咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是121-130 订阅
排序:
An effective scheme for biometric cryptosystems  2
An effective scheme for biometric cryptosystems
收藏 引用
2nd IEEE International Conference on computer and Communications, ICCC 2016
作者: Zhou, Yu Zhao, Bo Han, Jin Jun, Zheng School of Computer Science and Software Engineering East China Normal University Shanghai China School of Software and Microelectronics Peking University Beijing China Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Compared with traditional cryptography, biometric cryptosystems provide more convenient and safe protection of keys. In this paper, an effective scheme for biometric cryptosystems based on the intersections of hyper-p... 详细信息
来源: 评论
Classification based on brain storm optimization algorithm  11th
Classification based on brain storm optimization algorithm
收藏 引用
11th International Conference on Bio-inspired Computing – Theories and Applications, BIC-TA 2016
作者: Xue, Yu Tang, Tao Ma, Tinghuai Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
As one of the important issues of data classification, classification has attracted the attention of many researchers in the field of data mining. Different from clustering research issues, in classification research ... 详细信息
来源: 评论
A practical RFID grouping authentication protocol in multiple-tag arrangement with adequate security assurance  18
A practical RFID grouping authentication protocol in multipl...
收藏 引用
18th International Conference on Advanced Communications Technology, ICACT 2016
作者: Shen, Jian Tan, Haowen Ren, Yongjun Liu, Qi Wang, Baowei Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
Radio Frequency Identification (RFID) is considered to be an authentication technology of great potential. Due to the bright future of low-cost RFID tags in practical situations, the authentication towards multiple ta... 详细信息
来源: 评论
Splicing Detection for Color Images based on QDCT Markov
Splicing Detection for Color Images based on QDCT Markov
收藏 引用
第十三届全国信息隐藏暨多媒体信息安全学术大会
作者: WANG Jinwei LIU Renfeng Jiangsu Network Monitoring Engineering Center Department of Computer and SoftwareNanjing University of Information Science and Technology Nanjing
With the increasing amount of splicing images, many detecting methods of splicing images are *** this paper, we propose a splicing detection scheme based on quaternion discrete cosine transform (QDCT).Compared to most... 详细信息
来源: 评论
Multi-objective layout optimization of a satellite module using the Wang-Landau sampling method with local search
收藏 引用
Frontiers of Information Technology & Electronic engineering 2016年 第6期17卷 527-542页
作者: Jing-fa LIU Liang HAO Gang LI Yu XUE Zhao-xia LIU Juan HUANG Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing 210044China School of Computer&Software Nanjing University of Information Science&TechnologyNanjing 210044China School of Mathematics and Statistics Nanjing University of Information Science&TechnologyNanjing 210044China Office of lnformationization Construction and Management Nanjing University of Information Science&TechnologyNanjing 210044China
The layout design of satellite modules is considered to be NP-hard. It is not only a complex coupled system design problem but also a special multi-objective optimization problem. The greatest challenge in solving thi... 详细信息
来源: 评论
Towards Efficient Content-aware Search over Encrypted Outsourced Data in Cloud
Towards Efficient Content-aware Search over Encrypted Outsou...
收藏 引用
Annual IEEE International Conference on computer Communications
作者: Zhangjie Fu Xingming Sun Sai Ji Guowu Xie College of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Department of Computer Science and Engineering University of California Riverside
With the increasing adoption of cloud computing, a growing number of users outsource their datasets into cloud. The datasets usually are encrypted before outsourcing to preserve the privacy. However, the common practi... 详细信息
来源: 评论
Learning from crowdsourced labeled data: a survey
收藏 引用
Artificial Intelligence Review 2016年 第4期46卷 543-576页
作者: Zhang, Jing Wu, Xindong Sheng, Victor S. School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China School of Computer Science and Information Engineering Hefei University of Technology Hefei 230009 China Department of Computer Science University of Central Arkansas Conway 72035 AR United States Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
With the rapid growing of crowdsourcing systems, quite a few applications based on a supervised learning paradigm can easily obtain massive labeled data at a relatively low cost. However, due to the variable uncertain... 详细信息
来源: 评论
Combiningwavelet transform and LBP related features for fingerprint liveness detection
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2016年 第3期43卷 290-298页
作者: Xia, Zhihua Yuan, Chengsheng Sun, Xingming Sun, Decai Rui, L. Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and SoftwareNanjing University of Information Science and Technology Nanjing China College of Information Science and Technology Bohai University China
Fingerprint authentication system may verify the identity of the user according to the features of fingerprint. It has been widely used in government departments and national security departments. However, there are s... 详细信息
来源: 评论
Multi-keyword ranked search over encrypted cloud data supporting semantic extension
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2016年 第8期11卷 107-120页
作者: Xia, Zhihua Chen, Li Sun, Xingming Liu, Jianxiao Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science & Technology Nanjing210044 China College of informatics Huazhong Agricultural University Hubei China
With the emergence of cloud computing, many data owners outsource their local data to cloud server so as to enjoy high-quality data storage services. For the protection of data privacy, sensitive data has to be encryp... 详细信息
来源: 评论
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme
收藏 引用
Frontiers of physics 2015年 第2期10卷 73-78页
作者: 季赛 王芳 刘文杰 袁晓敏 Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is... 详细信息
来源: 评论