咨询与建议

限定检索结果

文献类型

  • 223 篇 会议
  • 209 篇 期刊文献

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 238 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 78 篇 信息与通信工程
    • 55 篇 电气工程
    • 43 篇 控制科学与工程
    • 34 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
  • 128 篇 理学
    • 70 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 74 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 13 篇 contrastive lear...
  • 12 篇 privacy
  • 11 篇 graph neural net...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 20 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 372 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
432 条 记 录,以下是221-230 订阅
排序:
Adaptive Loose Optimization for Robust Question Answering
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Jie Wang, Pinghui Wang, Zewei Kong, Dechen Hu, Min Han, Ting Liu, Jun The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The China Mobile Research Institute China The Shannxi Provincial Key Laboratory of Big Data Knowledge Engineering School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China
Question answering methods are well-known for leveraging data bias, such as the language prior in visual question answering and the position bias in machine reading comprehension (extractive question answering). Curre... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature  23
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Zou, Huiying Duan, Jia Liu, Xi Ren, Wei Li, Tao Zheng, Xianghan Choo, Kim-Kwang Raymond Hunan Engineering Research Center of Geographic Information Security and Application The Third Surveying and Mapping Institute of Hunan Province Hunan China China University of Geosciences School of Computer Science Wuhan China Sichuan University Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Casm State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of Mnr Beijing China Fuzhou University College of Computer and Big Data China Sanya College School of Information and Intelligent Engineering China University of Texas at San Antonio Department of Information Systems and Cyber Security San Antonio United States
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Not all diffusion model activations have been evaluated as discriminative features  24
Not all diffusion model activations have been evaluated as d...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Benyuan Meng Qianqian Xu Zitai Wang Xiaochun Cao Qingming Huang Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Peng Cheng Laboratory Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Key Laboratory of Big Data Mining and Knowledge Management CAS
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Sindiff: Spoken-to-Sign Language Generation Based Transformer Diffusion Model
SSRN
收藏 引用
SSRN 2023年
作者: Liang, Wuyan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Sign language generation (SLG) is meaningful in facilitating the communication between deaf and healthy people. Recently, transformer-based diffusion models have been achieved success in human motion generation. Howev... 详细信息
来源: 评论
Pptcdr: Personalized Preference Transfer Cross-Domain Recommendation Based on Heterogeneous Graph Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Zhu, Fan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Cross-domain recommendation methods aim to solve the problems of data sparsity and cold start by leveraging rich information from the source domain to enhance the recommendation accuracy of the target domain. Many met... 详细信息
来源: 评论
Online Discriminative Semantic-Preserving Hashing for Large-Scale Cross-Modal Retrieval  18th
Online Discriminative Semantic-Preserving Hashing for Large-...
收藏 引用
18th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2021
作者: Yi, Jinhan He, Yi Liu, Xin Department of Computer Science and Technology Huaqiao University Xiamen361021 China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing University of Science and Technology Nanjing210094 China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Xiamen China Fujian Key Laboratory of Big Data Intelligence and Security Xiamen China
Cross-modal hashing has drawn increasing attentions for efficient retrieval across different modalities, and existing methods primarily learn the hash functions in a batch based mode, i.e., offline methods. Neverthele... 详细信息
来源: 评论
Quantum adversarial metric learning model based on triplet loss function
arXiv
收藏 引用
arXiv 2023年
作者: Hou, Yan-Yan Li, Jian Chen, Xiu-Bo Ye, Chong-Qiang School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China College of Information Science and Engineering ZaoZhuang University ZaoZhuang Shandong277160 China School of Cyberspace Security Security Beijing University of Posts Telecommunications Beijing100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Post and Telecommunications Beijing100876 China GuiZhou University Guizhou Provincial Key Laboratory of Public Big Data Guizhou Guiyang 550025 China
Metric learning plays an essential role in image analysis and classification, and it has attracted more and more attention. In this paper, we propose a quantum adversarial metric learning (QAML) model based on the tri... 详细信息
来源: 评论
Darkfight: A Detection Method of Violent Behavior in Dark Place for intelligent Monitoring System
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Jun Xu, Xiaolong Nanjing University of Posts & Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts & Telecommunications School of Computer Science Nanjing210023 China
With the continuous development of deep learning, the use of deep learning methods for intelligent violent behavior recognition has become an active research field in computer vision. However, there are relatively few... 详细信息
来源: 评论
SLBERT: An Improved FLAT-BERT for Named Entity Recognition
SSRN
收藏 引用
SSRN 2022年
作者: Fei, Yuefan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China
Named Entity Recognition (NER) aims to identify named entities mentioned in unstructured text and classify them into predefined named entity classes. Although models using word fusion have achieved relatively high per... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论