咨询与建议

限定检索结果

文献类型

  • 72 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 133 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 81 篇 工学
    • 65 篇 计算机科学与技术...
    • 55 篇 软件工程
    • 25 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 10 篇 生物工程
    • 9 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 51 篇 理学
    • 37 篇 数学
    • 25 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 9 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 23 篇 管理学
    • 16 篇 图书情报与档案管...
    • 8 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 computational mo...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 deep learning
  • 4 篇 optimization
  • 4 篇 machine learning
  • 4 篇 accuracy
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 reinforcement le...
  • 3 篇 task analysis
  • 3 篇 telecommunicatio...
  • 3 篇 quality of servi...
  • 3 篇 knowledge discov...
  • 3 篇 crowdsourcing
  • 3 篇 forecasting
  • 3 篇 training

机构

  • 57 篇 school of comput...
  • 19 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 11 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...
  • 3 篇 school of comput...

作者

  • 24 篇 xiaolong xu
  • 23 篇 xu xiaolong
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 xu jia
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo
  • 3 篇 chen yunfang
  • 3 篇 li tao
  • 3 篇 chen xingguo

语言

  • 129 篇 英文
  • 4 篇 其他
检索条件"机构=Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science"
133 条 记 录,以下是111-120 订阅
排序:
DUE Distribution and Pairing in D2D Communication
DUE Distribution and Pairing in D2D Communication
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Weifeng Lu Xiaoqiang Ren Jia Xu Siguang Chen Lijun Yang Jian Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China College of IoT Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
The D2D (Device-to-Device) communication has been very popular as it is a promising and low-cost solution to reduce the burden on the cellular network. However, there are rare concerns about the distribution and pairi... 详细信息
来源: 评论
Analysis on Attention Mechanism Application Schemes for Automatic Question Answering Systems
Analysis on Attention Mechanism Application Schemes for Auto...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Xinyuan Lu Xiaolong Xu Yanfei Sun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Office of Scientific R&D Nanjing University of Posts and Telecommunications Nanjing Jiangsu China
An automatic question answering system is generally composed of the question analysis module, the information retrieval module, the answer selection module, etc. The core component of automatic question answering syst... 详细信息
来源: 评论
Network-coding-based video transmission via WiFi direct in local mobile networks
Network-coding-based video transmission via WiFi direct in l...
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Lei Wang Qing Wang Zhongwei Sun Jun Yin Lijie Xu Yuwang Yang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P.R. China School of Computer Nanjing University of Posts and Telecommunications Nanjing P.R. China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing P.R. China
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of Wi... 详细信息
来源: 评论
Robust unsupervised feature selection by nonnegative sparse subspace learning
收藏 引用
Neurocomputing 2019年 334卷 156-171页
作者: Wei Zheng Hui Yan Jian Yang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China School of Computer Engineering Jinling Institute of Technology Nanjing PR China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing PR China
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the viewpoi... 详细信息
来源: 评论
VFL: A Verifiable Federated Learning with Privacy-Preserving for big data in Industrial IoT
arXiv
收藏 引用
arXiv 2020年
作者: Fu, Anmin Zhang, Xianglong Xiong, Naixue Gao, Yansong Wang, Huaqun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Northeastern State University Department of Mathematics and Computer Science TahlequahOK United States Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Due to the strong analytical ability of big data, deep learning has been widely applied to model the collected data in industrial IoT. However, for privacy issues, traditional data-gathering centralized learning is no... 详细信息
来源: 评论
Identifying outliers in astronomical images with unsupervised machine learning
arXiv
收藏 引用
arXiv 2022年
作者: Han, Yang Zou, Zhiqiang Li, Nan Chen, Yanli School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China Key Laboratory of Optical Astronomy National Astronomical Observatories Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Astronomical outliers, such as unusual, rare or unknown types of astronomical objects or phenomena, constantly lead to the discovery of genuinely unforeseen knowledge in astronomy. More unpredictable outliers will be ... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Online Attentive Kernel-Based Temporal Difference Learning
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Guang Chen, Xingguo Yang, Shangdong Wang, Huihui Dong, Shaokang Gao, Yang The the Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications National Engineering Laboratory for Agri-Product Quality Traceability Beijing Technology and Business University China The State Key Laboratory for Novel Software Technology Nanjing University China The PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China
With rising uncertainty in the real world, online Reinforcement Learning (RL) has been receiving increasing attention due to its fast learning capability and improving data efficiency. However, online RL often suffers... 详细信息
来源: 评论
Pptcdr: Personalized Preference Transfer Cross-Domain Recommendation Based on Heterogeneous Graph Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Zhu, Fan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Cross-domain recommendation methods aim to solve the problems of data sparsity and cold start by leveraging rich information from the source domain to enhance the recommendation accuracy of the target domain. Many met... 详细信息
来源: 评论
Sindiff: Spoken-to-Sign Language Generation Based Transformer Diffusion Model
SSRN
收藏 引用
SSRN 2023年
作者: Liang, Wuyan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Sign language generation (SLG) is meaningful in facilitating the communication between deaf and healthy people. Recently, transformer-based diffusion models have been achieved success in human motion generation. Howev... 详细信息
来源: 评论