咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是21-30 订阅
排序:
Data access control for multi-authority cloud storage systems
Data access control for multi-authority cloud storage system...
收藏 引用
10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
作者: Fu, Zhangjie Xin, Lin Wang, Jin Sun, Xingming School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is one of the most suitable technologies for data access control in cloud storage systems. This paper firstly presents the Attribute-based Encryption (ABE), secure... 详细信息
来源: 评论
A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things
收藏 引用
computers, Materials & Continua 2019年 第3期58卷 679-695页
作者: Baowei Wang Weiwen Kong Wei Li Neal NXiong Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Engineering Research Center of Electronic Information and Control from Fujian Provincial Education Department Fuzhou350108China Department of Mathematics and Computer Science Northeastern State UniversityOklahomaUSA.
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things **... 详细信息
来源: 评论
A Method for Improving CNN-Based Image Recognition Using DCGAN
收藏 引用
computers, Materials & Continua 2018年 第10期57卷 167-178页
作者: Wei Fang Feihong Zhang Victor S.Sheng Yewen Ding School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Lab.for Novel Software Technology Nanjing UniversityNanjing210023China Computer Science Department University of Central ArkansasConway AR72035USA
Image recognition has always been a hot research topic in the scientific community and *** emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vi... 详细信息
来源: 评论
Deep Learning for Object Detection:A Survey
收藏 引用
computer Systems Science & engineering 2021年 第8期38卷 165-182页
作者: Jun Wang Tingjuan Zhang Yong Cheng Najla Al-Nabhan Science and Technology Industry Department Nanjing University of Information Science&Technology210044China School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&Technology210044China Department Computer Science King Saud UniversityRiyadhKSA
Object detection is one of the most important and challenging branches of computer vision,which has been widely applied in people s life,such as monitoring security,autonomous driving and so on,with the purpose of loc... 详细信息
来源: 评论
Efficient sampling methods for characterizing POIs on maps based on road networks
收藏 引用
Frontiers of computer Science 2018年 第3期12卷 582-592页
作者: Ziting ZHOU Pengpeng ZHAO Victor S. SHENG Jiajie XU Zhixu LI Jian WU Zhiming CUI School of Computer Science and Technology Soochow University Suzhou 215006 China Department of Computer Science University of Central Arkansas Conway AR 72035 USA Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China
With the rapid development of location-based services, a particularly important aspect of start-up marketing research is to explore and characterize points of interest (PoIs) such as restaurants and hotels on maps. ... 详细信息
来源: 评论
Analysis and Improvement of Steganography Protocol Based on Bell States in Noise Environment
收藏 引用
computers, Materials & Continua 2019年 第5期59卷 607-624页
作者: Zhiguo Qu Shengyao Wu Wenjie Liu Xiaojun Wang Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer&Software Nanjing University of Information Science and TechnologyNanjing210044China School of Electronic Engineering Dublin City UniversityDublinIreland
In the field of quantum communication,quantum steganography is an important branch of quantum information *** a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safet... 详细信息
来源: 评论
An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2020年 第10期65卷 743-760页
作者: Peipeng Yu Zhihua Xia Jianwei Fei Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareJiangsu Engineering Center of Network MonitoringJiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologyNanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Coronaviruses are a well-known family of viruses that can infect humans or ***,the new coronavirus(COVID-19)has spread *** countries in the world are working hard to control the coronavirus ***,many countries are face... 详细信息
来源: 评论
A New Sequential Image Prediction Method Based on LSTM and DCGAN
收藏 引用
computers, Materials & Continua 2020年 第7期64卷 217-231页
作者: Wei Fang Feihong Zhang Yewen Ding Jack Sheng School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023China Department of Economics FinanceInsurance and Risk Management University of Central ArkansasConway72035USA
Image recognition technology is an important field of artificial *** with the development of machine learning technology in recent years,it has great researches value and commercial *** a matter of fact,a single recog... 详细信息
来源: 评论
Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with Multi-UGV  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Jian Tan, Ling Zhuang, Wei College of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China
Prolonging the lifetime of wireless sensor networks (WSNs) is a crucial issue referring to energy conservation or balancing of data collection. In this paper, we propose an optimal algorithm for data collection using ... 详细信息
来源: 评论
Vehicle Re-Identication Model Based on Optimized DenseNet121 with Joint Loss
收藏 引用
computers, Materials & Continua 2021年 第6期67卷 3933-3948页
作者: Xiaorui Zhang Xuan Chen Wei Sun Xiaozheng He Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China Department of Civil and Environmental Engineering Rensselaer Polytechnic InstituteTroyNY12180USA
With the increasing application of surveillance cameras,vehicle re-identication(Re-ID)has attracted more attention in the eld of public *** Re-ID meets challenge attributable to the large intra-class differences cause... 详细信息
来源: 评论