咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 90 篇 期刊文献

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 111 篇 计算机科学与技术...
    • 101 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 19 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 sensors
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 57 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 9 篇 yang geng
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 lejun gong
  • 6 篇 dai hua
  • 6 篇 xu qianqian

语言

  • 232 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data Security & Intelligent Processing"
236 条 记 录,以下是91-100 订阅
排序:
A relation prediction method based on PU learning
A relation prediction method based on PU learning
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Gao-Jing Peng Ke-Jia Chen Shijun Xue Bin Liu Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China
This paper studies relation prediction in heterogeneous information networks under PU learning context. One of the challenges of this problem is the imbalance of data number between the positive set P (the set of node... 详细信息
来源: 评论
Discrimination-Aware Domain Adversarial Neural Network
收藏 引用
Journal of Computer Science & Technology 2020年 第2期35卷 259-267页
作者: Yun-Yun Wang Jian-Min Gu Chao Wang Song-Can Chen Hui Xue College of Computer Science and Engineering Nanjing University of Posts and Telecommunications Nanjing 210046China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210046China College of Computer Science and Technology/College of Artificial Intelligence Nanjing University of Aeronautics and AstronauticsNanjing 210023China Key Laboratory of Pattern Analysis and Machine Intelligence Ministry of Industry and Information Technology Nanjing 210023China School of Computer Science and Engineering Southeast UniversityNanjing 210096China
The domain adversarial neural network(DANN)methods have been successfully proposed and attracted much attention *** DANNs,a discriminator is trained to discriminate the domain labels of features generated by a generat... 详细信息
来源: 评论
A Point Cloud Registration Method for Substations Based on an Improved SAC-IA Algorithm
A Point Cloud Registration Method for Substations Based on a...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Chen, Yiping Zong, Haonan Wang, Lulu Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs  26
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Ding, Qun Xu, Xiaolong Gui, Wenming Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Jinling Institute of Technology School of Computer Science Nanjing211169 China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis... 详细信息
来源: 评论
A Point Cloud Completion Method for Industrial Component Based on Multiple Encoders
A Point Cloud Completion Method for Industrial Component Bas...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Chen, Ran Huang, Wei Chen, Yiping Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
In real-world scenarios, laser-scanned point clouds often suffer from missing data points due to occlusion and other factors, significantly impacting subsequent tasks. We propose a novel point cloud completion method ... 详细信息
来源: 评论
A Social-Aware Mode Selection Algorithm for D2D Communications
A Social-Aware Mode Selection Algorithm for D2D Communicatio...
收藏 引用
International Conference on Communications, Signal processing, and Systems, CSPS 2018
作者: Lu, Wei-feng Lin, Wei-jun Chen, Si-guang Yang, Li-jun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China College of IoT Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Aiming at mode selection in D2D communication, a mode selection strategy based on social-aware was proposed. In addition to physical connection status, users’ social relationships also served as an observation elemen... 详细信息
来源: 评论
Exploring the Pan-Relationship Between Disease and Symptom Related to Coronary Heart Disease from Chinese Electronic Medical Records  15th
Exploring the Pan-Relationship Between Disease and Symptom R...
收藏 引用
15th International Conference on intelligent Computing, ICIC 2019
作者: Yang, Ronggen Wang, Yichen Wang, Bo Gong, Lejun Faculty of Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210046 China School of Geography and Bioinformatics Nanjing University of Posts and Telecommunication Nanjing China
Electronic Medical Records (EMRs) arises from the clinical treatment process, which reflects a patient’s physical condition, the disease, the treatment process, etc. It has an important significance for the recovery ... 详细信息
来源: 评论
Complex Substation Scene Segmentation Method Based on Optimized Straight Line Detection
Complex Substation Scene Segmentation Method Based on Optimi...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Hao Liu, Chuang Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a scene segmentation method based on optimized line detection to address the difficulty of segmenting spatially independent equipment in complex substation scenes. The method first employs the RANS... 详细信息
来源: 评论
CROA: A content-based recommendation optimization algorithm for personalized knowledge services  21
CROA: A content-based recommendation optimization algorithm ...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Sun, Xiao Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Information explosion is a typical feature of the big data. Learners can easily find a wide variety of knowledge information online. However, the expansion of information also makes it difficult for learners to retrie... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xinyu Liu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ...
来源: 评论