咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 125 篇 期刊文献

馆藏范围

  • 283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 177 篇 工学
    • 130 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 52 篇 信息与通信工程
    • 27 篇 生物工程
    • 22 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 99 篇 理学
    • 62 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 deep learning
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 chen ke-jia
  • 10 篇 cao xiaochun
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 273 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
283 条 记 录,以下是111-120 订阅
排序:
An Answer Summarization Scheme Based on Multilayer Attention Model
An Answer Summarization Scheme Based on Multilayer Attention...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaolong Xu Yihao Dong Jian Song Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s...
来源: 评论
SSR-TA: Sequence to Sequence based expert recurrent recommendation for ticket automation
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Chenhan Fang, Xiaoyu Luo, Bingqing Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
The ticket automation provides crucial support for the normal operation of IT software systems. An essential task of ticket automation is to assign experts to solve upcoming tickets. However, facing thousands of ticke... 详细信息
来源: 评论
An optimal profit route planning scheme based on ACO-OPP  21
An optimal profit route planning scheme based on ACO-OPP
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Qiu, Yuhua Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Taxi plays an important role of urban public transportation system. However, without appropriate route planning scheme, taxi drivers can only choose to wait or seek passengers in the absence of orders, leading to wast... 详细信息
来源: 评论
Community-based Message Forwarding in Mobile Social Networks
Community-based Message Forwarding in Mobile Social Networks
收藏 引用
作者: Zhiming Chen Yang Xiang School of Computer Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
With the popularity of various smart devices and the application of sensor network technology, message transmission using mobile devices is becoming *** paper focuses on the forwarding in mobile social network(MSN).Th...
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Han, Keji Ge, Yao Wang, Ruchuan Li, Yun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
Bidirectional LSTM-CRF for biomedical named entity recognition  14
Bidirectional LSTM-CRF for biomedical named entity recogniti...
收藏 引用
14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Yang, Xuemin Gao, Zhihong Li, Yongmin Pan, Chuandi Yang, Ronggen Gong, Lejun Yang, Geng Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210003 China Zhejiang Engineering Research Center of Intelligence Medicine Wenzhou325035 China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China
Bio-medical entity recognition extracts significant entities, for instance cells, proteins and genes, which is an arduous task in an automatic system that mine knowledge in bioinformatics texts. In this thesis, we uti... 详细信息
来源: 评论
Decomposing Source Codes by Program Slicing for Bug Localization
Decomposing Source Codes by Program Slicing for Bug Localiza...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jian Yong Ziye Zhu Yun Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications
Bug localization, which aims to automatically locate buggy source code files based on the given bug report, is a critical yet time-consuming task in the software engineering field. Existing advanced bug localization m...
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
On link formation in heterogeneous information networks: A view based on multi-Label learning  9
On link formation in heterogeneous information networks: A v...
收藏 引用
9th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017
作者: Chen, Ke-Jia Xue, Shijun Li, Yun Liu, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Center for the Neural Basis of Cognition Carnegie Mellon University PittsburghPA15213 United States
This paper studies the problem of relationship prediction in heterogeneous information networks. Our goal is not only to predict links/relationships more accurately but also to provide more viable paths to facilitate ... 详细信息
来源: 评论
Hyperspectral Image Destriping and Denoising with Spectral Low Rank and Tensor Nuclear Norm
Hyperspectral Image Destriping and Denoising with Spectral L...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Pengfei Liu Lanlan Liu School of Computer Science Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing China
In this paper, we propose a new method for simultaneous hyperspectral image (HSI) destriping and denoising with spectral low-rank and tensor nuclear norm under the tensor framework. Specifically, the tensor nuclear no...
来源: 评论