咨询与建议

限定检索结果

文献类型

  • 286 篇 会议
  • 195 篇 期刊文献

馆藏范围

  • 481 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 298 篇 工学
    • 238 篇 计算机科学与技术...
    • 186 篇 软件工程
    • 71 篇 信息与通信工程
    • 30 篇 电气工程
    • 29 篇 控制科学与工程
    • 27 篇 生物工程
    • 17 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 力学(可授工学、理...
    • 13 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 9 篇 化学工程与技术
    • 8 篇 仪器科学与技术
  • 141 篇 理学
    • 94 篇 数学
    • 35 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 16 篇 系统科学
    • 13 篇 化学
  • 73 篇 管理学
    • 41 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
    • 6 篇 法学
  • 17 篇 医学
    • 16 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 2 篇 农学

主题

  • 38 篇 semantics
  • 28 篇 feature extracti...
  • 23 篇 training
  • 18 篇 graph neural net...
  • 15 篇 privacy
  • 13 篇 visualization
  • 12 篇 deep learning
  • 12 篇 data models
  • 11 篇 reinforcement le...
  • 11 篇 data mining
  • 11 篇 contrastive lear...
  • 11 篇 federated learni...
  • 10 篇 object detection
  • 10 篇 benchmark testin...
  • 10 篇 robustness
  • 9 篇 conferences
  • 9 篇 task analysis
  • 9 篇 convolution
  • 9 篇 computational mo...
  • 9 篇 security

机构

  • 121 篇 guangxi key lab ...
  • 119 篇 guangxi key lab ...
  • 74 篇 key lab of educa...
  • 43 篇 school of comput...
  • 25 篇 college of compu...
  • 21 篇 guangxi normal u...
  • 14 篇 guangxi normal u...
  • 12 篇 guangxi key lab ...
  • 11 篇 guangxi key labo...
  • 11 篇 guangxi key lab ...
  • 10 篇 guangxi key lab ...
  • 10 篇 guangxi key lab ...
  • 9 篇 guangxi key lab ...
  • 8 篇 school of comput...
  • 8 篇 guangxi key labo...
  • 8 篇 faculty of compu...
  • 7 篇 guangxi normal u...
  • 7 篇 guangxi key lab ...
  • 7 篇 guangxi normal u...
  • 6 篇 key laboratory o...

作者

  • 40 篇 li xianxian
  • 37 篇 cheng minquan
  • 34 篇 zhixin li
  • 31 篇 li zhixin
  • 29 篇 xianxian li
  • 25 篇 luo xudong
  • 20 篇 zhong bineng
  • 19 篇 canlong zhang
  • 19 篇 zhang shichao
  • 15 篇 jinyan wang
  • 15 篇 huifang ma
  • 15 篇 zhang canlong
  • 15 篇 wen binghai
  • 15 篇 xudong luo
  • 14 篇 wang jinyan
  • 13 篇 liang qihua
  • 12 篇 tang zhenjun
  • 12 篇 ma huifang
  • 12 篇 liu peng
  • 11 篇 wan kai

