Search

Showing total 616 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Language chinese Remove constraint Language: chinese Publisher editorial office of computer science Remove constraint Publisher: editorial office of computer science
616 results

Search Results

1. Review of Deep Learning Applications in Healthcare

2. Study on Degree of Node Based Personalized Propagation of Neural Predictions forSocial Networks

3. Dual-attention Network Model on Propagation Tree Structures for Rumor Detection

4. LayerLSB:Nearest Neighbors Search Based on Layered Locality Sensitive B-tree

5. Short-time Traffic Flow Forecasting Based on Multi-adjacent Graph and Multi-head Attention Mechanism

6. Same Effect Relation and Concept Reduction in Formal Concept Analysis

7. Deep Learning-based Visual Multiple Object Tracking:A Review

8. Adaptive Image Adversarial Reprogramming Based on Noise Invisibility Factors

9. Image Compressed Sensing Attention Neural Network Based on Residual Feature Aggregation

10. Image Denoising Algorithm Based on Deep Multi-scale Convolution Sparse Coding

11. Text-Image Cross-modal Retrieval Based on Transformer

12. Comprehensive Survey of Loss Functions in Knowledge Graph Embedding Models

13. Review of Intelligent Traffic Signal Control Strategies Driven by Deep Reinforcement Learning

14. Incorporating Multi-granularity Extractive Features for Keyphrase Generation

15. Failure Recovery Model for Single Link with Congestion-Avoidance in SDN

16. Optical Performance Monitoring Method Based on Fine-grained Constellation Diagram Recognition

17. Self-balanced Scheduling Strategy for Container Cluster Based on Improved DQN Algorithm

18. Optimal Embedding of Hierarchical Cubic Networks into Linear Arrays of NoC

19. Review of Differential Privacy Research

20. Container-based Intrusion Detection Method for Cisco IOS-XE

21. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services

22. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning

23. Detection of Web Command Injection Vulnerability for Cisco IOS-XE

24. Heterogeneous Provenance Graph Learning Model Based APT Detection

25. Key Technologies of Intelligent Identification of Biomarkers:Review of Research on Association Prediction Between Circular RNA and Disease

26. Batched Eigenvalue Decomposition Algorithms for Hermitian Matrices on GPU

27. SS-GCN:Aspect-based Sentiment Analysis Model with Affective Enhancement and Syntactic Enhancement

28. Knowledge Graph-to-Text Model Based on Dynamic Memory and Two-layer Reconstruction Reinforcement

29. Context-aware Temporal Knowledge Graph Completion Based on Relation Constraints

30. BGPNRE:A BERT-based Global Pointer Network for Named Entity-Relation Joint Extraction Method

31. Study on Graph Neural Networks Social Recommendation Based on High-order and Temporal Features

32. Fine-grained Semantic Knowledge Graph Enhanced Chinese OOV Word Embedding Learning

33. Survey of Knowledge Graph Reasoning Based on Representation Learning

34. ECG Abnormality Detection Based on Label Co-occurrence and Feature Local Pertinence

35. Mining Negative Sequential Patterns with Periodic Gap Constraints

36. Nodes’ Ranking Model Based on Influence Prediction

37. Leaf Classification and Ranking Method Based on Multi-granularity Feature Fusion

38. Classification of Oil Painting Art Style Based on Multi-feature Fusion

39. Survey on Evolutionary Recurrent Neural Networks

40. Document-enhanced Question Answering over Knowledge-Bases

41. Study on Chinese Named Entity Extraction Rules Based on Boundary Location and Correction

42. Chinese Spelling Check Based on BERT and Multi-feature Fusion Embedding

43. Sentiment Analysis of Chinese Short Text Combining Context and Dependent Syntactic Information

44. Chinese Argumentative Writing Quality Evaluation Based on Multi-perspective Modeling

45. Real-time Trajectory Planning Algorithm Based on Collision Criticality and Deep Reinforcement Learning

46. Backdoor Attack on Deep Learning Models:A Survey

47. Survey on Membership Inference Attacks Against Machine Learning

48. Efficiently Secure Architecture for Future Network

49. Network Equipment Anomaly Detection Based on Time Delay Feature

50. Semi-supervised Network Traffic Anomaly Detection Method Based on GRU