咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是131-140 订阅
排序:
Consensus algorithms for biased labeling in crowdsourcing
收藏 引用
Information Sciences 2017年 382-383卷 254-273页
作者: Jing Zhang Victor S. Sheng Qianmu Li Jian Wu Xindong Wu School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 P. R. China Key Laboratory of Image and Video Understanding for Social Safety Nanjing University of Science and Technology Nanjing 210094 P. R. China Department of Computer Science University of Central Arkansas Conway AR 72035 USA Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 P. R. China Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 P. R. China School of Computing and Informatics University of Louisiana at Lafayette LA 70504 USA
Although it has become an accepted lay view that when labeling objects through crowdsourcing systems, non-expert annotators often exhibit biases, this argument lacks sufficient evidential observation and systematic em...
来源: 评论
An enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection
收藏 引用
Journal of computers (Taiwan) 2016年 第4期27卷 121-129页
作者: Shen, Jian Chang, Shaohua Tan, Haowen Ji, Sai Wang, Jin Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID syst... 详细信息
来源: 评论
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
收藏 引用
Multimedia Tools and Applications 2017年 第21期76卷 22785-22785页
作者: Shen, Jian Tan, Haowen Zhang, Yan Sun, Xingming Xiang, Yang Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science and Technology Nanjing China School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Simula Research Laboratory of Norway and the Department of Informatics University of Oslo Oslo Norway Center for Cyber Security Research Deakin University Deakin Australia
来源: 评论
A new energy landscape paving heuristic for satellite module layouts
收藏 引用
Frontiers of Information Technology & Electronic engineering 2016年 第10期17卷 1031-1043页
作者: Jing-fa LIU Juan HUANG Gang LI Wen-jie LIU Ting-zhao GUAN Liang HAO Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China School of Computer & Software Nanjing University of Information Science & Technology Nanjing 210044 China School of Mathematics and Statistics Nanfing University of Information Science & Technology Nanjing 210044 China Office of lnformationization Construction and Management Nanjing University of lnformation Science & Technology Nanjing 210044 China
This article describes a study of the satellite module layout problem (SMLP), which is a three-dimensional (3D) layout optimization problem with performance constraints that has proved to be non-deterministic poly... 详细信息
来源: 评论
A heuristic scheduling algorithm based on PSO in the cloud computing environment
收藏 引用
International Journal of Future Generation Communication and networking 2016年 第1期9卷 349-362页
作者: Xue, Shengjun Shi, Wenling Xu, Xiaolong School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
In the face of a large number of task requests submitted by users, the data center in the cloud need not only to finish these massive tasks but also to satisfy the user's service demand. How to dividethe resources... 详细信息
来源: 评论
Fingerprint liveness detection using difference co-occurrence matrix based texture features
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2016年 第11期11卷 1-16页
作者: Xia, Zhihua Yuan, Chengsheng Sun, Xingming Lv, Rui Sun, Decai Gao, Guangyong Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China College of Information Science and Technology Bohai University Jinzhou121013 China School of Information Science and Technology Jiujiang University Jiujiang332005 China
Fingerprint authentication systems have been widely deployed in both civilian and government applications, however, whether fingerprint authentication systems is security or not has been an important issue under fraud... 详细信息
来源: 评论
A packet loss tolerated method for data integrity protection in wireless sensor networks
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2016年 第7期11卷 1-12页
作者: Wang, Baowei Yan, Jingzhou Li, Tao Sun, Xingming Ma, Li School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science & Technology Nanjing210044 China
Among existing watermarking methods for data integrity protection in wireless sensor networks (WSNs), the problem of packet loss has not been considered. Most of methods treat packet loss as anomaly attacks, hardly be... 详细信息
来源: 评论
2C-CTP: A centralized clustering data collection protocol based on CTP
收藏 引用
International Journal of Smart Home 2016年 第9期10卷 179-196页
作者: Xu, Lingyun Li, Tao Wang, Baowei Sun, Xingming You, Xingang Zhu, Yanhua Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China College of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Beijing Institute of Electronic Technology Application Beijing100091 China College of Languages and Cultures Nanjing University of Information Science and Technology Nanjing210044 China
WSN (wireless sensor network) is widely applied in environmental monitoring, assets tracking, battlefield monitoring and smart building. Since nodes in WSN are constrained by finite battery power and operational capab... 详细信息
来源: 评论
Coverless image steganography without embedding  1st
Coverless image steganography without embedding
收藏 引用
1st International Conference on Cloud Computing and Security, ICCCS 2015
作者: Zhou, Zhili Sun, Huiyu Harit, Rohan Chen, Xianyi Sun, Xingming School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science New York University New YorkNY10012 United States
The traditional image steganography technologies designate a cover image and embed secret data into it to form the stego-image. However, the modification traces caused by the embedding will be left in the cover image,... 详细信息
来源: 评论
Security system construction of land and resources network based on intrusion detection  8
Security system construction of land and resources network b...
收藏 引用
8th International Conference on BioMedical engineering and Informatics, BMEI 2015
作者: Shen, Chao Chen, Zhongyang Xue, Yu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NUIST Nanjing China School of Computer and Software Nanjing University of Information Science and Technology NUIST Nanjing China
Intrusion detection can decide whether there are dangerous user behaviors. It can also timely detect network security vulnerabilities of inner attacks, and it can make quick response and improve network security. Ther... 详细信息
来源: 评论