语言

  • 405 篇 英文
  • 76 篇 其他
  • 2 篇 中文
检索条件"机构=Guangxi Key Lab of Multi‐Source Information Mining and Security"
481 条 记 录,以下是1-10 订阅
排序:
A Temporal Knowledge Graph Embedding Model Based on Variable Translation
收藏 引用
Tsinghua Science and Technology 2024年 第5期29卷 1554-1565页
作者: Yadan Han Guangquan Lu Shichao Zhang Liang Zhang Cuifang Zou Guoqiu Wen Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilin 541004China and also with Guangxi Key Lab of Multi-Source Information Mining and SecurityGuangxi Normal UniversityGuilin 541004China
Knowledge representation learning(KRL)aims to encode entities and relationships in various knowledge graphs into low-dimensional continuous *** is popularly used in knowledge graph completion(or link prediction)***-ba... 详细信息
来源: 评论
Class Activation Regularization-Based Facial Emotion Recognition Network and its Application in Students’ Emotional Engagement Assessment
收藏 引用
IEEE Transactions on Affective Computing 2025年 第2期16卷 1044-1055页
作者: Xu, Luhui Gan, Yanling Jin, Yi Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541001 China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guilin541001 China
Students’ emotional engagement in the classroom can be evaluated through their facial emotions. However, facial emotion recognition remains challenging due to the uncertainty problem, which is routinely caused by fac... 详细信息
来源: 评论
Efficient multi-scale community search method based on spectral graph wavelet
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 89-101页
作者: Cairui YAN Huifang MA Qingqing LI Fanyi YANG Zhixin LI College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541004China
Community search is an important problem in network analysis,which has attracted much attention in recent *** a query-oriented variant of community detection problem,community search starts with some given nodes,pays ... 详细信息
来源: 评论
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network
收藏 引用
Frontiers of Computer Science 2023年 第6期17卷 87-99页
作者: Yufei ZENG Zhixin LI Zhenbin CHEN Huifang MA Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541004China College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China
The deep learning methods based on syntactic dependency tree have achieved great success on Aspect-based Sentiment Analysis(ABSA).However,the accuracy of the dependency parser cannot be determined,which may keep aspec... 详细信息
来源: 评论
Attribute subspace-guided multi-scale community detection
收藏 引用
Neural Computing and Applications 2024年 第22期36卷 13975-13988页
作者: Yan, Cairui Ma, Huifang Tang, Yuechen Li, Zhixin College of Computer Science and Engineering Northwest Normal University Gansu Lanzhou730070 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guangxi Guilin541004 China
Community detection is designed to divide a network into multiple subnetworks (communities) with high cohesiveness, which has attracted wide attention in graph analysis. Attributes are typically served as auxiliary si... 详细信息
来源: 评论
Incorporating metapath interaction on heterogeneous information network for social recommendation
收藏 引用
Frontiers of Computer Science 2024年 第1期18卷 33-48页
作者: Yanbin JIANG Huifang MA Xiaohui ZHANG Zhixin LI Liang CHANG College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541001China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China
Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph *** existing HIN-based recommend... 详细信息
来源: 评论
Robust Hashing with Deep Features and Meixner Moments for Image Copy Detection
收藏 引用
ACM Transactions on multimedia Computing, Communications and Applications 2024年 第12期20卷 1-23页
作者: Yu, Mengzhu Tang, Zhenjun Liang, Xiaoping Zhang, Xianquan Li, Zhixin Zhang, Xinpeng Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science Fudan University Shanghai China
Copy detection is a key task of image copyright protection. Most robust hashing schemes do not make satisfied performance of image copy detection yet. To address this, a robust hashing scheme with deep features and Me... 详细信息
来源: 评论
BAM_CRS: Blockchain-Based Anonymous Model for Cross-Domain Recommendation Systems
收藏 引用
Journal of Computer Science & Technology 2025年 第2期40卷 340-358页
作者: Li-E Wang Dong-Cheng Li Peng Liu Xian-Xian Li Key Laboratory of Education Blockchain and Intelligent Technology(Ministry of Education)Guangxi Normal University Guilin 541004China Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University Guilin 541004China School of Computer Science and Engineering Guangxi Normal UniversityGuilin 541004China
The cross-domain recommendation (CDR) technique has been widely applied in recommendation systemsand can effectively relieve the data sparsity and cold start problems. However, it brings up data privacy and authentici... 详细信息
来源: 评论
Graph neural network based approach Che upo to automatically assigning common weakness enumeration identifiers for vulnerabilities
收藏 引用
Cybersecurity 2024年 第3期7卷 1-15页
作者: Peng Liu Wenzhe Ye Haiying Duan Xianxian Li Shuyi Zhang Chuanjian Yao Yongnan Li Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilin 541004China School of Software Beihang UniversityBeijing 100000China School of National Security People's Public Security University of ChinaBeijing 1000000China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal UniversityGuilin 541004China
Vulnerability reports are essential for improving software security since they record key information on *** a report,CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the **... 详细信息
来源: 评论
SIEVL-Track: Exploring Semantic information Enhancement for Visual-Language Object Tracking
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 5872-5884页
作者: Li, Ning Zhong, Bineng Liang, Qihua Mo, Zhiyi Nong, Jian Song, Shuxiang Guangxi Normal University Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Key Laboratory of Multi-Source Information Mining and Security Guilin541004 China Wuzhou University Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou543002 China
With the assistance of language descriptions, Visual-Language (VL) object tracking can obtain more accurate semantic information compared to traditional Visual-Only object tracking. However, the ability of current VL ... 详细信息
来源: 评论