maarten
  • 19 篇 xu jun
  • 18 篇 xueqi cheng
  • 18 篇 chen wei
  • 15 篇 li zixuan
  • 15 篇 guan saiping
  • 13 篇 sun xiaoming
  • 13 篇 bai long
  • 10 篇 xiaolong jin
  • 10 篇 huang qingming

语言

  • 454 篇 英文
  • 37 篇 其他
  • 3 篇 中文
检索条件"机构=Cas Key Lab of Network Data Science and Technology"
494 条 记 录,以下是331-340 订阅
排序:
Interpreting dense retrieval as mixture of topics
arXiv
收藏 引用
arXiv 2021年
作者: Zhan, Jingtao Mao, Jiaxin Liu, Yiqun Guo, Jiafeng Zhang, Min Ma, Shaoping Department of Computer Science and Technology Institute for Artificial Intelligence Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Beijing Key Laboratory of Big Data Management and Analysis Methods Gaoling School of Artificial Intelligence Renmin University of China Beijing100872 China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Dense Retrieval (DR) reaches state-of-the-art results in first-stage retrieval, but little is known about the mechanisms that contribute to its success. Therefore, in this work, we conduct an interpretation study of r... 详细信息
来源: 评论
Signed bipartite graph neural networks
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Junjie Shen, Huawei Cao, Qi Tao, Shuchang Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Signed networks are such social networks having both positive and negative links. A lot of theories and algorithms have been developed to model such networks (e.g., balance theory). However, previous work mainly focus... 详细信息
来源: 评论
Adversarial Camouflage for Node Injection Attack on Graphs
arXiv
收藏 引用
arXiv 2022年
作者: Tao, Shuchang Cao, Qi Shen, Huawei Wu, Yunfan Hou, Liang Sun, Fei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Node injection attacks on Graph Neural networks (GNNs) have received increasing attention recently, due to their ability to degrade GNN performance with high attack success rates. However, our study indicates that the... 详细信息
来源: 评论
Semantic models for the first-stage retrieval: a comprehensive review
arXiv
收藏 引用
arXiv 2021年
作者: Guo, Jiafeng Cai, Yinqiong Fan, Yixing Sun, Fei Zhang, Ruqing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences NO. 6 Kexueyuan South Road Haidian District Beijing100190 China Alibaba Group Beijing100102 China
Multi-stage ranking pipelines have been a practical solution in modern search systems, where the first-stage retrieval is to return a subset of candidate documents, and latter stages attempt to re-rank those candidate... 详细信息
来源: 评论
A Deep Look into Neural Ranking Models for Information Retrieval
arXiv
收藏 引用
arXiv 2019年
作者: Guo, Jiafeng Fan, Yixing Pang, Liang Yang, Liu Ai, Qingyao Zamani, Hamed Wu, Chen Croft, W. Bruce Cheng, Xueqi University of Chinese Academy of Sciences Beijing China Cas Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China Center for Intelligent Information Retrieval University of Massachusetts Amherst AmherstMA United States
Ranking models lie at the heart of research on information retrieval (IR). During the past decades, different techniques have been proposed for constructing ranking models, from traditional heuristic methods, probabil... 详细信息
来源: 评论
Single node injection attack against graph neural networks
arXiv
收藏 引用
arXiv 2021年
作者: Tao, Shuchang Cao, Qi Shen, Huawei Huang, Junjie Wu, Yunfan Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Node injection attack on Graph Neural networks (GNNs) is an emerging and practical attack scenario that the attacker injects malicious nodes rather than modifying original nodes or edges to affect the performance of G... 详细信息
来源: 评论
Learning discrete representations via constrained clustering for effective and efficient dense retrieval
arXiv
收藏 引用
arXiv 2021年
作者: Zhan, Jingtao Mao, Jiaxin Liu, Yiqun Guo, Jiafeng Zhang, Min Ma, Shaoping Department of Computer Science and Technology Institute for Artificial Intelligence Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Beijing Key Laboratory of Big Data Management and Analysis Methods Gaoling School of Artificial Intelligence Renmin University of China Beijing100872 China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Dense Retrieval (DR) has achieved state-of-the-art first-stage ranking effectiveness. However, the efficiency of most existing DR models is limited by the large memory cost of storing dense vectors and the time-consum... 详细信息
来源: 评论
Continuous Distributed Processing of Software Defined Radar
Continuous Distributed Processing of Software Defined Radar
收藏 引用
IEEE International Conference on Radar
作者: Bing Li Qiang Qiu Shiqi Gong Yongjun Liu Yu Lei CAS Key Lab of Network Data Science and Technology Chinese Academy of Sciences Institute of Computing Technology Beijing China State Key Laboratory of Internet of Things for Smart City University of Macau Macau China National Laboratory of Radar Signal Processing Xidian University Xi'an China Golaxy Data Technology Co. Ltd. Beijing China
Software-defined radar has been an active research field for more than ten years. However, the low performance and low scalability of the traditional processing techniques of SDR make it hard to deal with complex rada... 详细信息
来源: 评论
Classifier Guidance Enhances Diffusion-based Adversarial Purification by Preserving Predictive Information
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Mingkun Li, Jianing Chen, Wei Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial... 详细信息
来源: 评论
Toward the Understanding of Deep Text Matching Models for Information Retrieval
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Lijuan Lan, Yanyan Pang, Liang Guo, Jiafeng Cheng, Xueqi Sogou Inc. Beijing China Institute for AI Industry Research Tsinghua University Beijing China Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Semantic text matching is a critical problem in information retrieval. Recently, deep learning techniques have been widely used in this area and obtained significant performance improvements. However, most models are ... 详细信息
来源: 评论