咨询与建议

限定检索结果

文献类型

  • 72 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 133 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 81 篇 工学
    • 65 篇 计算机科学与技术...
    • 55 篇 软件工程
    • 25 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 10 篇 生物工程
    • 9 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 51 篇 理学
    • 37 篇 数学
    • 25 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 9 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 23 篇 管理学
    • 16 篇 图书情报与档案管...
    • 8 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 computational mo...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 deep learning
  • 4 篇 optimization
  • 4 篇 machine learning
  • 4 篇 accuracy
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 reinforcement le...
  • 3 篇 task analysis
  • 3 篇 telecommunicatio...
  • 3 篇 quality of servi...
  • 3 篇 knowledge discov...
  • 3 篇 crowdsourcing
  • 3 篇 forecasting
  • 3 篇 training

机构

  • 57 篇 school of comput...
  • 19 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 11 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...
  • 3 篇 school of comput...

作者

  • 24 篇 xiaolong xu
  • 23 篇 xu xiaolong
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 xu jia
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo
  • 3 篇 chen yunfang
  • 3 篇 li tao
  • 3 篇 chen xingguo

语言

  • 129 篇 英文
  • 4 篇 其他
检索条件"机构=Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science"
133 条 记 录,以下是91-100 订阅
排序:
Model-based Offline Policy Optimization with Adversarial Network
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social Networks
Joint Spatial-Temporal Trajectory Clustering Method for Mobi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ji Tang Linfeng Liu Jiagao Wu Jian Zhou Yang Xiang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important issue in the trajectory mining task, the trajectory clustering technique has attracted lots of the attention in the field of data mining. Trajectory clustering technique identifies the similar trajecto... 详细信息
来源: 评论
Deep representation learning for road detection using siamese network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Huafeng Han, Xiaofeng Li, Xiangrui Yao, Yazhou Huang, Pu Tang, Zhenming School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Robust road detection is a key challenge in safe autonomous driving. Recently, with the rapid development of 3D sensors, more and more researchers are trying to fuse information across different sensors to improve the... 详细信息
来源: 评论
A Privacy-Preserving and Verifiable Federated Learning Scheme
A Privacy-Preserving and Verifiable Federated Learning Schem...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Xianglong Zhang Anmin Fu Huaqun Wang Chunyi Zhou Zhenzhu Chen School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Due to the complexity of the data environment, many organizations prefer to train deep learning models together by sharing training sets. However, this process is always accompanied by the restriction of distributed s... 详细信息
来源: 评论
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud
Proxy Re-Encryption Scheme For Complicated Access Control Fa...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zheng Lian Mang Su Anmin Fu Huaqun Wang Chunyi Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Hybrid cloud has both the strong computing power of public cloud and easy control of private cloud. It provides users with robust services and convenience, meanwhile faces numerous security challenges. How to implemen... 详细信息
来源: 评论
Incentivizing the workers for truth discovery in crowdsourcing with copiers
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Lingyun Niu, Xiaofu Xu, Jia Yang, Dejun Xu, Lijie Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Department of Computer Science Colorado School of Mines GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm for performing large scale tasks. Truth discovery and incentive mechanism are fundamentally important for the crowdsourcing system. Many truth discovery methods and incen... 详细信息
来源: 评论
Image representation based on multi-features
Image representation based on multi-features
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Xianzhong Long Lei Chen Qun Li College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China
As one kind of popular application in computer vision, image clustering has attracted many attentions. Some machine learning algorithms have been widely employed, such as K-Means, Non-negative Matrix Factorization (NM... 详细信息
来源: 评论
A particle filter based multi-objective optimization algorithm: PFOPS
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Bin Jin, Yaochu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing Jiangsu210023 China Department of Computer Science University of Surrey Guildford SurreyGU2 7XH United Kingdom
This paper is concerned with a recently developed paradigm for population-based optimization, termed particle filter optimization (PFO). This paradigm is attractive in terms of coherence in theory and easiness in math... 详细信息
来源: 评论
Darkfight: A Detection Method of Violent Behavior in Dark Place for intelligent Monitoring System
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Jun Xu, Xiaolong Nanjing University of Posts & Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts & Telecommunications School of Computer Science Nanjing210023 China
With the continuous development of deep learning, the use of deep learning methods for intelligent violent behavior recognition has become an active research field in computer vision. However, there are relatively few... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Boyang Wang Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论