咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是91-100 订阅
排序:
Study on Initial Alignment Under Large Misalignment Angle
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第3期1卷 95-108页
作者: Qi Wang Changsong Yang Shaoen Wu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA School of Automation Nanjing University of Information Science and TechnologyNanjing210044China
Misalignment angle error model describing the SINS mathematical platform error is presented in this paper following the idea of small misalignment angle error model and large azimuth misalignment angle error *** can b... 详细信息
来源: 评论
Quantum Algorithm for Appointment Scheduling
收藏 引用
Journal of Quantum Computing 2019年 第2期1卷 111-118页
作者: Wenbin Yu Yinsong Xu Wenjie Liu Alex Xiangyang Liu Baoyu Zheng Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering Michigan State UniversityEast LansingMI 48824-1266USA National Engineering Research Center for Communications and Network Technology Nanjing University of Posts and TelecommunicationsNanjing210003China
Suppose a practical scene that when two or more parties want to schedule anappointment, they need to share their calendars with each other in order to make itpossible. According to the present result the whole communi... 详细信息
来源: 评论
Quantum Multi-User Detection Based on Coherent State Signals
收藏 引用
Journal of Quantum Computing 2019年 第2期1卷 81-88页
作者: Wenbin Yu Yinsong Xu Wenjie Liu Alex Xiangyang Liu Baoyu Zheng Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering Michigan State UniversityEast LansingMI 48824-1266USA National Engineering Research Center for Communications and Network Technology Nanjing University of Posts and TelecommunicationsNanjing210003China
Multi-user detection is one of the important technical problems for moderncommunications. In the field of quantum communication, the multi-access channel onwhich we apply the technology of quantum information processi... 详细信息
来源: 评论
A Survey of Image Information Hiding Algorithms Based on Deep Learning
收藏 引用
computer Modeling in engineering & Sciences 2018年 第12期117卷 425-454页
作者: Ruohan Meng Qi Cui Chengsheng Yuan School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONN9B 374Canada.
With the development of data science and technology,information security has been further *** order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algo... 详细信息
来源: 评论
Full-Blind Delegating Private Quantum Computation
收藏 引用
computers, Materials & Continua 2018年 第8期56卷 211-223页
作者: Wenjie Liu Zhenyu Chen Jinsuo Liu Zhaofeng Su Lianhua Chi Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China State Grid Electric Power Research Institute NARI Group CorporationNanjing210003China Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology SydneyNSW2007Australia Department of Computer Science and Information Technology La Trobe UniversityVIC3086Australia
The delegating private quantum computation(DQC)protocol with the universal quantum gate set{X,Z,H,P,R,CNOT}was firstly proposed by Broadbent et al.[Broadbent(2015)],and then Tan et al.[Tan and Zhou(2017)]tried to put ... 详细信息
来源: 评论
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover *** secret messag... 详细信息
来源: 评论
Coverless steganography based on english texts using binary tags protocol
Coverless steganography based on english texts using binary ...
收藏 引用
作者: Wu, Yulei Chen, Xianyi Sun, Xingming Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
Information hiding is an evolving and challenging research field. Lately, a novel information hiding method that utilizes the original cover without modification to transmit secret messages has raised attention of the... 详细信息
来源: 评论
Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm
收藏 引用
Journal of Quantum Computing 2019年 第1期1卷 1-8页
作者: Yajie Sun Yanqing Yuan Qi Wang Sai Ji Lihua Wang Shaoen Wu Jie Chen Qin Zhang Jiangsu engineering Centre of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information and Control Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA
A method is proposed based on the transmissibility function and the OnlineSequence Extreme Learning Machine (OS-ELM) algorithm, which is applied to theimpact damage of composite materials. First of all, the transmissi... 详细信息
来源: 评论
Coverless Image Steganography Method Based on Feature Selection
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第2期1卷 49-60页
作者: Anqi Qiu Xianyi Chen Xingming Sun Shuai Wang Guo Wei School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Radiology and BRIC University of North Carolina at Chapel HillNorth Carolina27599USA Mathematics and Computer Science University of North Carolina at PembrokeNorth Carolina28372USA
A new information hiding technology named coverless information hiding is *** uses original natural images as stego images to represent secret *** focus of coverless image steganography method is how to represent imag... 详细信息
来源: 评论
Coverless Information Hiding Based on the Molecular Structure Images of Material
收藏 引用
computers, Materials & Continua 2018年 第2期54卷 197-207页
作者: Yi Cao Zhili Zhou Xingming Sun Chongzhi Gao School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNO.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityWaihuanxi RoadNo.230Guangzhou510006China
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the *** this way,it is hard to resist the detection of steganalysi... 详细信息
来源: 评论