咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring and School of Computer and Software"
246 条 记 录,以下是61-70 订阅
排序:
A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things
收藏 引用
computers, Materials & Continua 2019年 第3期58卷 679-695页
作者: Baowei Wang Weiwen Kong Wei Li Neal NXiong Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Engineering Research Center of Electronic Information and Control from Fujian Provincial Education Department Fuzhou350108China Department of Mathematics and Computer Science Northeastern State UniversityOklahomaUSA.
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things **... 详细信息
来源: 评论
Survey on the Application of Deep Reinforcement Learning in Image Processing
收藏 引用
Journal on Artificial Intelligence 2020年 第1期2卷 39-58页
作者: Wei Fang Lin Pang Weinan Yi School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjingChina State Key Laboratory for Novel Software Technology Nanjing UniversityNanjingChina Jiangsu Key Laboratory of Computer Information Process Technology Soochow UniversitySuzhouChina
feature representations from a large amount of data,and use reinforcement learning to learn the best strategy to complete the *** the combination of deep learning and reinforcement learning,end-to-end input and output... 详细信息
来源: 评论
Survey on the Loss Function of Deep Learning in Face Recognition
收藏 引用
Journal of Information Hiding and Privacy Protection 2021年 第1期3卷 29-45页
作者: Jun Wang Suncheng Feng Yong Cheng Najla Al-Nabhan Director of Science and Technology Industry Department Nanjing University of Information Science&TechnologyNanjingChina School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjingChina Science and Technology Industry Department Nanjing University of Information Science&TechnologyNanjingChina Deptratment of Computer Science King Saud UniversityRiyadhSaudi Arabia
With the continuous development of face recognition network,the selection of loss function plays an increasingly important role in improving *** loss function of face recognition network needs to minimize the intra-cl... 详细信息
来源: 评论
Mixed Noise Removal by Residual Learning of Deep CNN
收藏 引用
Journal of New Media 2020年 第1期2卷 1-10页
作者: Kang Yang Jielin Jiang Zhaoqing Pan School of Computer and Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science and TechnologyNanjing210044China Country Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and TechnologyNanjing210044China
Due to the huge difference of noise distribution,the result of a mixture of multiple noises becomes very *** normal circumstances,the most common type of mixed noise is to add impulse noise(IN)and then white Gaussian ... 详细信息
来源: 评论
Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with Multi-UGV  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Jian Tan, Ling Zhuang, Wei College of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China
Prolonging the lifetime of wireless sensor networks (WSNs) is a crucial issue referring to energy conservation or balancing of data collection. In this paper, we propose an optimal algorithm for data collection using ... 详细信息
来源: 评论
Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing
收藏 引用
Journal of Cyber Security 2020年 第1期2卷 49-61页
作者: Leqi Jiang Zhangjie Fu College of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China
Genetic Algorithm(GA)has been widely used to solve various optimization *** the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the c... 详细信息
来源: 评论
Air Quality Forcasting based on Gated Recurrent Long Short-Term Memory Model  19
Air Quality Forcasting based on Gated Recurrent Long Short-T...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Wang, Baowei Kong, Weiwen Guan, Hui School of Computer and Software Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China
With the continuous development of Chinese economy and the gradual acceleration of urbanization, it has caused tremendous damage to the *** effect of smog on people's lives has become more apparent. The bad air en... 详细信息
来源: 评论
Delay-Tolerant Rendezvous-Based Data Collection for Target Tracking in Large-Scale Wireless Sensor networks with UGV  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Jian Xu, Jiang Wang, Tianbao College of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China School of Electrical and Information Engineering Jiangsu University Zhenjiang212013 China
Energy efficiency receives significant attention in wireless sensor networks. In this paper, a UGV is employed as an energy-efficient solution to prolong the network lifetime in target tracking. Data collection strate... 详细信息
来源: 评论
Real-time human cross-race aging-related face appearance detection with deep convolution architecture
Real-time human cross-race aging-related face appearance det...
收藏 引用
作者: Tian, Qing Zhang, Wenqiang Mao, Junxiang Yin, Hujun School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics and Astronautics Nanjing China School of Electrical and Electronic Engineering The University of Manchester Manchester United Kingdom
Human age estimation (AE) is an emerging research topic in computer vision and machine learning and has attracted increasing amount of research due its wide potential applications. In the process of human aging, facia... 详细信息
来源: 评论
Privacy-preserving image retrieval based on additive secret sharing
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Xiong, Lizhi Zhou, Wenhao Weng, Jian Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Jinan University Guangzhou510632 China
The rapid growth of digital images motivates individuals and organizations to upload their images to the cloud server. To preserve the privacy, image owners would prefer to encrypt the images before uploading, but it ... 详细信息
来源: 评论