咨询与建议

限定检索结果

文献类型

  • 72 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 133 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 63 篇 计算机科学与技术...
    • 54 篇 软件工程
    • 25 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 10 篇 生物工程
    • 9 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 50 篇 理学
    • 36 篇 数学
    • 24 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 9 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 22 篇 管理学
    • 15 篇 图书情报与档案管...
    • 8 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 computational mo...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 optimization
  • 4 篇 machine learning
  • 4 篇 accuracy
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 reinforcement le...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 telecommunicatio...
  • 3 篇 quality of servi...
  • 3 篇 knowledge discov...
  • 3 篇 crowdsourcing
  • 3 篇 forecasting
  • 3 篇 training

机构

  • 57 篇 school of comput...
  • 19 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 11 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...
  • 3 篇 school of comput...

作者

  • 24 篇 xiaolong xu
  • 23 篇 xu xiaolong
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 xu jia
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo
  • 3 篇 chen yunfang
  • 3 篇 li tao
  • 3 篇 chen xingguo

语言

  • 129 篇 英文
  • 4 篇 其他
检索条件"机构=Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science"
133 条 记 录,以下是1-10 订阅
排序:
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
A label-guided contrastive capsule network for few-shot text classification
收藏 引用
Neural Computing and Applications 2025年 1-26页
作者: Xu, Yang Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Few-shot text classification involves transferring knowledge from a limited dataset to perform classification tasks in unseen domains. Existing metric-based meta-learning models, such as prototypical networks, have sh...
来源: 评论
ASSD: An AI-Synthesized Speech Detection Scheme Using Whisper Feature and Types Classification
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language processing 2025年 33卷 542-556页
作者: Chang Liu Xiaolong Xu Fu Xiao Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Current efforts in AI-synthesized speech detection often suffer from decreased performance due to detectors overfitting to irrelevant features or fitting features specific to certain synthesis methods. This issue beco... 详细信息
来源: 评论
An Adaptive DoH Encrypted Tunnel Detection Method Based on Contrastive Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Tong, Jiacheng Zhao, Yilin Jin, Chongju Chen, Wei Zhang, Yiting Wu, Lifa Nanjing University of Posts and Telecommunications School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi... 详细信息
来源: 评论
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Huang, Yuxian Yang, Geng Yuan, Dong Yu, Shui Nanjing University of Posts and Telecommunication College of Computer Science and Software China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China University of Sydney School of Electrical and Information Engineering Australia University of Technology Sydney School of Computer Science Australia
Recently, self-supervised learning has garnered significant attention for its ability to extract high-quality features from unlabeled data. However, existing research indicates that backdoor attacks can pose significa... 详细信息
来源: 评论
Exploring the Robustness: Hierarchical Federated Learning Framework for Object Detection of UAV Cluster
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Xingyu Zhang, Wenzhe Liu, Linfeng Xu, Jia Nanjing University of Posts and Telecommunications School of Computer Science and Technology Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The deployment of Unmanned Aerial Vehicle (UAV) cluster is an available solution for object detection missions. In the harsh environment, UAV cluster could suffer from some significant threats (e.g., forest fire hazar... 详细信息
来源: 评论
FDSR-INT: A Flexible On-Demand In-Band Telemetry Approach for Aerial Computing Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xu, Jinghan Xu, Xiaolong Zhao, Juan Gao, Honghao Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing The School of Computer Science Nanjing210023 China Jinling Institute of Technology School of Computer Science Nanjing211169 China Shanghai University School of Computer Engineering and Science Shanghai200444 China Gachon University College of Future Industry Gyeonggi-Do 461-701 Korea Republic of
In-band network telemetry (INT) is a new network measurement technique that provides real-time, fine-grained packet-level network measurements. However, standard INT lacks the flexibility to perform configurable on-de... 详细信息
来源: 评论
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
SAug: Structural Imbalance Aware Augmentation for Graph Neural Networks
收藏 引用
ACM Transactions on intelligent Systems and Technology 2025年 第2期16卷
作者: Chen, Ke-Jia Mu, Wenhui Liu, Zulong Liu, Zheng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
Graph machine learning (GML) has made great progress in node classification, link prediction, graph classification, and so on. However, graphs in reality are often structurally imbalanced, that is, only a few hub node... 详细信息
来源: 评论
FIMI: A Constant Frugal Incentive Mechanism for Time WindowCoverage in Mobile Crowdsensing
收藏 引用
Journal of computer science & Technology 2017年 第5期32卷 919-935页
作者: Jia Xu Jian-Ren Fu De-Jun Yang Li-Jie Xu Lei Wang Tao Li School of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China Department of Computer Science Colorado School of Mines Golden 80401 U.S.A.
Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good service... 详细信息
来源: 评论