咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是171-180 订阅
排序:
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第1期1卷 43-48页
作者: Ruohan Meng Zhili Zhou Qi Cui Xingming Sun Chengsheng Yuan School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and computer Engineering University of WindsorWindsorONCanada N9B 3P4
At present,the coverless information hiding has been ***,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless i... 详细信息
来源: 评论
A chinese character segmentation algorithm for complicated printed documents
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2013年 第3期6卷 91-100页
作者: Mei, Yuan Wang, Xinhui Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
The character segmentation technology for printed documents plays an important role in optical character recognition, ticket information identification, postal code identification, automatic license plate recognition ... 详细信息
来源: 评论
Quantum Privacy-Preserving Price E-Negotiation
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Li, Chun-Tang Zheng, Yu Xu, Yong Xu, Yin-Song Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China
Privacy-preserving price e-negotiation (3PEN) is an important topic of secure multi-party computation (SMC) in the electronic commerce field, and the key point of its security is to guarantee the privacy of seller’s ... 详细信息
来源: 评论
A copyright protection method for wireless sensor networks based on digital watermarking
收藏 引用
International Journal of Hybrid Information Technology 2015年 第6期8卷 257-268页
作者: Wang, Baowei Su, Jianwei Zhang, Youdong Wang, Biqiang Shen, Jian Ding, Qun Sun, Xingming School of Computer and software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China Department of Computer Engineering Huaiyin Institute of Technology Huaian223003 China Hubei Meteorological Service Center Wuhan430074 China
Wireless sensor networks are composed of numerous sensor nodes in the monitored area, which have been well applied in various practical areas. In these applications, data security from sensors has been threatened. The... 详细信息
来源: 评论
An enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection
收藏 引用
Journal of computers (Taiwan) 2016年 第4期27卷 121-129页
作者: Shen, Jian Chang, Shaohua Tan, Haowen Ji, Sai Wang, Jin Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID syst... 详细信息
来源: 评论
Security data auditing based on multifunction digital watermark for multimedia file in cloud storage
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2014年 第9期9卷 231-240页
作者: Ren, Yongjun Shen, Jian Wang, Jin Xu, Jiang Fang, Liming Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. In cloud computing, data owners host their data on cloud server... 详细信息
来源: 评论
Real-time human cross-race aging-related face appearance detection with deep convolution architecture
Real-time human cross-race aging-related face appearance det...
收藏 引用
作者: Tian, Qing Zhang, Wenqiang Mao, Junxiang Yin, Hujun School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics and Astronautics Nanjing China School of Electrical and Electronic Engineering The University of Manchester Manchester United Kingdom
Human age estimation (AE) is an emerging research topic in computer vision and machine learning and has attracted increasing amount of research due its wide potential applications. In the process of human aging, facia... 详细信息
来源: 评论
A feature selection algorithm based on Hoeffding inequality and mutual information
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第11期8卷 433-444页
作者: Yin, Chunyong Feng, Lu Ma, Luyu Yin, Zhichao Wang, Jin School of Computer and Software Jiangsu Key Laboratory of Meteorological Observation and Information Processing Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School Nanjing China
With the rapid development of the Internet, the application of data mining in the Internet is becoming more and more extensive. However, the data source’s complex feature redundancy leads that data mining process bec... 详细信息
来源: 评论
Privacy-preserving image retrieval based on additive secret sharing
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Xiong, Lizhi Zhou, Wenhao Weng, Jian Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Jinan University Guangzhou510632 China
The rapid growth of digital images motivates individuals and organizations to upload their images to the cloud server. To preserve the privacy, image owners would prefer to encrypt the images before uploading, but it ... 详细信息
来源: 评论
Hybrid Multiplicative Watermarking and Its Decoders
Hybrid Multiplicative Watermarking and Its Decoders
收藏 引用
International Conference on Multimedia Information networking and Security (MINES)
作者: Jinwei Wang Shiguo Lian Leiming Yan Yuxiang Wang Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China France Telecom Research and Development Orange Laboratories Beijing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With the rapid development and the richer content of the Internet, the copyright protection of the works should be further developed. The watermarking has become a possible solution. In this paper, firstly, a novel hy... 详细信息
来源: 评论