咨询与建议

限定检索结果

文献类型

  • 84 篇 会议
  • 69 篇 期刊文献

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 74 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 31 篇 信息与通信工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 光学工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 56 篇 理学
    • 40 篇 数学
    • 26 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 9 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 30 篇 管理学
    • 22 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
  • 4 篇 法学
    • 3 篇 社会学
  • 4 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 8 篇 feature extracti...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 machine learning
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 3 篇 crowdsourcing
  • 3 篇 accuracy

机构

  • 58 篇 school of comput...
  • 21 篇 jiangsu key labo...
  • 20 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 jiangsu key labo...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 state grid jiang...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 school of cyber ...
  • 4 篇 institute of inf...
  • 4 篇 school of comput...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...

作者

  • 23 篇 xu xiaolong
  • 22 篇 xiaolong xu
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 lejun gong
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 yang geng
  • 4 篇 yun li
  • 4 篇 xu jia
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 xiaochun cao

语言

  • 146 篇 英文
  • 7 篇 其他
检索条件"机构=School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing"
153 条 记 录,以下是51-60 订阅
排序:
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud  27
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
27th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2021
作者: Jiang, Yu Xu, Xiaolong Lin, Kunda Duan, Weihua Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
FDSR-INT: A Flexible On-Demand In-Band Telemetry Approach for Aerial Computing Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xu, Jinghan Xu, Xiaolong Zhao, Juan Gao, Honghao Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing The School of Computer Science Nanjing210023 China Jinling Institute of Technology School of Computer Science Nanjing211169 China Shanghai University School of Computer Engineering and Science Shanghai200444 China Gachon University College of Future Industry Gyeonggi-Do 461-701 Korea Republic of
In-band network telemetry (INT) is a new network measurement technique that provides real-time, fine-grained packet-level network measurements. However, standard INT lacks the flexibility to perform configurable on-de... 详细信息
来源: 评论
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
SinCWIm: An imputation method for single-cell RNA sequence dropouts using weighted alternating least squares
收藏 引用
computers in Biology and Medicine 2024年 171卷 108225-108225页
作者: Gong, Lejun Cui, Xiong Liu, Yang Lin, Cai Gao, Zhihong Jiangsu Key Lab of Big Data Security & Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Department of Burn Wound Repair and Regenerative Medicine Center The First Affiliated Hospital of Wenzhou Medical University Zhejiang Wenzhou325000 China Zhejiang Engineering Research Center of Intelligent Medicine The First Affiliated Hospital of Wenzhou Medical University Wenzhou325000 China
Background and objectives: Single-cell RNA sequencing (scRNA-seq) provides a powerful tool for exploring cellular heterogeneity, discovering novel or rare cell types, distinguishing between tissue-specific cellular co... 详细信息
来源: 评论
Suppress content shift: better diffusion features via off-the-shelf generation techniques  24
Suppress content shift: better diffusion features via off-th...
收藏 引用
Proceedings of the 38th International Conference on Neural Information processing Systems
作者: Benyuan Meng Qianqian Xu Zitai Wang Zhiyong Yang Xiaochun Cao Qingming Huang Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Peng Cheng Laboratory Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Key Laboratory of Big Data Mining and Knowledge Management CAS
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Community discovery method based on complex network of data fusion based on the super network perspective
收藏 引用
International Journal of computers and Applications 2021年 第4期43卷 383-390页
作者: Pei, Li School of Computer Science & Technology Xi‘an University of Posts and Telecommunications Xi‘an China Shaanxi Key Laboratory of Network Data Intelligent Processing Xi‘an University of Posts and Telecommunications Xi‘an China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi‘an Jiaotong University Xi‘an China
To enhance the computational efficiency and precision of community discovery, a community discovery algorithm with the mixed label based on the minimum description length (MDI) of information compression is proposed i... 详细信息
来源: 评论
SLBERT: An Improved FLAT-BERT for Named Entity Recognition
SSRN
收藏 引用
SSRN 2022年
作者: Fei, Yuefan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China
Named Entity Recognition (NER) aims to identify named entities mentioned in unstructured text and classify them into predefined named entity classes. Although models using word fusion have achieved relatively high per... 详细信息
来源: 评论
Collaborative Bi-Aggregation for Directed Graph Embedding
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Linsong Chen, Ke-Jia Liu, Zheng Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China State Key Laboratory of Novel Software Technology Nanjing University Jiangsu Nanjing210093 China
Directed graph is able to model asymmetric relationships between nodes and research on directed graph embedding is of great significance in downstream graph analysis and inference. Learning source and target embedding... 详细信息
来源: 评论
Not all diffusion model activations have been evaluated as discriminative features  24
Not all diffusion model activations have been evaluated as d...
收藏 引用
Proceedings of the 38th International Conference on Neural Information processing Systems
作者: Benyuan Meng Qianqian Xu Zitai Wang Xiaochun Cao Qingming Huang Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Peng Cheng Laboratory Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Key Laboratory of Big Data Mining and Knowledge Management CAS
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论