咨询与建议

限定检索结果

文献类型

  • 223 篇 会议
  • 209 篇 期刊文献

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 238 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 78 篇 信息与通信工程
    • 55 篇 电气工程
    • 43 篇 控制科学与工程
    • 34 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
  • 128 篇 理学
    • 70 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 74 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 13 篇 contrastive lear...
  • 12 篇 privacy
  • 11 篇 graph neural net...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 20 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 372 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
432 条 记 录,以下是171-180 订阅
排序:
BLRGCN: A dynamic traffic flow prediction model based on spatiotemporal graph convolutional network
BLRGCN: A dynamic traffic flow prediction model based on spa...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Qiuhao Shi Xiaolong Xu Xuanyan Liu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Because of the complex topology of urban road and the dynamic changes of traffic information over time, how to accurately and efficiently predict traffic flow has become a difficult problem. In order to capture spatio...
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shicheng Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere...
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for Processing Large-scale datasets on Distributed Platforms
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Hu Song Xinyun Cheng Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
Lgccn: A Label-Guided Contrastive Capsule Network for Few-Shot Text Classification
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Yang Xu, Xiaolong Xiao, Fu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Few-shot text classification aims to learn transferable knowledge from a limited dataset to perform classification tasks in unseen domains. Recently, metric-based meta-learning methods have demonstrated their advantag... 详细信息
来源: 评论
Anomaly detection and traceback scheme for cloud-edge networks
Anomaly detection and traceback scheme for cloud-edge networ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xuanyan Liu Jinling He Hu Song Xinyun Cheng Luyun Hu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Cloud-edge networks (CEN) has revolutionized the traditional network architecture. However, there are many security issues in CEN needing to be solved. In this case, CEN administrator should be able to detect network ... 详细信息
来源: 评论
A Survivable Routing Algorithm with Hybrid Protection in Elastic Optical Networks
A Survivable Routing Algorithm with Hybrid Protection in Ela...
收藏 引用
Mobile Internet, Cloud Computing and Information security (MICCIS), International Conference on
作者: Hankun Zeng Xu Zhang Chuan Feng Xiaoxue Gong School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China
Spectral efficiency is a crucial factor in the survivability of multi-class traffic in elastic optical networks (EONs). In this paper, we propose a spectrum-efficient hybrid protection scheme, namely dedicated path pr... 详细信息
来源: 评论
Segment Routing based In-Band Network Telemetry in IPv6 over Optical Networks
Segment Routing based In-Band Network Telemetry in IPv6 over...
收藏 引用
Mobile Internet, Cloud Computing and Information security (MICCIS), International Conference on
作者: Wei Liu Xu Zhang Chuan Feng Xiaoxue Gong School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China
With the rise of automated network operations, network telemetry has become increasingly important. Optical networks play a key role in modern communication systems because of their high bandwidth, low latency, and lo... 详细信息
来源: 评论
Location and Lightpath Selection in Multi-Domain Optical data Center Networks
Location and Lightpath Selection in Multi-Domain Optical Dat...
收藏 引用
Mobile Internet, Cloud Computing and Information security (MICCIS), International Conference on
作者: Changle Xu Xu Zhang Chuan Feng Xiaoxue Gong School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China
In the era of booming fifth-generation fixed networks (F5G), the service demands for high bandwidth continue to grow. Meanwhile, in multi-domain network scenarios, service requests are vulnerable to physical layer att... 详细信息
来源: 评论
Multi-task regression learning for survival analysis via prior information guided transductive matrix completion
收藏 引用
Frontiers of Computer Science 2020年 第5期14卷 99-112页
作者: Lei Chen Kai Shao Xianzhong Long Lingsheng Wang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210023China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics and AstronauticsNanjing211106China
Survival analysis aims to predict the occurrence time of a particular event of interest,which is crucial for the prognosis analysis of ***,due to the limited study period and potential losing tracks,the observed data ... 详细信息
来源: 评论
FR2Seg: Continual Segmentation Across Multiple Sites via Fourier Style Replay and Adaptive Consistency Regularization  39
FR<sup>2</sup>Seg: Continual Segmentation Across Multiple Si...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Cheng Zhang, Weiwen Zhang, Hongrui Xu, Xuemiao Zhang, Huaidong Zou, Jing Qin, Jing South China University of Technology China The Hong Kong Polytechnic University Hong Kong Guangdong Engineering Center for Large Model and GenAI Technology China State Key Laboratory of Subtropical Building Science China Ministry of Education Key Laboratory of Big Data and Intelligent Robot China Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information China
In clinical imaging, medical segmentation networks typically require continually adapting to new data from multiple sites over time, as aggregating all data for learning at once can be impractical due to storage limit... 详细信息
来源: 评论