咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 86 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 18 篇 控制科学与工程
    • 17 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 11 篇 机械工程
    • 10 篇 化学工程与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 光学工程
    • 6 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 4 篇 冶金工程
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 70 篇 理学
    • 39 篇 数学
    • 17 篇 物理学
    • 13 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 9 篇 化学
    • 9 篇 系统科学
  • 39 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 11 篇 computer vision
  • 7 篇 active contours
  • 6 篇 laboratories
  • 6 篇 educational tech...
  • 5 篇 image segmentati...
  • 5 篇 convergence
  • 5 篇 semantics
  • 5 篇 equations
  • 4 篇 electrocardiogra...
  • 4 篇 noise robustness
  • 4 篇 forecasting
  • 3 篇 internet of thin...
  • 3 篇 magnetic resonan...
  • 3 篇 image edge detec...
  • 3 篇 redundancy
  • 3 篇 energy consumpti...
  • 3 篇 authentication
  • 3 篇 servers
  • 3 篇 algorithm design...
  • 3 篇 image processing

机构

  • 32 篇 key laboratory o...
  • 17 篇 tianjin key lab ...
  • 14 篇 tianjin key labo...
  • 13 篇 tianjin key lab....
  • 12 篇 tianjin key labo...
  • 10 篇 key laboratory o...
  • 9 篇 tianjin key labo...
  • 9 篇 tianjin key lab ...
  • 9 篇 key laboratory o...
  • 6 篇 engineering rese...
  • 5 篇 school of comput...
  • 5 篇 tianjin key labo...
  • 5 篇 tianjin key labo...
  • 5 篇 school of electr...
  • 4 篇 college of intel...
  • 4 篇 dalian universit...
  • 4 篇 engineering rese...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...

作者

  • 10 篇 zhang de-gan
  • 9 篇 zhang degan
  • 9 篇 ning hongyun
  • 9 篇 yuanquan wang
  • 8 篇 xiao yingyuan
  • 8 篇 xia chengyi
  • 7 篇 hongyun ning
  • 7 篇 degan zhang
  • 6 篇 de-gan zhang
  • 5 篇 zheng wenguang
  • 5 篇 zhou shihua
  • 5 篇 yingyuan xiao
  • 4 篇 junqing sun
  • 4 篇 liu jinyuan
  • 4 篇 zhang hua
  • 4 篇 sun junqing
  • 4 篇 ting zhang
  • 4 篇 zhao dexin
  • 4 篇 童峥嵘
  • 4 篇 li jiawei

