咨询与建议

限定检索结果

文献类型

  • 132 篇 会议
  • 99 篇 期刊文献

馆藏范围

  • 231 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 143 篇 工学
    • 110 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 37 篇 信息与通信工程
    • 23 篇 生物工程
    • 18 篇 控制科学与工程
    • 14 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 8 篇 机械工程
    • 8 篇 交通运输工程
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 仪器科学与技术
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 75 篇 理学
    • 41 篇 数学
    • 24 篇 生物学
    • 16 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 47 篇 管理学
    • 27 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 8 篇 machine learning
  • 8 篇 training
  • 7 篇 deep learning
  • 6 篇 conferences
  • 6 篇 neural networks
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 anomaly detectio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 computational mo...
  • 4 篇 contrastive lear...
  • 4 篇 schedules
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie
  • 5 篇 huang jiwu
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng

语言

  • 226 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Liuzhou Key Laboratory of Big Data Intelligent Processing and Security"
231 条 记 录,以下是111-120 订阅
排序:
Itrace: An implicit trust inference method for trust-aware collaborative filtering
arXiv
收藏 引用
arXiv 2017年
作者: He, Xu Liu, Bin Chen, Ke-Jia School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China
The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A CF algorithmrecommends items of interest to the target user by leveraging the votes given by ... 详细信息
来源: 评论
On link formation in heterogeneous information networks: A view based on multi-Label learning  9
On link formation in heterogeneous information networks: A v...
收藏 引用
9th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017
作者: Chen, Ke-Jia Xue, Shijun Li, Yun Liu, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Center for the Neural Basis of Cognition Carnegie Mellon University PittsburghPA15213 United States
This paper studies the problem of relationship prediction in heterogeneous information networks. Our goal is not only to predict links/relationships more accurately but also to provide more viable paths to facilitate ... 详细信息
来源: 评论
Implementation and performance op timization of dynamic random forest
Implementation and performance op timization of dynamic rand...
收藏 引用
第九届网络分布式计算与知识发现国际会议( 2017 International Conference on Cyber-enabled distributed computing and knowledge discovery)
作者: Xiaolong Xu Wen Chen School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and
Bernard combines the weight updating of the boosting algorithm with the Random Forest(RF),and proposes a new RF induction algorithm called Dynamic Random Forest(DRF).The idea with DRF is to grow only trees that would ... 详细信息
来源: 评论
SCALABLE ATTRIBUTION OF ADVERSARIAL ATTACKS VIA MULTI-TASK LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Zhongyi Han, Keji Ge, Yao Ji, Wei Li, Yun Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Deep neural networks (DNNs) can be easily fooled by adversarial attacks during inference phase when attackers add imperceptible perturbations to original examples, i.e., adversarial examples. Many works focus on adver... 详细信息
来源: 评论
LogPal: A Generic Anomaly Detection Scheme of Heterogeneous Logs for Network Systems
收藏 引用
security and Communication Networks 2023年 第1期2023卷
作者: Sun, Lei Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
As a key resource for diagnosing and identifying problems, network syslog contains vast quantities of information. And it is the main source of data for anomaly detection of systems. Syslog presents the characteristic... 详细信息
来源: 评论
MNN: Mixed Nearest-Neighbors for Self-Supervised Learning
arXiv
收藏 引用
arXiv 2023年
作者: Long, Xianzhong Peng, Chen Li, Yun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
In contrastive self-supervised learning, positive samples are typically drawn from the same image but in different augmented views, resulting in a relatively limited source of positive samples. An effective way to all... 详细信息
来源: 评论
Brain-inspired artificial intelligence research: A review
收藏 引用
Science China(Technological Sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论
Recommendation system based on trusted relation transmission
Recommendation system based on trusted relation transmission
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Yixiong Bian Huakang Li Jiangsu Key Lab of Big Data and Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
With the rapid development of the internet, applications of recommendation systems for online shops and entertainment platforms become more and more popular. In order to improve the effectiveness of recommendation, ex... 详细信息
来源: 评论
Using deep learning to recognize biomedical entities
Using deep learning to recognize biomedical entities
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Xuemin Yang Zhifei Zhang Ronggen Yang Daoyu Huang Geng Yang Lejun Gong Jiangsu Key Laboratory of Big Data Security &Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing China
With the rapid growth of the high-throughput biological technology, it brings biomedical big omics' data containing literature and annotated data. Especially, a wealth of relevant information exists in various typ... 详细信息
来源: 评论
Dafl: Domain Adaptation-Based Federated Learning for Privacy-Preserving Biometric Recognition
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zhousheng Yang, Geng Dai, Hua Bai, Yunlu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big data Security & Intelligent Processing Nanjing210023 China
With the introduction of data protection regulation in various countries, traditional centralized learning for the exploitation of sensitive biological information will gradually become unsustainable. We take face and... 详细信息
来源: 评论