咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 58 篇 期刊文献

馆藏范围

  • 135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 59 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 30 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 15 篇 电气工程
    • 12 篇 生物工程
    • 8 篇 机械工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
  • 42 篇 理学
    • 25 篇 数学
    • 13 篇 生物学
    • 10 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 16 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 7 篇 法学
    • 5 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 12 篇 feature extracti...
  • 6 篇 convolutional ne...
  • 5 篇 generative adver...
  • 5 篇 convolution
  • 5 篇 software
  • 5 篇 training
  • 4 篇 costs
  • 4 篇 accuracy
  • 3 篇 image fusion
  • 3 篇 deep learning
  • 3 篇 three-dimensiona...
  • 3 篇 software algorit...
  • 3 篇 speech processin...
  • 3 篇 neural networks
  • 3 篇 face recognition
  • 3 篇 knowledge graph
  • 3 篇 computational mo...
  • 3 篇 predictive model...
  • 3 篇 fuses
  • 3 篇 prediction algor...

机构

  • 11 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 8 篇 shandong provinc...
  • 8 篇 school of comput...
  • 7 篇 state key labora...
  • 7 篇 college of compu...
  • 6 篇 shandong key lab...
  • 6 篇 key laboratory o...
  • 6 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 the key laborato...
  • 5 篇 inner mongolia e...
  • 5 篇 the key laborato...
  • 5 篇 key laboratory o...
  • 5 篇 inner mongolia k...
  • 5 篇 key laboratory o...
  • 4 篇 inner mongolia e...
  • 4 篇 shandong fundame...
  • 4 篇 beihang universi...

作者

  • 12 篇 wu xiaojun
  • 9 篇 jian-tao zhou
  • 8 篇 xiaojun wu
  • 8 篇 shi minjia
  • 7 篇 zhang yumei
  • 6 篇 yang honghong
  • 5 篇 yumei zhang
  • 5 篇 zhao junqiao
  • 4 篇 zhou jian-tao
  • 4 篇 wang cheng
  • 4 篇 kim jon-lark
  • 4 篇 lv guohua
  • 4 篇 wang hanli
  • 4 篇 solé patrick
  • 4 篇 peng li
  • 4 篇 gao yongbiao
  • 4 篇 honghong yang
  • 3 篇 li peng
  • 3 篇 zhou jiantao
  • 3 篇 ye chen

