咨询与建议

限定检索结果

文献类型

  • 223 篇 会议
  • 209 篇 期刊文献

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 238 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 78 篇 信息与通信工程
    • 55 篇 电气工程
    • 43 篇 控制科学与工程
    • 34 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
  • 128 篇 理学
    • 70 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 74 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 13 篇 contrastive lear...
  • 12 篇 privacy
  • 11 篇 graph neural net...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 20 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 372 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
432 条 记 录,以下是321-330 订阅
排序:
Gsgm: A Group-Sequence-Aware Graph Model for Personalized News Recommender System
SSRN
收藏 引用
SSRN 2024年
作者: Lv, Pengtao Zhang, Qinghui Guan, Zhenhan Deveci, Muhammet Shi, Lei Zhong, Kaiyang Wang, Jingping Xu, Heliang Zhang, Yana Ministry of Education Henan Zhengzhou450001 China Henan Key Laboratory of Grain Photoelectric Detection and Control Henan University of Technology Henan Zhengzhou450001 China Henan Grain Big Data Analysis and Application Engineering Research Center Henan University of Technology Henan Zhengzhou450001 China The Bartlett School of Sustainable Construction University College London LondonWC1E 6BT United Kingdom Department of Industrial Engineering Turkish Naval Academy National Defence University Tuzla Istanbul4940 Turkey State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China Ministry of Education Key Laboratory for Intelligent Analysis and Security Governance of Ethnic Languages Minzu University of China Beijing100081 China Southwestern University of Finance and Economics China
News recommender system is an important method of helping readers identify interesting stories. Although human behaviors exhibit sequential patterns, most current studies on news recommendations ignore the influence o... 详细信息
来源: 评论
Dual consistent constraint via disentangled consistency and complementarity for multi-view clustering
收藏 引用
Neurocomputing 2025年 641卷
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论
TSAR-based Expert Recommendation Mechanism for Community Question Answering
TSAR-based Expert Recommendation Mechanism for Community Que...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jian Song Xiaolong Xu Xinheng Wang Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computing and Engineering University of West London London UK
Community Question Answering (CQA) provides a platform to share knowledge for users. With the increasing number of users and questions, askers have to wait a long time for an answer with high quality while responders ... 详细信息
来源: 评论
Blockchain Private key Storage Algorithm Based on Image Information Hiding  5th
Blockchain Private Key Storage Algorithm Based on Image Info...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Wang, Ning Chen, Yuling Yang, Yu Fang, Zigang Sun, Yizhe School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou China
The private key is the unique credential of the blockchain asset and can be used to sign and authenticate transactions. Losing the private key also loses the control of the account, so the leakage of the private key i... 详细信息
来源: 评论
Noise-Tolerant Learning for Audio-Visual Action Recognition
arXiv
收藏 引用
arXiv 2022年
作者: Han, Haochen Zheng, Qinghua Luo, Minnan Miao, Kaiyao Tian, Feng Chen, Yan The National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China The Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Ministry of Education Xi’an710049 China The School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an710049 China
Recently, video recognition is emerging with the help of multi-modal learning, which focuses on integrating distinct modalities to improve the performance or robustness of the model. Although various multi-modal learn... 详细信息
来源: 评论
Heuristic-Q: A Privacy data Pricing Method Based on Heuristic Reinforcement Learning  5th
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristi...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Chen, Xi Chen, Jingjie Chen, Yuling Yang, Jinglan Li, Deyin School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data Guizhou University GuiyangGuizhou China
With the development of big data applications in recent years, the value of personal data has received more and more attention. How to balance the conflict between data value development and personal privacy protectio... 详细信息
来源: 评论
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid  5th
PPCSB: A Privacy-Preserving Electricity Consumption Statisti...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Li, Chenyang Chen, Yuling Yang, Yu Li, Chaochao Zeng, Yang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou China
Research on the privacy protection of smart grids mostly stays in fixed electricity prices or electricity aggregation. Aiming at the problem of real-time pricing and privacy data protection of smart grid, this paper p... 详细信息
来源: 评论
Dual Consistent Constraint via Disentangled Consistency and Complementarity for Multi-view Clustering
arXiv
收藏 引用
arXiv 2025年
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论
Multi-objective optimization for fuzzy workflow scheduling
Multi-objective optimization for fuzzy workflow scheduling
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jie Zhu Jing Zhang Chang Lu Haiping Huang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China Nanjing University of Posts & Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
A fuzzy workflow scheduling problem is investigated with fuzzy temporal parameters, such as the fuzzy task processing times, fuzzy data transmission times and the fuzzy due dates. In the considered problem, the resour... 详细信息
来源: 评论
A Method of Network Topology Discovery Based on Knowledge Reasoning : Based on more than heterogeneous data sources
A Method of Network Topology Discovery Based on Knowledge Re...
收藏 引用
Computer Science and Management Technology (ICCSMT), International Conference on
作者: Jun Xu Yang Xin Runcheng Liu Cyberspace Security Institute School of Beijing University of Posts and Telecommunications Beijing China Cyberspace Security Institute Beijing University of Posts and Telecommunications Beijing China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guizhou China
At present, the network has gradually become the foundation of information construction. People have more demands for network topology management. The increasing scale of network topology and the heterogeneity between... 详细信息
来源: 评论