咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是71-80 订阅
排序:
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover *** secret messag... 详细信息
来源: 评论
A robust instantaneous frequency estimation of rotating machinery
A robust instantaneous frequency estimation of rotating mach...
收藏 引用
2011 International Conference on Mechatronic Science, Electric engineering and computer, MEC 2011
作者: Zhao, Xiaoping Zhao, Xiuli Zheng, Yuhui Xie, Shengdong Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Hebei Software Institute Baoding 071000 China
The problem of estimating and tracking the fundamental frequency of a periodic signal is formulated in short Fourier transform and viterbi algorithm (STFT-VA) is proposed. An improvement to peak search is proposed, wh... 详细信息
来源: 评论
The Numerical Results of Binary Coherent-State Signal’s Quantum Detection in the Presence of Noise  6th
The Numerical Results of Binary Coherent-State Signal’s Qua...
收藏 引用
6th International Conference on Artificial Intelligence and Security, ICAIS 2020
作者: Yu, Wenbin Xiong, Zijia Dong, Zangqiang Xu, Yinsong Liu, Wenjie Qu, Zhiguo Liu, Alex X. Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China The Department of Computer Science and Application Zhengzhou Institute of Aeronautical Industry Management ZhengzhouHenan450015 China Department of Computer Science and Engineering Michigan State University East LansingMI48824-1226 United States
In the optical frequency level communication, quantum effect becomes the source of significant communication errors. One alternative to classical detection is orthogonal projection measurement. In this paper, based on... 详细信息
来源: 评论
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection
Semi-supervised stacked autoencoder-based deep hierarchical ...
收藏 引用
作者: Yuan, Chengsheng Chen, Xianyi Yu, Peipeng Meng, Ruohan Cheng, Weijin Wu, Q. M. Jonathan Sun, Xingming School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China Department of Electrical and Computer Engineering University of Windsor WindsorONN9B 3P4 Canada
The popularity of biometric authentication technology benefits from the rapid development of smart mobile devices in recent years, and fingerprints, which are inherent human traits and neither easily revealed nor deci... 详细信息
来源: 评论
A practical RFID grouping authentication protocol in multiple-tag arrangement with adequate security assurance  18
A practical RFID grouping authentication protocol in multipl...
收藏 引用
18th International Conference on Advanced Communications Technology, ICACT 2016
作者: Shen, Jian Tan, Haowen Ren, Yongjun Liu, Qi Wang, Baowei Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
Radio Frequency Identification (RFID) is considered to be an authentication technology of great potential. Due to the bright future of low-cost RFID tags in practical situations, the authentication towards multiple ta... 详细信息
来源: 评论
Quantum Searchable Encryption for Cloud Data Based on Delegating Quantum Computing  9th
Quantum Searchable Encryption for Cloud Data Based on Delega...
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Xu, Yinsong Liu, Wenjie Chen, Junxiu Tong, Lian School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Information Engineering Jiangsu Maritime Institute Nanjing211100 China
Based on delegating quantum computing (DQC), a DQC model that adapts to multi-qubit and composite quantum circuits is given firstly. In this model, the single client with limited quantum ability can give her encrypted... 详细信息
来源: 评论
Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural network and Principal Component Analysis
收藏 引用
computers, Materials & Continua 2017年 第4期53卷 357-372页
作者: Chengsheng Yuan Xinting Li Q.M.Jonathan Wu Jin Li Xingming Sun School of Computer and Software Nanjing University of Information Science&TechnologyNing Liu RoadNo.219NanjingChina210044 Jiangsu Engineering Center of Network Monitoring Ning Liu RoadNo.219NanjingChina210044 Department of Electrical and Computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityYudongxi Road 36Tianhe DistrictGuangzhouChina510500
Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints,which are made of common fingerprint materials,such as silicon,latex,***,to protect our privacy,many finge... 详细信息
来源: 评论
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing
Outsourced data modification algorithm with assistance of mu...
收藏 引用
作者: Shen, Jian Shen, Jun Li, Xiong Wei, Fushan Li, Jiguo Department of Jiangsu Engineering Center of Network Monitoring Jiangsu210044 China Technology and Engineering Center of Meteorological Sensor Network Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing Jiangsu210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Hunan University of Science and Technology Hunan410082 China PLA Information Engineering University Henan450002 China Hohai University Nanjing210098 China
The rapid development of cloud storage has caused a wave of research craze. To improve cloud user experience, a large number of schemes are proposed with various practical performances, like long-term correct ensurenc... 详细信息
来源: 评论
RFID indoor localization algorithm based on adaptive self-correction
收藏 引用
International Journal of Smart Home 2014年 第6期8卷 205-216页
作者: Gu, Yunhua Zhang, Junyong Wang, Jin Gao, Bao Du, Jie Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With the rapid development of wireless communication and embedded system, wireless positioning systems are paid more and more attention to. Radio Frequency Identification (RFID) localization system is getting more imp... 详细信息
来源: 评论
Splicing Detection for Color Images based on QDCT Markov
Splicing Detection for Color Images based on QDCT Markov
收藏 引用
第十三届全国信息隐藏暨多媒体信息安全学术大会
作者: WANG Jinwei LIU Renfeng Jiangsu Network Monitoring Engineering Center Department of Computer and SoftwareNanjing University of Information Science and Technology Nanjing
With the increasing amount of splicing images, many detecting methods of splicing images are *** this paper, we propose a splicing detection scheme based on quaternion discrete cosine transform (QDCT).Compared to most... 详细信息
来源: 评论