咨询与建议

限定检索结果

文献类型

  • 83 篇 会议
  • 69 篇 期刊文献

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95 篇 工学
    • 75 篇 计算机科学与技术...
    • 66 篇 软件工程
    • 31 篇 信息与通信工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 55 篇 理学
    • 40 篇 数学
    • 26 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 9 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 29 篇 管理学
    • 21 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
  • 4 篇 法学
    • 3 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 8 篇 feature extracti...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 machine learning
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 quality of servi...
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...
  • 3 篇 crowdsourcing
  • 3 篇 accuracy
  • 3 篇 forecasting
  • 2 篇 power demand

机构

  • 58 篇 school of comput...
  • 21 篇 jiangsu key labo...
  • 20 篇 jiangsu key labo...
  • 15 篇 jiangsu key labo...
  • 12 篇 jiangsu key labo...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 state grid jiang...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 school of cyber ...
  • 4 篇 institute of inf...
  • 4 篇 school of comput...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...

作者

  • 23 篇 xu xiaolong
  • 23 篇 xiaolong xu
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 yang geng
  • 4 篇 yun li
  • 4 篇 xu jia
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 xiaochun cao
  • 3 篇 zhao jinbo

语言

  • 143 篇 英文
  • 9 篇 其他
检索条件"机构=Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science"
152 条 记 录,以下是1-10 订阅
排序:
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
DCEL:classifier fusion model for Android malware detection
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ... 详细信息
来源: 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of Network Security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric Power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 评论
Personalized Review Recommendation based on Implicit dimension mining
Personalized Review Recommendation based on Implicit dimensi...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Xu, Bei Xu, Yifan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Users usually browse product reviews before buying products from e-commerce websites. Lots of e-commerce websites can recommend reviews. However, existing research on review recommendation mainly focuses on the genera... 详细信息
来源: 评论
Customized scheduling for shared bus with deadlines
Customized scheduling for shared bus with deadlines
收藏 引用
作者: Jin, Yong Xu, Jia Xu, Lijie Liu, Linfeng Xiao, Fu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science & Engineering Changshu Institute of Technology Jiangsu Changshu China
Public transportation system is one of the most effective ways to conserve energy and reduce carbon emissions. However, the traditional public transportation system does not provide customized service and cannot guara... 详细信息
来源: 评论
SR-AFU: super-resolution network using adaptive frequency component upsampling and multi-resolution features
收藏 引用
Frontiers of computer science 2023年 第1期17卷 123-132页
作者: Ke-Jia CHEN Mingyu WU Yibo ZHANG Zhiwei CHEN School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China College of Telecommunications and Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003China
Image super-resolution (SR) is one of the classic computer vision tasks. This paper proposes a super-resolution network based on adaptive frequency component upsampling, named SR-AFU. The network is composed of multip... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding  10
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Wang, Boyang He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for processing Large-scale datasets on Distributed Platforms  10
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Song, Hu Cheng, Xinyun Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products  15
Point Cloud Compression Method Based on Curvature Grading an...
收藏 引用
15th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Ran Nanjing University of Posts and Telecommunications School of Computer Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The traditional point cloud compression methods fail to meet the compression requirements of complex surface point cloud files in the industrial field. This paper proposes a point cloud compression method suitable for... 详细信息
来源: 评论
Model-Based Offline Policy Optimization with Adversarial Network  26
Model-Based Offline Policy Optimization with Adversarial Net...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论