咨询与建议

限定检索结果

文献类型

  • 55 篇 会议
  • 50 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 56 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 19 篇 信息与通信工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 控制科学与工程
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
  • 33 篇 管理学
    • 20 篇 图书情报与档案管...
    • 14 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 31 篇 理学
    • 18 篇 数学
    • 14 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 化学
    • 2 篇 系统科学
  • 8 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 2 篇 公共卫生与预防医...
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学

主题

  • 6 篇 fuzzy cognitive ...
  • 5 篇 semantics
  • 4 篇 knowledge graph
  • 3 篇 object detection
  • 3 篇 knowledge manage...
  • 3 篇 neural networks
  • 3 篇 contrastive lear...
  • 3 篇 monitoring
  • 3 篇 intelligent netw...
  • 3 篇 computational mo...
  • 3 篇 bars
  • 3 篇 decision making
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 humans
  • 3 篇 artificial intel...
  • 3 篇 mathematical mod...
  • 2 篇 internet of thin...
  • 2 篇 transient analys...
  • 2 篇 fault diagnosis

机构

  • 15 篇 school of cyber ...
  • 13 篇 school of comput...
  • 11 篇 key laboratory o...
  • 10 篇 peng cheng labor...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 8 篇 microscopic imag...
  • 8 篇 department of kn...
  • 8 篇 key laboratory o...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 institute of med...
  • 5 篇 institute of inf...
  • 5 篇 china knowledge ...
  • 5 篇 institute of inf...
  • 4 篇 zju-ant group jo...
  • 4 篇 zhejiang key lab...
  • 4 篇 university of ch...

作者

  • 22 篇 huang qingming
  • 20 篇 xu qianqian
  • 15 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 10 篇 george georgoula...
  • 9 篇 bao shilong
  • 7 篇 li chen
  • 7 篇 grzegorzek marci...
  • 7 篇 yang jinzhu
  • 7 篇 chrysostomos d. ...
  • 6 篇 voula c. georgop...
  • 6 篇 chrysostomos sty...
  • 5 篇 wang zitai
  • 4 篇 liu jinyuan
  • 4 篇 zhang wen
  • 4 篇 hai zhuge
  • 4 篇 chen huajun
  • 4 篇 stylios chrysost...
  • 4 篇 li jiawei
  • 4 篇 zhou shihua

语言

  • 93 篇 英文
  • 10 篇 其他
  • 4 篇 中文
检索条件"机构=Knowledge and Intelligent Computing Laboratory"
107 条 记 录,以下是51-60 订阅
排序:
The minority matters: a diversity-promoting collaborative metric learning algorithm  22
The minority matters: a diversity-promoting collaborative me...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Shilong Bao Qianqian Xu Zhiyong Yang Yuan He Xiaochun Cao Qingming Huang State Key Laboratory of Information Security Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences Alibaba Group School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Laboratory of Big Data Mining and Knowledge Management CAS and Peng Cheng Laboratory
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin...
来源: 评论
ER: Equivariance Regularizer for knowledge Graph Completion
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Zongsheng Xu, Qianqian Yang, Zhiyong Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Peng Cheng Laboratory Shenzhen China
Tensor factorization and distanced based models play important roles in knowledge graph completion (KGC). However, the relational matrices in KGC methods often induce a high model complexity, bearing a high risk of ov... 详细信息
来源: 评论
Article Reranking by Memory-Enhanced Key Sentence Matching for Detecting Previously Fact-Checked Claims
arXiv
收藏 引用
arXiv 2021年
作者: Sheng, Qiang Cao, Juan Zhang, Xueyao Li, Xirong Zhong, Lei Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Key Lab of Data Engineering and Knowledge Engineering Renmin University of China China
False claims that have been previously fact-checked can still spread on social media. To mitigate their continual spread, detecting previously fact-checked claims is indispensable. Given a claim, existing works retrie... 详细信息
来源: 评论
Geometry Interaction knowledge Graph Embeddings
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Zongsheng Xu, Qianqian Yang, Zhiyong Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Peng Cheng Laboratory Shenzhen China
knowledge graph (KG) embeddings have shown great power in learning representations of entities and relations for link prediction tasks. Previous work usually embeds KGs into a single geometric space such as Euclidean ... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-Sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
The superalignment of superhuman intelligence with large language models
收藏 引用
Science China Information Sciences 2025年 第6期68卷
作者: Huang, Minlie Wang, Yingkang Cui, Shiyao Ke, Pei Tang, Jie The CoAI Group Department of Computer Science and Technology Tsinghua University Beijing100084 China Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China Chengdu611731 China Knowledge Engineering Group Department of Computer Science and Technology Tsinghua University Beijing100084 China
We have witnessed the emergence of superhuman intelligence thanks to the fast development of large language models (LLMs) and multimodal language models. As the application of such superhuman models becomes increasing... 详细信息
来源: 评论
The Minority Matters: A Diversity-Promoting Collaborative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
A Web-Geographical Information System for Real Time Monitoring of Arachthos River, Greece
收藏 引用
IFAC-PapersOnLine 2018年 第30期51卷 384-389页
作者: Athanasiou, Thomas Salmas, Dimitrios Karvelis, Petros Angelis, Ioannis Andrea, Veronika Schismenos, Paraskeuas Styliou, Maria Stylios, Chrysostomos Laboratory of Knowledge and Intelligent Computing Department of Computer Engineering Technological Educational Institute of Epirus Arta Greece
The scope of this work is to present a Web-GIS that will monitor the broader area of Arachthos River in order to serve as an online mechanism for early warning and mapping of flood events. It describes briefly the mai... 详细信息
来源: 评论
Poisoning attack against estimating from pairwise comparisons
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Ke Xu, Qianqian Zeng, Jinshan Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Big Data Mining and Knowledge Management The School of Economics and Management University of Chinese Academy of Sciences Beijing100049 China
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking li... 详细信息
来源: 评论