咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是21-30 订阅
排序:
An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud-edge computing
An incentive mechanism for crowdsourcing markets with social...
收藏 引用
作者: Xu, Xiaolong Cai, Qing Zhang, Guoming Zhang, Jie Tian, Wei Zhang, Xiaorui Liu, Alex X. School of Computer and Software Nanjing University of Information Science and Technology Jiangsu China Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Jiangsu China Department of Computer Science and Engineering Michigan State University MI United States
Crowdsourcing is emerging as a powerful paradigm that utilizes the distributed devices to sense, collect, and upload data to satisfy the requirements of the users. Currently, with the popularity of edge computing, edg... 详细信息
来源: 评论
A Novel Steganography Algorithm Based on Instance Segmentation
收藏 引用
computers, Materials & Continua 2020年 第4期63卷 183-196页
作者: Ruohan Meng Qi Cui Zhili Zhou Chengsheng Yuan Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorCanada
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... 详细信息
来源: 评论
An efficient and secure arbitrary N-party quantum key agreement protocol using Bell states
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Xu, Yong Yang, Ching-Nung Gao, Pei-Pei Yu, Wen-Bin Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien974 Taiwan
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. [Quantum Inf. Process. 13, 2391(2014)]. However, Zhu et al. pointed out that there are some security f... 详细信息
来源: 评论
Malicious Clients and Contribution Co-Aware Federated Unlearning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Wang, Yang Li, Xue Chen, Siguang Nanjing University of Posts and Telecommunications Jiangsu Engineering Research Center of Communication and Network Technology Nanjing China Women’s Hospital of Nanjing Medical University Nanjing Women and Children’s Healthcare Hospital Department of Dermatology Nanjing China Hohai University College of Computer Science and Software Engineering Nanjing China
Existing federated unlearning methods to eliminate the negative impact of malicious clients on the global model are influenced by unreasonable assumptions (e.g., an auxiliary dataset) or fail to balance model performa... 详细信息
来源: 评论
Quantum Algorithms and Experiment Implementations Based on IBM Q
收藏 引用
computers, Materials & Continua 2020年 第11期65卷 1671-1689页
作者: Wenjie Liu Junxiu Chen Yinsong Xu Jiahao Tang Lian Tong Xiaoyu Song Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Engineering Jiangsu Maritime InstituteNanjing211100China Department of Electrical and Computer Engineering Portland State UniversityOregon97207USA
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio... 详细信息
来源: 评论
Quantum-based Feature Selection for Multi-Classification Problem in Complex Systems with Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Chen, Junxiu Wang, Yuxiang Gao, Peipei Lei, Zhibin Ma, Xu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China 999077 Hong Kong School of Software Qufu Normal University Shandong273165 China
The complex systems with edge computing require a huge amount of multi-feature data to extract appropriate insights for their decision-making, so it is important to find a feasible feature selection method to improve ... 详细信息
来源: 评论
A Survey of Image Super Resolution Based on CNN  9th
A Survey of Image Super Resolution Based on CNN
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Xu, Qianxiong Zheng, Yu School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NanjingJiangsu210044 China
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m... 详细信息
来源: 评论
Privacy-Preserving Quantum Two-Party Geometric Intersection
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Xu, Yong Yang, James C.N. Yu, Wen-Bin Chi, Lian-Hua Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien974 Taiwan Department of Computer Science and Information Technology La Trobe University VIC3086 Australia
Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry. As an important field, the privacy-preserving geome... 详细信息
来源: 评论
Partial-duplicate image retrieval using spatial and visual contextual clues
Partial-duplicate image retrieval using spatial and visual c...
收藏 引用
作者: Sun, Wendi Wang, Tao Zhou, Zhili School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China
The traditional bag-of-visual-words (BOW) model quantifies the local features to the visual words to achieve efficient content-based image retrieval. However, since it causes considerable quantisation error and ignore... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer Systems Science & engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论