咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 113 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 46 篇 信息与通信工程
    • 21 篇 电气工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 6 篇 training
  • 5 篇 sensors
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 clustering algor...

机构

  • 58 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 15 篇 liu bin
  • 10 篇 chen ke-jia
  • 10 篇 yang geng
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 dai hua
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian

语言

  • 233 篇 英文
  • 7 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data Security and Intelligent Processing"
240 条 记 录,以下是101-110 订阅
排序:
Complex Substation Scene Segmentation Method Based on Optimized Straight Line Detection
Complex Substation Scene Segmentation Method Based on Optimi...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Hao Liu, Chuang Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a scene segmentation method based on optimized line detection to address the difficulty of segmenting spatially independent equipment in complex substation scenes. The method first employs the RANS... 详细信息
来源: 评论
CROA: A content-based recommendation optimization algorithm for personalized knowledge services  21
CROA: A content-based recommendation optimization algorithm ...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Sun, Xiao Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Information explosion is a typical feature of the big data. Learners can easily find a wide variety of knowledge information online. However, the expansion of information also makes it difficult for learners to retrie... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xinyu Liu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ...
来源: 评论
Robustness May be at Odds with Stability in Adversarial Training based Feature Selection?
Robustness May be at Odds with Stability in Adversarial Trai...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yue Liu Yun Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important stage in machine learning pipeline, feature selection techniques are mainly used to improve the generalization performance and training efficiency of machine learning model, but few works have focused ... 详细信息
来源: 评论
An optimal profit route planning scheme based on ACO-OPP  21
An optimal profit route planning scheme based on ACO-OPP
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Qiu, Yuhua Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Taxi plays an important role of urban public transportation system. However, without appropriate route planning scheme, taxi drivers can only choose to wait or seek passengers in the absence of orders, leading to wast... 详细信息
来源: 评论
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Lei Sun Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa...
来源: 评论
Modeling Disease Progression via Weakly Supervised Temporal Multitask Matrix Completion
Modeling Disease Progression via Weakly Supervised Temporal ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Lingsheng Wang Lei Xu Ping Li Siming Zha Lei Chen Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Alzheimer's disease (AD) is one of the most common neurodegenerative diseases. Understanding AD progression can empower the patients in taking proactive care. Mini Mental State Examination (MMSE) and AD Assessment... 详细信息
来源: 评论
A Network Fault Prediction-Based Service Migration Approach for Unstable Mobile Edge Environment
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Wang, Haiyan Tang, Weihao Luo, Jian Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
How to perform efficient service migration in a mobile edge environment has become one of the research hotspots in the field of service computing. Most service migration approaches assume that the mobile edge network ... 详细信息
来源: 评论
Latent Group Recommendation based on Double Fuzzy Clustering and Matrix Tri-factorization
Latent Group Recommendation based on Double Fuzzy Clustering...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Haiyan Wang Jinxia Zhu Zhousheng Wang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Group recommendation has received great attention owing to its practical value in real applications. However, group members are implicit and groups are formed occasionally in some scenarios. Existing solutions for lat... 详细信息
来源: 评论
Multi-Granularity Power Prediction for data Center Operations via Long Short-Term Memory Network
Multi-Granularity Power Prediction for Data Center Operation...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Ziyu Shen Xusheng Zhang Bin Xia Zheng Liu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
The increasing numbers of the applications and requirement of cloud computing have made huge power consumption in data centers, which brings the problems of the high cost and resource waste. This problem attracts sign... 详细信息
来源: 评论