咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是101-110 订阅
排序:
Semantics-based text copy detection method supporting similarity ranking
Semantics-based text copy detection method supporting simila...
收藏 引用
第十二届全国信息隐藏暨多媒体信息安全学术大会
作者: FU Zhangjie SUN Xingming ZHOU Lu HUANG Fengxiao School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044
Text document is the most widely used medium on the ***, there are some emerging problems that cannot be neglected, such as plagiarism, reproduction of information content, illicit redistribution, and copyright disput... 详细信息
来源: 评论
Extracting Regular Behaviors from Social Media networks
Extracting Regular Behaviors from Social Media Networks
收藏 引用
International Conference on Multimedia Information networking and Security (MINES)
作者: Leiming Yan Jinwei Wang School of Computer & Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
Social media network analysis has become very popular in recent years. How do real networks evolve over time? What are the normal evolving behaviors in a social media network? In order to extract behaviors occurring r... 详细信息
来源: 评论
A Similarity Search Method for Encrypted Cloud Document
A Similarity Search Method for Encrypted Cloud Document
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Jiangang Shu Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
The increasing popularity of cloud computing makes the data owner to outsource sensitive data in encrypted form onto the cloud. To tackle the problem of searching over encrypted cloud data, many keyword-based searchab... 详细信息
来源: 评论
Document Attribute-Based Keyword Search over Encrypted Data
Document Attribute-Based Keyword Search over Encrypted Data
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Jie Xi Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
As the cloud computing popularizes, sensitive data need to be encrypted before outsourcing, which makes the traditional data utilization useless. So search over these encrypted documents is a very challenging task. Th... 详细信息
来源: 评论
Secure Storage of Data in Cloud Computing
Secure Storage of Data in Cloud Computing
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Xinyue Cao Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
Cloud storage brings convenient storage of data, at the same time there are also hidden security issues. Data storage security includes legal access to the data stored in the cloud, namely access authorization and aut... 详细信息
来源: 评论
Notice of Violation of IEEE Publication Principles: Data Access Control for Multi-authority Cloud Storage Systems
Notice of Violation of IEEE Publication Principles: Data Acc...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Lin Xin Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
Notice of Violation of IEEE Publication Principles "Data Access Control for Multi-Authority Cloud Storage Systems" by Zhangjie Fu, Lin Xin, Jin Wang, Xingming Sun in the Proceedings of the Tenth Internationa...
来源: 评论
A new combination prediction model for short-term wind farm output power based on meteorological data collected by WSN
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第1期7卷 171-180页
作者: Ma, Li Li, Bo Yang, Zhen Bin Du, Jie Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China CMA Public Meteorological Service Centre Beijing 100081 China
The prediction of wind farm output power is considered as an effective way to increase the wind power capacity and improve the safety and economy of power system. It is one of the hot research topics on wind power. Th... 详细信息
来源: 评论
Fast Mesh Reconstruction from Single View Based on GCN and Topology Modification
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1695-1709页
作者: Xiaorui Zhang Feng Xu Wei Sun Yan Jiang Yi Cao Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorONN9B 3P4Canada
3D reconstruction based on single view aims to reconstruct the entire 3D shape of an object from one *** existing methods reconstruct the mesh surface of complex objects,the surface details are difficult to predict an... 详细信息
来源: 评论
Learning from crowdsourced labeled data: a survey
收藏 引用
Artificial Intelligence Review 2016年 第4期46卷 543-576页
作者: Zhang, Jing Wu, Xindong Sheng, Victor S. School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China School of Computer Science and Information Engineering Hefei University of Technology Hefei 230009 China Department of Computer Science University of Central Arkansas Conway 72035 AR United States Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
With the rapid growing of crowdsourcing systems, quite a few applications based on a supervised learning paradigm can easily obtain massive labeled data at a relatively low cost. However, due to the variable uncertain... 详细信息
来源: 评论
Digital continuity guarantee of electronic record based on data usability in big data environment  4th
Digital continuity guarantee of electronic record based on d...
收藏 引用
4th International Conference on Cloud Computing and Security, ICCCS 2018
作者: Xu, Jiang Zhang, Jian Ren, Yongjun Kim, Hye-Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Business Administration Research Institute Sungshin W. University Seoul Korea Republic of
At present some developed countries have put forward their digital continuity action plans. And the digital continuity has also become a hot spot in the research of electronic records. However, the technology and meas... 详细信息
来源: 评论