语言

  • 113 篇 英文
  • 20 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Service"
135 条 记 录,以下是71-80 订阅
排序:
Latent multi-view subspace clustering based on Laplacian regularized representation
Latent multi-view subspace clustering based on Laplacian reg...
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Wei Guo Hangjun Che Man-Fai Leung Nankun Mu Xiangguang Dai Yuming Feng School of Electronic and Information Engineering Southwest University Chongqing China School of Electronic Information Engineering Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Southwest University Chongqing China School of Computing and Information Science Faculty of Science and Engineering Anglia Ruskin University Cambridge UK Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education College of Computer Science Chongqing University Chongqing China School of Computer Science and Engineering Chongqing Three Gorges University Chongqing China Key Laboratory of Intelligent Information Processing and Control Chongqing Three Gorges University Chongqing China
We propose a latent multi-view subspace clustering model based on Laplacian regularized representation. To emphasize the information of the representation matrix at the local level and reflect the grouping effect of c...
来源: 评论
Visitors Vis: Interactive Mining of Suspected Medical Insurance Fraud Groups  18th
Visitors Vis: Interactive Mining of Suspected Medical Insura...
收藏 引用
18th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2023
作者: Dong, Rixin Liu, Hanlin Guo, Xu Zhou, Jiantao College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
As medical insurance continues to grow in size, the losses caused by medical insurance fraud cannot be underestimated. Current data mining and predictive techniques have been applied to analyze and explore the health ... 详细信息
来源: 评论
An Uncovered Neurons Information-Based Fuzzing Method for DNN
An Uncovered Neurons Information-Based Fuzzing Method for DN...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Kecheng Tang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Fuzzing is increasingly being utilized as a method to test the reliability of Deep Learning (DL) systems. In order to detect more errors in DL systems, exploring the internal logic of more DNNs has become the main obj... 详细信息
来源: 评论
Research on Generating Xi'an Drum Music Based on Generative Adversarial Network
Research on Generating Xi'an Drum Music Based on Generative ...
收藏 引用
Sensors, Electronics and Computer Engineering (ICSECE), IEEE International Conference on
作者: Tianmian Liang Peng Li Yumei Cao Xiaojun Wu Huifang Zhao Chenye Qi Ministry of Culture and Tourism Key Laboratory of Intelligent Computing and Service Technology for Folk Song Xi’an China School of Computer Science Shaanxi Normal University Xi'an China Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China Engineering Laboratory of Teaching Information Technology of Shaanxi Province Xi’an China Xi'an Key Laboratory of Cultural Tourism Resources Development and Utilization Xi’an China School of Music Shaanxi Normal University Xi'an China
Currently most AI music generator platforms mainly focus on creating modern music, without focusing on the creation of folk music. And most music generation neural network models use recursive neural networks and thei...
来源: 评论
Construction and Application of the SMART Model for Adaptive Industrial Data Collection Based on Knowledge Graphs
Construction and Application of the SMART Model for Adaptive...
收藏 引用
IEEE International Conference on Big Data
作者: Wendan Cheng Zhen Zhang Heng Qian Qiuyue Wang Guanqun Su Lingge Meng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shu Ju (Shandong) Intelligent Technology Co. Ltd. Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Qingniao IIoT Co. Ltd. Jinan China
Industrial data collection is the foundation for implementing enterprise digitization, which is of great significance to the development of intelligent manufacturing. However, Industrial Data Collection Standards (IDC... 详细信息
来源: 评论
An Automatic Music Generation Method Based on Rscln_Transformer Network
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Yumei Lv, Xiaojiao Li, Qi Wu, Xiaojun Su, Yuping Yang, Honghong School of Computer Science Shaanxi Normal University Xi’an China Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourism Xi’an China Key Laboratory of Modern Teaching Technology Ministry of Education Shaanxi Normal University Xi’an China
With the development of artificial intelligence and deep learning, a large number of music generation methods have been proposed. Recently, Transformer has been widely used in music generation. However, the structural... 详细信息
来源: 评论
Leveraging the Dual Capabilities of LLM: LLM-Enhanced Text Mapping Model for Personality Detection  39
Leveraging the Dual Capabilities of LLM: LLM-Enhanced Text M...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Bi, Weihong Kou, Feifei Shi, Lei Li, Yawen Li, Haisheng Chen, Jinpeng Xu, Mingying School of Computer Science National Pilot School of Software Engineering BUPT Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing 100876 China State Key Laboratory of Media Convergence and Communication CUC Beijing 100024 China State Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPU Taicang 215400 China School of Economics and Management BUPT Beijing 100876 China Beijing Technology and Business University Beijing 100048 China Xiangjiang Laboratory Changsha 410205 China North China University of Technology Beijing 100144 China
Personality detection aims to deduce a user’s personality from their published posts. The goal of this task is to map posts to specific personality types. Existing methods encode post information to obtain user vecto... 详细信息
来源: 评论
A quaternary analogue of Tang-Ding codes
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Minjia Tao, Sihui Kim, Jon-Lark Solé, Patrick The Key Laboratory of Intelligent Computing Signal Processing Ministry of Education School of Mathematical Sciences Anhui University Hefei230601 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China Department of Mathematics Sogang University Seoul Korea Republic of Aix Marseille Univ CNRS Centrale Marseille I2M Marseille France
In a recent paper, Tang and Ding introduced a class of binary cyclic codes of rate close to one half with a designed lower bound on their minimum distance. The definition involves the base 2 expansion of the integers ...
来源: 评论
Blockchain-Based Multi-Cloud Data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Feiyu Wang Jian-tao Zhou College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Feiyu Wang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe...
来源: 评论