CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共152条,第1-10条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
A cross-lingual transfer learning method for online COVID-19-related hate speech detection 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 卷号: 234, 页码: 11
作者:  Liu, Lin;  Xu, Duo;  Zhao, Pengfei;  Zeng, Daniel Dajun;  Hu, Paul Jen-Hwa;  Zhang, Qingpeng;  Luo, Yin;  Cao, Zhidong
收藏  |  浏览/下载:116/0  |  提交时间:2023/11/16
COVID-19  Deep learning  Cross-lingual  Hate speech detection  Natural language processing  
Boosting deep cross-modal retrieval hashing with adversarially robust training 期刊论文
APPLIED INTELLIGENCE, 2023, 页码: 13
作者:  Zhang, Xingwei;  Zheng, Xiaolong;  Mao, Wenji;  Zeng, Daniel Dajun
收藏  |  浏览/下载:79/0  |  提交时间:2023/11/17
Cross-modal retrieval  Adversarial training  Deep hashing model  Deep neural network  
Optimal adaptive nonpharmaceutical interventions to mitigate the outbreak of respiratory infections following the COVID-19 pandemic: a deep reinforcement learning study in Hong Kong, China 期刊论文
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2023, 页码: 9
作者:  Yao, Yao;  Zhou, Hanchu;  Cao, Zhidong;  Zeng, Daniel Dajun;  Zhang, Qingpeng
收藏  |  浏览/下载:75/0  |  提交时间:2023/11/17
Covid-19  reinforcement learning  artificial intelligence  machine learning  mathematical modelling  infectious diseases  
Robust Monitor for Industrial IoT Condition Prediction 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2023, 卷号: 10, 期号: 10, 页码: 8618-8629
作者:  Zhang, Xingwei;  Tian, Hu;  Zheng, Xiaolong;  Zeng, Daniel Dajun
收藏  |  浏览/下载:51/0  |  提交时间:2023/11/17
Perturbation methods  Monitoring  Industrial Internet of Things  Training  Predictive models  Robustness  Temperature sensors  Adversarial perturbation  adversarial training  Industrial Internet of Things (IIoT)  machine learning (ML)  temporal convolutional network (TCN)  
A Deep Learning Approach for Semantic Analysis of COVID-19-Related Stigma on Social Media 期刊论文
IEEE Transactions on Computational Social Systems, 2023, 页码: 246-254
作者:  Liu, Lin;  Cao, Zhidong;  Zhao, Pengfei;  Paul Jen-Hwa Hu;  Zeng, Dajun;  Luo, Yin
Adobe PDF(2871Kb)  |  收藏  |  浏览/下载:92/25  |  提交时间:2023/05/30
Coronavirus disease of 2019 (COVID-19)  deep learning  public sentiment analysis  social media  social stigma  
CRule: Category-Aware Symbolic Multi-Hop Reasoning on Knowledge Graphs 期刊论文
IEEE Intelligent Systems, 2023, 页码: 1-9
作者:  Wang, Zikang;  Li, Linjing;  Li, Jinlin;  Zhao, Pengfei;  Zeng, Daniel
Adobe PDF(529Kb)  |  收藏  |  浏览/下载:82/25  |  提交时间:2023/07/28
Time-varying effects of search engine advertising on sales-An empirical investigation in E-commerce 期刊论文
DECISION SUPPORT SYSTEMS, 2022, 卷号: 163, 页码: 15
作者:  Yang, Yanwu;  Zhao, Kang;  Zeng, Daniel Dajun;  Jansen, Bernard Jim
收藏  |  浏览/下载:193/0  |  提交时间:2022/11/21
Online advertising  Electronic commerce  Advertising analytics  Business intelligence  
ASCL: Adversarial supervised contrastive learning for defense against word substitution attacks 期刊论文
NEUROCOMPUTING, 2022, 卷号: 510, 页码: 59-68
作者:  Shi, Jiahui;  Li, Linjing;  Zeng, Daniel
Adobe PDF(1054Kb)  |  收藏  |  浏览/下载:218/25  |  提交时间:2022/11/14
Adversarial example  Adversarial training  Model robustness  Contrastive learning  Natural language processing  
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement 期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:  Zhao, Pengfei;  Li, Shuangqi;  Hu, Paul Jen-Hwa;  Cao, Zhidong;  Gu, Chenghong;  Xie, Da;  Zeng, Daniel Dajun
收藏  |  浏览/下载:200/0  |  提交时间:2022/11/14
Transportation  Computer crime  Renewable energy sources  Smart cities  Vehicle-to-grid  Uncertainty  Turbines  Cyber-attack  cyber security  electric vehicle  false data injection attacks  multi-energy system  smart city manage-ment  social effort  
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
作者:  Zhang, Xingwei;  Zheng, Xiaolong;  Mao, Wenji;  Zeng, Daniel Dajun;  Wang, Fei-Yue
收藏  |  浏览/下载:225/0  |  提交时间:2022/11/14
Perturbation methods  Semantics  Computational modeling  Codes  Task analysis  Privacy  Software  Adversarial perturbation  deep neural network (DNN)  privacy protection  semantic retrieval