咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是111-120 订阅
排序:
LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1-17页
作者: Xiaorui Zhang Rui Jiang Wei Sun Aiguo Song Xindong Wei Ruohan Meng Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China School of Instrument Science and Engineering Southeast UniversityNanjing211189China School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Science Engineering Nanyang Technological UniversitySingapore
Robust watermarking requires finding invariant features under multiple attacks to ensure correct *** learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attra... 详细信息
来源: 评论
Joint Bayesian guided metric learning for end-to-end face verification
收藏 引用
Neurocomputing 2018年 275卷 560-567页
作者: Di Chen Chunyan Xu Jian Yang Jianjun Qian Yuhui Zheng Linlin Shen School of Computer Science and Engineering Nanjing University of Science and Technology 210094 China Jiangsu Engineering Center of Network Monitoring School of computer and software Nanjing University of Information Science and Technology 210044 China School of Computer Science and Software Engineering Shenzhen University 518060 China
In this work, we address the problem of face verification, namely determining whether a pair of face images belongs to the same or different subjects. Previous works often consider solving the problem of face verifica... 详细信息
来源: 评论
The algorithm of preserving the spatial location of 3D image on android platform
收藏 引用
International Review on computers and software 2012年 第6期7卷 3227-3231页
作者: Gu, Yunhua Chen, Peipei Liu, Caisheng Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu University of Science and Technology Suzhou Institute of Technology China
On Android platform, direction sensor is used to induce the direction change of the device. With the change of the device direction, the spatial position of 3D image also changes. However, users usually expect that th... 详细信息
来源: 评论
3D Object Detection with Attention:Shell-Based Modeling
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 537-550页
作者: Xiaorui Zhang Ziquan Zhao Wei Sun Qi Cui School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada
LIDAR point cloud-based 3D object detection aims to sense the surrounding environment by anchoring objects with the Bounding Box(BBox).However,under the three-dimensional space of autonomous driving scenes,the previou... 详细信息
来源: 评论
Real-time image carrier generation based on generative adversarial network and fast object detection
Real-time image carrier generation based on generative adver...
收藏 引用
作者: Li, Chuanlong Sun, Xingming Zhou, Zhili Yang, Yimin School of Computer and Software Nanjing University of Information Science and Technology Ning Liu Road No. 219 Nanjing210044 China Jiangsu Engineering Centre of Network Monitoring Ning Liu Road No. 219 Nanjing210044 China Department of Computer Science Lakehead University Thunder Bay Canada
Image steganography aims to conceal the secret information inside another carrier image. And by embedding the information into the carrier image, the carrier image may suffer certain image distortion. Thus, not only t... 详细信息
来源: 评论
A Lightweight CNN Based on Transfer Learning for COVID-19 Diagnosis
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1123-1137页
作者: Xiaorui Zhang Jie Zhou Wei Sun Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing 210044 China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
The key to preventing the COVID-19 is to diagnose patients quickly and *** have shown that using Convolutional Neural networks(CNN)to analyze chest Computed Tomography(CT)images is helpful for timely COVID-19 ***,pers... 详细信息
来源: 评论
A Real-time Cutting Model Based on Finite Element and Order Reduction
收藏 引用
computer Systems Science & engineering 2022年 第10期43卷 1-15页
作者: Xiaorui Zhang Wenzheng Zhang Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in ***,this paper proposes a realtime cutting mo... 详细信息
来源: 评论
A WiFi-aware method for mobile data offloading with deadline constraints
A WiFi-aware method for mobile data offloading with deadline...
收藏 引用
作者: Tang, Wenda Wu, Chaobing Qi, Lianyong Zhang, Xuyun Xu, Xiaolong Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China School of Information Science and Engineering Chinese Academy of Education Big Data Qufu Normal University Rizhao China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With an increasing number of public WiFi hotspots have been constructed in metropolitan areas, citizens can leverage these WiFi hotspots to surf the Internet with their smart devices almost everywhere. Compared to cel... 详细信息
来源: 评论
A Balanced Cloudlet Management Method for Wireless Metropolitan Area networks  13th
A Balanced Cloudlet Management Method for Wireless Metropoli...
收藏 引用
13th EAI International Conference on Testbeds and Research Infrastructures for the Development of networks and Communities, TridentCom 2018
作者: Xu, Xiaolong Chen, Yuhao Qi, Lianyong He, Jing Zhang, Xuyun School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Information Science and Engineering Qufu Normal University Jining China Department of Electrical and Computer Engineering University of Auckland Auckland New Zealand
With the rapid development of wireless communication technology, cloudlet-based wireless metropolitan area network, which provides people with more convenient network services, has become an effiective paradigm to mee... 详细信息
来源: 评论
Collaborative filtering-based recommendation system for big data
Collaborative filtering-based recommendation system for big ...
收藏 引用
作者: Shen, Jian Zhou, Tianqi Chen, Lina Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Guangxi Key Laboratory of Cryptography and Information Security Guilin China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Guizhousheng College of Electronics and Information Guizhou China
Collaborative filtering algorithm is widely used in the recommendation system of e-commerce website, which is based on the analysis of a large number of users' historical behaviour data, so as to explore the users... 详细信息
来源: 评论