咨询与建议

限定检索结果

文献类型

  • 72 篇 会议
  • 64 篇 期刊文献

馆藏范围

  • 136 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 67 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 26 篇 信息与通信工程
    • 11 篇 电气工程
    • 11 篇 控制科学与工程
    • 10 篇 生物工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 52 篇 理学
    • 38 篇 数学
    • 25 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 10 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 23 篇 管理学
    • 16 篇 图书情报与档案管...
    • 8 篇 管理科学与工程(可...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 deep learning
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 machine learning
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 reinforcement le...
  • 3 篇 task analysis
  • 3 篇 quality of servi...
  • 3 篇 knowledge discov...
  • 3 篇 crowdsourcing
  • 3 篇 accuracy
  • 3 篇 forecasting
  • 2 篇 power demand
  • 2 篇 complex networks

机构

  • 58 篇 school of comput...
  • 20 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 11 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...
  • 3 篇 school of comput...

作者

  • 24 篇 xu xiaolong
  • 22 篇 xiaolong xu
  • 14 篇 liu bin
  • 7 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 yang geng
  • 4 篇 yun li
  • 4 篇 xu jia
  • 4 篇 lejun gong
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo

语言

  • 130 篇 英文
  • 6 篇 其他
检索条件"机构=Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science"
136 条 记 录,以下是71-80 订阅
排序:
Temporal data Fusion at the Edge
Temporal Data Fusion at the Edge
收藏 引用
IEEE International Symposium on Parallel and Distributed processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Linfu Yang Bin Liu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an enabler technique, data fusion has gained great attention in the context of Internet of things (IoT). In traditional settings, data fusion is done at the cloud server. So the data to be fused should be transferr... 详细信息
来源: 评论
Implementation and performance op timization of dynamic random forest
Implementation and performance op timization of dynamic rand...
收藏 引用
第九届网络分布式计算与知识发现国际会议( 2017 International Conference on Cyber-enabled distributed computing and knowledge discovery)
作者: Xiaolong Xu Wen Chen School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and
Bernard combines the weight updating of the boosting algorithm with the Random Forest(RF),and proposes a new RF induction algorithm called Dynamic Random Forest(DRF).The idea with DRF is to grow only trees that would ... 详细信息
来源: 评论
Maximum Likelihood Estimation based on Random Subspace EDA: Application to extrasolar planet detection
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Bin Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu210023 China
This paper addresses maximum likelihood (ML) estimation based model fitting in the context of extrasolar planet detection. This problem is featured by the following properties: 1) the candidate models under considerat... 详细信息
来源: 评论
LogPal: A Generic Anomaly Detection Scheme of Heterogeneous Logs for Network Systems
收藏 引用
security and Communication Networks 2023年 第1期2023卷
作者: Sun, Lei Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
As a key resource for diagnosing and identifying problems, network syslog contains vast quantities of information. And it is the main source of data for anomaly detection of systems. Syslog presents the characteristic... 详细信息
来源: 评论
MNN: Mixed Nearest-Neighbors for Self-Supervised Learning
arXiv
收藏 引用
arXiv 2023年
作者: Long, Xianzhong Peng, Chen Li, Yun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
In contrastive self-supervised learning, positive samples are typically drawn from the same image but in different augmented views, resulting in a relatively limited source of positive samples. An effective way to all... 详细信息
来源: 评论
Dafl: Domain Adaptation-Based Federated Learning for Privacy-Preserving Biometric Recognition
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zhousheng Yang, Geng Dai, Hua Bai, Yunlu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big data Security & Intelligent Processing Nanjing210023 China
With the introduction of data protection regulation in various countries, traditional centralized learning for the exploitation of sensitive biological information will gradually become unsustainable. We take face and... 详细信息
来源: 评论
Sequential online prediction in the presence of outliers and change points: An instant temporal structure learning approach
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Bin Qi, Yu Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing Jiangsu210023 China College of Computer Science and Technology Zhejiang University Hangzhou Zhejiang310058 China
In this paper, we consider sequential online prediction (SOP) for streaming data in the presence of outliers and change points. We propose an INstant TEmporal structure Learning (INTEL) algorithm to address this probl... 详细信息
来源: 评论
Sequential monte carlo method for bayesian multiple testing of pairwise interactions among large number of neurons  14
Sequential monte carlo method for bayesian multiple testing ...
收藏 引用
14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Liu, Bin Vinci, Giuseppe Snyder, Adam C. Kass, Robert E. School of Computer Science Jiangsu Key Lab of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Department of Statistics Rice University Houston United States Visual Neuroscience Lab University of Pittsburgh Pittsburgh United States Basis of Cognition Carnegie Mellon University Machine Learning Department Center for the Neural Department of Statistics Pittsburgh United States
The problem of multiple testing arises in many contexts, including testing for pairwise interaction among a large number of neurons. Recently a method was developed to control false positives when covariate informatio... 详细信息
来源: 评论
SLBERT: An Improved FLAT-BERT for Named Entity Recognition
SSRN
收藏 引用
SSRN 2022年
作者: Fei, Yuefan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China
Named Entity Recognition (NER) aims to identify named entities mentioned in unstructured text and classify them into predefined named entity classes. Although models using word fusion have achieved relatively high per... 详细信息
来源: 评论
Incentivizing the Biased Requesters: Truthful Task Assignment Mechanisms in Crowdsourcing
Incentivizing the Biased Requesters: Truthful Task Assignmen...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Jia Xu Hui Li Yanxu Li Dejun Yang Tao Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing Jiangsu China School of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Department of Computer Science Colorado School of Mines Golden CO USA
Crowdsourcing has become an effective tool to utilize human intelligence to perform tasks that are challenging for machines. In the integrated crowdsourcing systems, the requesters are non- monopolistic and may show p... 详细信息
来源: 评论