作者: Zhou,Yanru12;Luo,Senlin12;Pan,Limin12;Liu,Lu12;Song,Dandan12; (1School of Computer Science, Beijing Institute of Technology, Beijing, China;2Information System and Security & Countermeasures Experimental Center, Beijing Institute of Technology, Beijing, China)
出处: Knowledge-Based Systems 2022 Vol.239
摘要: Network embedding has become the focal point of increasing research interests in academic and industrial domains. Temporal networks are evolved by add ...
作者: Wu,Gang14;Song,Yidong1;Zhao,Guodong1;Sun,Wei2;Han,Donghong1;Qiao,Baiyou1;Wang,Guoren3;Yuan,Ye3; (1School of Computer Science and Engineering, Northeastern University, China;2Baidu, China;3School of Computer, Beijing Institute of Technology, China;4State Key Laboratory for Novel Software Technology, Nanjing University, China)
出处: Information Systems 2022 Vol.104
摘要: Indexes provide a method to access data in databases quickly. It can improve the response speed of subsequent queries by building a complete index in ...
作者: Zheng,Yongrong1;Zhang,Tao1;Fu,Ying1; (1School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China)
出处: Knowledge-Based Systems 2022 Vol.236
摘要: Flowers have great cultural value, economic value and ecological value in our life. Accurate classification of flowers facilitates various application ...
作者: Huang,Heyan12;Shang,Yu-Ming1;Sun,Xin1;Wei,Wei3;Mao,Xianling1; (1School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China;2Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, Beijing, 100081, China;3School of Computer Science, Huazhong University of Science and Technology, Wuhan, 430074, China)
出处: Knowledge-Based Systems 2022 Vol.236
摘要: Joint entity and relation extraction is an important task in natural language processing and knowledge graph construction. Existing studies mainly foc ...
作者: Zheng,Jiamin1;Li,Shupan2;Hao,Shengang3;Li,Yuanzhang3;Zhang,Yu4; (1School of E-Business and Logistics, Beijing Technology and Business University, Beijing, China;2School of Computer and Artificial Intelligence, ZhengZhou University, Zhengzhou, China;3School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China;4School of Electrical and Information Engineering, Beijing University of Civil Engineering and Architecture, Beijing, China)
出处: Computer Communications 2022 Vol.182 P212-222
摘要: VoLTE (Voice over Long-Term Evolution) is a widely used, high-performance, and end-to-end transmission solution in 4G and 5G. However, it also provide ...
作者: Mohsin,Hufsa1;Shi,Chongyang1;Hao,Shufeng2;Jiang,He3; (1School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China;2College of Data Sciences, Taiyuan University of Technology, Shanxi, 030024, China;3School of Software, Dalian University of Technology, Dalian, 116024, Liaoning, China)
出处: Knowledge-Based Systems 2022 Vol.236
摘要: Effective bug classification and assignment to relevant developers improves the efficiency of software management. However, textually dependent approa ...
作者: Wang,Shilei12;Zhang,Peng3;Wang,Hui12;Chao,Jinbo12;Zhang,Fuzhi12; (1School Of Information Science And Engineering, Yanshan University, Hebei, Qinhuangdao, China;2The Key Laboratory For Computer Virtual Technology And System Integration Of Hebei Province, Hebei, Qinhuangdao, China;3School Of Computer Science And Technology, Beijing Institute Of Technology, Beijing, China)
出处: Security and Communication Networks 2022 Vol.2022
摘要: Research studies have shown that online recommender systems are under the threat of group shilling attacks, in which attackers attempt to distort the ...
作者: Dong,Liang1;Gangyi,Ding1;Dapeng,Yan1;Kexiang,Huang1; (1School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China)
出处: Mobile Information Systems 2022 Vol.2022
摘要: With the increasing application of interactive processing systems at all levels, in order to better and efficiently spread the application range of in ...
作者: Shan,Chun1;Gong,Yinghui1;Xiong,Ling1;Liao,Shuyan2;Wang,Yuyang1; (1Beijing Key Laboratory Of Software Security Engineering Technology, School Of Computer Science & Technology, Beijing Institute Of Technology, Beijing, 100081, China;2School Of Cyberspace Science & Technology, Beijing Institute Of Technology, Beijing, 100081, China)
出处: Security and Communication Networks 2022 Vol.2022
摘要: To find out whether there is any vulnerability in software programs where conditional judgment is ignored, this article proposes a software vulnerabil ...
作者: Song,Lingfei1;Wang,Lizhi1;H. Kim,Min2;Huang,Hua3; (1School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China;2School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, South Korea;3School of Artificial Intelligence, Beijing Normal University, Beijing, China)
出处: IEEE Transactions on Computational Imaging 2022 Vol.8 P188-200
摘要: Coded aperture snapshot spectral imaging (CASSI) is based on the binary modulation of the spatial-spectral scene, which allows for hyperspectral image ...