咨询与建议

限定检索结果

文献类型

  • 209 篇 期刊文献
  • 202 篇 会议

馆藏范围

  • 411 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 273 篇 工学
    • 217 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 66 篇 信息与通信工程
    • 45 篇 电气工程
    • 34 篇 生物工程
    • 32 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 11 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
  • 118 篇 理学
    • 61 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 73 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 12 篇 privacy
  • 11 篇 contrastive lear...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 graph neural net...
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 14 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 south china univ...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 nanjing universi...

作者

  • 36 篇 xu xiaolong
  • 25 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 cao xiaochun
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 378 篇 英文
  • 32 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
411 条 记 录,以下是61-70 订阅
排序:
ALEDAR: An Attentions-based Encoder-Decoder and Autoregressive model for workload Forecasting of Cloud data Center  25
ALEDAR: An Attentions-based Encoder-Decoder and Autoregressi...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Sun, Wei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing China
Effective workload forecasting can provide a reference for resource scheduling in cloud data centers. Compared with the normal single data center, the multi-data center has a more complicated architecture design and p... 详细信息
来源: 评论
A New Semi-supervised Approach for Network Encrypted Traffic Clustering and Classification  25
A New Semi-supervised Approach for Network Encrypted Traffic...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Lin, Kunda Xu, Xiaolong Jiang, Yu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Encrypted network traffic classification is an essential task in modern communications, which is used in a wide range of applications, such as network resource allocation, QoS (Quality of Service), malicious detection... 详细信息
来源: 评论
Score-based Generative Priors Guided Model-driven Network for MRI Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Score matching with Langevin dynamics (SMLD) method has been successfully applied to accelerated MRI. However, the hyperparameters in the sampling process require subtle tuning, otherwise the results can be severely c... 详细信息
来源: 评论
Model-Based Offline Policy Optimization with Adversarial Network  26
Model-Based Offline Policy Optimization with Adversarial Net...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems  26
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Shicheng Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere... 详细信息
来源: 评论
Indoor Navigation Mechanism based on 5G network for Large Parking Garage  26
Indoor Navigation Mechanism based on 5G network for Large Pa...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Xiaolong Ding, Qun Lin, Licheng Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing210023 China
With the increase of car ownership in China, the problem of difficult parking in cities has become more and more serious. In large parking garage, finding an ideal parking space has become a daily problem for people;e... 详细信息
来源: 评论
A Causal Disentangled Multi-Granularity Graph Classification Method
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yuan Liu, Li Chen, Penggang Zhang, Youmin Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
Graph data widely exists in real life, with large amounts of data and complex structures. It is necessary to map graph data to low-dimensional embedding. Graph classification, a critical graph task, mainly relies on i... 详细信息
来源: 评论
A granular-ball generation method based on local density for classification
收藏 引用
Information Sciences 2025年 717卷
作者: Liu, Fan Zhang, Qinghua Xia, Shuyin Xie, Qin Liao, Wei Zhang, Siyang School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunication Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China Tourism Multi-source Data Perception and Decision Technology Key Laboratory of the Ministry of Culture and Tourism Chongqing400065 China
As a new branch of granular computing, granular-ball computing (GBC) has become increasingly popular due to its high efficiency, robustness, and scalability. However, in classification tasks, the existing mainstream m... 详细信息
来源: 评论
Preface: Brain-Inspired AI Research
收藏 引用
Science China(Technological Sciences) 2024年 第8期67卷 2281-2281页
作者: GONG YiHong WANG GuoYin College of Artificial Intelligence Xi’an Jiaotong UniversityXi’an 710049China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing400065China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Large AGI (artificial general intelligence) models, represented by OpenAI’s GPT-4, DALL-E, Sora, etc., have amazed the world by exhibiting superior capabilities on a variety of NLP and text-to-image/video generation ... 详细信息
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network  10
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论