咨询与建议

限定检索结果

文献类型

  • 221 篇 会议
  • 203 篇 期刊文献

馆藏范围

  • 424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 285 篇 工学
    • 230 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 72 篇 信息与通信工程
    • 48 篇 电气工程
    • 35 篇 控制科学与工程
    • 35 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
  • 123 篇 理学
    • 66 篇 数学
    • 37 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 系统科学
  • 73 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 12 篇 privacy
  • 11 篇 contrastive lear...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 10 篇 graph neural net...
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 21 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 liu qun
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu

语言

  • 386 篇 英文
  • 36 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
424 条 记 录,以下是371-380 订阅
排序:
Anomaly detection for drinking water quality via deep bilSTM ensemble  18
Anomaly detection for drinking water quality via deep bilSTM...
收藏 引用
2018 Genetic and Evolutionary Computation Conference, GECCO 2018
作者: Chen, Xingguo Feng, Fan Wu, Jikai Liu, Wenyu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu Province China
In this paper, a deep BiLSTM ensemble method was proposed to detect anomaly of drinking water quality. First, a convolutional neural network (CNN) is utilized as a feature extractor in order to process the raw data of... 详细信息
来源: 评论
Impact of Feature Selection Methods on data Classification for IDS
Impact of Feature Selection Methods on Data Classification f...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The rapid increase of data has led to many security issues. Various new technologies and other sub-disciplines have been introduced into the research of intrusion detection system (IDS), which has become a hot topic i... 详细信息
来源: 评论
Localization of Deep Inpainting Using High-Pass Fully Convolutional Network
Localization of Deep Inpainting Using High-Pass Fully Convol...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Haodong Li Jiwu Huang Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Image inpainting has been substantially improved with deep learning in the past years. Deep inpainting can fill image regions with plausible contents, which are not visually apparent. Although inpainting is originally... 详细信息
来源: 评论
Lightweight EEG Classification Model Based on EEG-sensor with Few Channels
Lightweight EEG Classification Model Based on EEG-sensor wit...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Haoyan Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In the traditional work, based on EEG Sensors monitoring the physiological and emotional state of humans, the time-frequency analysis method is usually used to extract the characteristics of the signal, and then analy... 详细信息
来源: 评论
Erratum to "Multi-View Face Synthesis via Progressive Face Flow"
收藏 引用
IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 2021年 30卷 6700页
作者: Yangyang Xu Xuemiao Xu Jianbo Jiao Keke Li Cheng Xu Shengfeng He School of Computer Science and Engineering South China University of Technology Guangzhou China State Key Laboratory of Subtropical Building Science the Key Laboratory of Big Data and Intelligent Robot Ministry of Education and the Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information South China University of Technology Guangzhou China University of Oxford Oxford U.K.
In the above article [1], unfortunately, Fig. 5 was not displayed correctly with many empty images. The correct version is supplemented here.
来源: 评论
Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social Networks
Joint Spatial-Temporal Trajectory Clustering Method for Mobi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ji Tang Linfeng Liu Jiagao Wu Jian Zhou Yang Xiang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important issue in the trajectory mining task, the trajectory clustering technique has attracted lots of the attention in the field of data mining. Trajectory clustering technique identifies the similar trajecto... 详细信息
来源: 评论
Multi-agent game abstraction via graph attention neural network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Yong Wang, Weixun Hu, Yujing Hao, Jianye Chen, Xingguo Gao, Yang National Key Laboratory for Novel Software Technology Nanjing University Tianjin University NetEase Fuxi AI Lab Noah's Ark Lab Huawei Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
In large-scale multi-agent systems, the large number of agents and complex game relationship cause great difficulty for policy learning. Therefore, simplifying the learning process is an important research issue. In m... 详细信息
来源: 评论
Deep representation learning for road detection using siamese network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Huafeng Han, Xiaofeng Li, Xiangrui Yao, Yazhou Huang, Pu Tang, Zhenming School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Robust road detection is a key challenge in safe autonomous driving. Recently, with the rapid development of 3D sensors, more and more researchers are trying to fuse information across different sensors to improve the... 详细信息
来源: 评论
Novel Color Orthogonal Moments-Based Image Representation and Recognition
Research Square
收藏 引用
Research Square 2020年
作者: He, Bing Liu, Jun Yang, Tengfei Xiao, Bin Peng, Yanguo School of Physics and Electrical Engineering Weinan Normal University Weinan714000 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts & Telecommunications Xi’an710121 China School of Computer Science and Technology Weinan Normal University Weinan714000 China School of Cyberspace Security Xi’an University of Posts & Telecommunications Xi’an710121 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China School of Computer Science and Technology Xidian University Xi’an710071 China
Inspired by quaternion algebra and the idea of fractional-order transformation, we propose a new set of quaternion fractional-order generalized Laguerre orthogonal moments (QFr-GLMs) based on fractional-order generali... 详细信息
来源: 评论
Incentivizing the workers for truth discovery in crowdsourcing with copiers
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Lingyun Niu, Xiaofu Xu, Jia Yang, Dejun Xu, Lijie Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Department of Computer Science Colorado School of Mines GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm for performing large scale tasks. Truth discovery and incentive mechanism are fundamentally important for the crowdsourcing system. Many truth discovery methods and incen... 详细信息
来源: 评论