咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是111-120 订阅
排序:
Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural network and Principal Component Analysis
收藏 引用
computers, Materials & Continua 2017年 第4期53卷 357-372页
作者: Chengsheng Yuan Xinting Li Q.M.Jonathan Wu Jin Li Xingming Sun School of Computer and Software Nanjing University of Information Science&TechnologyNing Liu RoadNo.219NanjingChina210044 Jiangsu Engineering Center of Network Monitoring Ning Liu RoadNo.219NanjingChina210044 Department of Electrical and Computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityYudongxi Road 36Tianhe DistrictGuangzhouChina510500
Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints,which are made of common fingerprint materials,such as silicon,latex,***,to protect our privacy,many finge... 详细信息
来源: 评论
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing
Outsourced data modification algorithm with assistance of mu...
收藏 引用
作者: Shen, Jian Shen, Jun Li, Xiong Wei, Fushan Li, Jiguo Department of Jiangsu Engineering Center of Network Monitoring Jiangsu210044 China Technology and Engineering Center of Meteorological Sensor Network Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing Jiangsu210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Hunan University of Science and Technology Hunan410082 China PLA Information Engineering University Henan450002 China Hohai University Nanjing210098 China
The rapid development of cloud storage has caused a wave of research craze. To improve cloud user experience, a large number of schemes are proposed with various practical performances, like long-term correct ensurenc... 详细信息
来源: 评论
A Multi-Objective Data Placement Method for IoT Applications Over Big Data Using NSGA-II
A Multi-Objective Data Placement Method for IoT Applications...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Xiaolong Xu Renhao Gu Yuan Yuan Kai Peng Yadang Chen Wanchun Dou Alex X. Liu Department of Computer Science and Engineering Michigan State University MI USA Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Engineering Huaqiao University Quanzhou Fujian China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
The Internet of Things has been developing fast since it connects various devices for human beings to use, monitor or configure these devices, which brings great convenience. Generally, the big data generated by the s... 详细信息
来源: 评论
An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area networks
An Energy-Aware Virtual Machine Scheduling Method for Cloudl...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Xiaolong Xu Yuancheng Li Yuan Yuan Kai Peng Wenbin Yu Wanchun Dou Alex X. Liu Department of Computer Science and Engineering Michigan State University MI USA Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Engineering Huaqiao University Quanzhou Fujian China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Currently, mobile applications, such as interactive gaming, virtual reality, and natural language processing, are becoming more computational intensive, but the computing capacity of mobile devices is limited. An effe... 详细信息
来源: 评论
A fibonacci based batch auditing protocol for cloud data  1
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Shen, Jian Shen, Jun Wang, Chen Wang, Anxi Jiangsu Engineering Center of Network Monitoring Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch a... 详细信息
来源: 评论
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA
收藏 引用
China Communications 2016年 第7期13卷 60-65页
作者: Chengsheng Yuan Xingming Sun Rui Lv School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick ... 详细信息
来源: 评论
Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences
收藏 引用
China Communications 2016年 第7期13卷 66-73页
作者: Xianyi Chen Guangyong Gao Dandan Liu Zhihua Xia Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science & Technology School of Information Science & Technology Jiujiang University
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public *** paper concentrates on steganalysis against spatial least significant bit(LSB) matching,whi... 详细信息
来源: 评论
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
收藏 引用
China Communications 2016年 第7期13卷 92-99页
作者: Zhihua Xia Liangao Zhang Dandan Liu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribu... 详细信息
来源: 评论
: a QoS-based energy-aware task scheduling method in cloud environment
收藏 引用
Cluster Computing 2017年 第4期20卷 3199-3212页
作者: Xue, Shengjun Zhang, Yiyun Xu, Xiaolong Xing, Guowen Xiang, Haolong Ji, Sai Jiangsu Engineering Center of Network Monitoring of Nanjing University of Information Science&Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Currently, energy consumption for cloud data centers has attracted much attention from both industry and academia. Meanwhile, it is also important to satisfy the customers’ quality of service (QoS) for cloud service ...
来源: 评论
Security analysis of delegable and proxy provable data possession in public cloud storage
收藏 引用
Journal of computers (Taiwan) 2017年 第4期28卷 23-30页
作者: Ren, Yong-Jun Shen, Jian Wang, Jin Fang, Li-Ming Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China School of Information Engineering Yangzhou University Yangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data con-fidentiality, inte... 详细信息
来源: 评论