语言

  • 161 篇 英文
  • 4 篇 中文
  • 2 篇 其他
检索条件"机构=Tianjin Intelligent Computing and Software New Technology Key Laboratory"
167 条 记 录,以下是1-10 订阅
排序:
Exploring implicit influence for social recommendation based on GNN
收藏 引用
Soft computing 2024年 第19期28卷 11001-11014页
作者: Liu, Zhewei Yang, Peilin Hao, Qingbo Zheng, Wenguang Xiao, Yingyuan Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
In recent years, the method of using graph neural networks (GNN) to learn users’ social influence has been widely applied to social recommendation and has shown effectiveness, but several important challenges have no... 详细信息
来源: 评论
A novel policy iteration algorithm for solving the optimal consensus control problem of a discrete-time multiagent system with unknown dynamics
收藏 引用
Science China(Information Sciences) 2023年 第8期66卷 269-270页
作者: Wenkai XU Li WANG Shiwen SUN Chengyi XIA Zengqiang CHEN Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology The Engineering Research Center of Learning-Based Intelligent System Ministry of Education College of Artificial Intelligence Nankai University
At present, an increasing number of researchers have noticed the importance of optimal consensus control(OCC) of multiagent systems(MASs) because of their rich practical applications in various areas [1–4]. To accomp...
来源: 评论
DNS Covert Channel Attack Detection Based on Spatio-Temporal Feature Fusion  22
DNS Covert Channel Attack Detection Based on Spatio-Temporal...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: You, Wei Zhao, Chunlei Shan, Chao Dong, Guozhong Yu, Jie Guan, Yong Tianjin University of Technology Tianjin Key Laboratory of Intelligent Computing and Software New Technology Tianjin China Coordination Center of China Hubei Branch of National Computer Network Emergency Response Technical Team HuBei China Pengcheng Laboratory Department of New Networks Shenzhen China
An increasing number of Advanced Persistent Threat (APT) organizations are utilizing DNS (Domain Name System) covert channels to evade network intrusion detection systems and establish private authoritative servers fo... 详细信息
来源: 评论
MRIN: Fine-grained Feature Interaction based on Multiple Feature Relationships for CTR Prediction  26
MRIN: Fine-grained Feature Interaction based on Multiple Fea...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Ju, Jianbang Xiao, Yingyuan Yang, Peilin Zheng, Wenguang Tianjin University of Technology Enginnering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China
CTR prediction is an important task in personalized recommendation and online advertising. In recent years, many models have been applied in CTR prediction systems to imporve the predcition accuracy. Although the curr... 详细信息
来源: 评论
keywords extraction method based on two-way feature fusion  2
Keywords extraction method based on two-way feature fusion
收藏 引用
2nd International Conference on Machine Learning and intelligent Systems Engineering, MLISE 2022
作者: Li, Yongrui Ning, Hongyun Tianjin University Of Technology Tianjin Key Laboratory Of Intelligence Computing & New Software Technology Tianjin China
In order to improve the accuracy of keyword extraction, an improved method was proposed to solve the problem of missing keywords in traditional TF-IDF keyword extraction algorithm. In this method, two routes are used ... 详细信息
来源: 评论
Text keyword Extraction Method Combined with Dependent Syntax Analysis  22
Text Keyword Extraction Method Combined with Dependent Synta...
收藏 引用
2nd International Conference on Control and intelligent Robotics, ICCIR 2022
作者: Li, Yongrui Ning, Hongyun Tianjin Key Laboratory of Intelligence Computing & New Software Technology Tianjin University of Technology Tianjin China
In order to improve the accuracy of key word extraction, an improved TF-IDF method was proposed to solve the problems that traditional TF-IDF keyword extraction algorithm could not recognize new words and polysemous w... 详细信息
来源: 评论
Node Coupling for Inferring Networks from Short Time Series  5th
Node Coupling for Inferring Networks from Short Time Series
收藏 引用
5th Chinese Conference on Swarm Intelligence and Cooperative Control, CCSICC 2021
作者: Li, Hang Wang, Li Xia, Chengyi Tianjin University of Technology Tianjin300382 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Beijing China
Commonly abstracted as a set of units, the complex systems in the real world are interconnected with each other using the specific dynamical methods. However, in practice, there is nothing else but the performances of... 详细信息
来源: 评论
Deep User and Item Inter-matching Network for CTR Prediction  28th
Deep User and Item Inter-matching Network for CTR Predicti...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Yuan, Zhiyang Xiao, Yingyuan Yang, Peilin Hao, Qingbo Wang, Hongya Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China College of Computer Science and Engineering Donghua University Shanghai China
CTR prediction plays an important role in increasing company revenue and user experience, and many efforts start with historical behavior to uncover user interest. There are two main problems with previous works: (1) ... 详细信息
来源: 评论
Security and privacy with opacity-based state observation for finite state machine
Security and privacy with opacity-based state observation fo...
收藏 引用
作者: Zhang, Zhipeng Xia, Chengyi Chen, Shengyong Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China
Topics on security and privacy are very fundamental and important in the Internet of Things (IoT). In this paper, we explore the impact of state observation on the opacity of IoT, which is modeled by Moore-type finite... 详细信息
来源: 评论
CESFusion: Cross-Frequency Enhanced Spatial—Spectral Fusion Network for Hyperspectral and Multispectral Image Fusion
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Zhang, Haozheng Yang, Yanhong Li, Chaoyang Lu, Yanjie Zhang, Guodao Chen, Shengyong Tianjin University of Technology School of Computer Science and Engineering Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin300384 China School of Computer Science and Engineering Tianjin300384 China Hangzhou Dianzi University Institute of Intelligent Media Computing Hangzhou310018 China
The fusion of hyperspectral and multispectral images (MSIs) involves integrating a high spectral resolution hyperspectral image (HSI) and a high spatial resolution MSI to generate an HSI with high-resolution HSI (HR-H... 详细信息
来源: 评论