咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 125 篇 期刊文献

馆藏范围

  • 283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 177 篇 工学
    • 130 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 52 篇 信息与通信工程
    • 27 篇 生物工程
    • 22 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 99 篇 理学
    • 62 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 deep learning
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 chen ke-jia
  • 10 篇 cao xiaochun
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 273 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
283 条 记 录,以下是21-30 订阅
排序:
Multi-task regression learning for survival analysis via prior information guided transductive matrix completion
收藏 引用
Frontiers of Computer Science 2020年 第5期14卷 99-112页
作者: Lei Chen Kai Shao Xianzhong Long Lingsheng Wang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210023China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics and AstronauticsNanjing211106China
Survival analysis aims to predict the occurrence time of a particular event of interest,which is crucial for the prognosis analysis of ***,due to the limited study period and potential losing tracks,the observed data ... 详细信息
来源: 评论
HeRB: Heterophily-Resolved Structure Balancer for Graph Neural Networks
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Ke-Jia Mu, Wenhui ZhengLiu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China State Key Laboratory of Novel Software Technology Nanjing University Jiangsu Nanjing210093 China
—Recent research has witnessed the remarkable progress of Graph Neural Networks (GNNs) in the realm of graph data representation. However, GNNs still encounter the challenge of structural imbalance. Prior solutions t... 详细信息
来源: 评论
Resource allocation in cognitive wireless powered communication networks with wirelessly powered secondary users and primary users
收藏 引用
Science China(Information Sciences) 2019年 第2期62卷 224-229页
作者: Ding XU Qun LI Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications
Dear editor,Wireless powered communication networks(WPCNs) are popular especially for wireless sensor networks where sensors can be wirelessly powered. For coordinating wireless power and information transfer, Ju and ... 详细信息
来源: 评论
Relation Classification based on Selective Entity-Aware Attention  25
Relation Classification based on Selective Entity-Aware Atte...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Ding, Haijie Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China
Relation classification aims to classify the entity pairs into a certain relation, which is an important task of natural language processing. The latest end-to-end models based on attention mechanism still have shortc... 详细信息
来源: 评论
CETO-Sim: A Simulation Platform for Cloud-Edge Task Offloading  25
CETO-Sim: A Simulation Platform for Cloud-Edge Task Offloadi...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Yao, Rui Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China
In order to verify the effectiveness of task offloading algorithms in large-scale cloud and edge computing systems, scholars usually use simulation platforms to conduct extensive experiments. However, existing simulat... 详细信息
来源: 评论
VECSim: A Simulation Platform for Multi-bitrate Video Caching Collaboratively in Edge Computing Network  25
VECSim: A Simulation Platform for Multi-bitrate Video Cachin...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Chen, Peipei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China
The development of the mobile Internet has led to a shape increase in video traffic data. New Mobile Edge Computing (MEC) technology can reduce network operation and service delivery delays, so as to improving the QoE... 详细信息
来源: 评论
An Answer Summarization Scheme Based on Multilayer Attention Model  26
An Answer Summarization Scheme Based on Multilayer Attention...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Xiaolong Dong, Yihao Song, Jian Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s... 详细信息
来源: 评论
AtM-DNN: A Multimodal Attention Fusion Network with Auxiliary Function for Sentiment Classification  25
AtM-DNN: A Multimodal Attention Fusion Network with Auxiliar...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Huang, Ji Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Multimodal sentiment classification is an important research attracting many scientists' attention in natural language processing. In most multimodal sentiment research, each modal of the dataset is labeled with a... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning  26
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Xinyu Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ... 详细信息
来源: 评论
Transfer learning with active queries for relational data modeling across multiple information networks  25th
Transfer learning with active queries for relational data mo...
收藏 引用
25th International Conference on Neural Information processing, ICONIP 2018
作者: Chen, Ke-Jia Zhang, Kai Jiang, Xi-Lin Wang, Yunyun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China
This paper studies the relationship prediction problem in multi-network scenarios, aiming to overcome the network sparsity challenge where the labeled data (connected node pairs) are much less than the unlabeled data ... 详细信息
来源: 评论