咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 68 篇 期刊文献

馆藏范围

  • 149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 74 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 31 篇 信息与通信工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 光学工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 55 篇 理学
    • 40 篇 数学
    • 26 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 9 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 29 篇 管理学
    • 21 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 8 篇 feature extracti...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 machine learning
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 quality of servi...
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...
  • 3 篇 crowdsourcing
  • 3 篇 accuracy
  • 3 篇 forecasting
  • 2 篇 power demand

机构

  • 58 篇 school of comput...
  • 21 篇 jiangsu key labo...
  • 20 篇 jiangsu key labo...
  • 15 篇 jiangsu key labo...
  • 12 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 school of comput...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...

作者

  • 23 篇 xu xiaolong
  • 22 篇 xiaolong xu
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 yang geng
  • 4 篇 yun li
  • 4 篇 xu jia
  • 4 篇 lejun gong
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo

语言

  • 142 篇 英文
  • 7 篇 其他
检索条件"机构=Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science"
149 条 记 录,以下是21-30 订阅
排序:
Exploring the Robustness: Hierarchical Federated Learning Framework for Object Detection of UAV Cluster
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Xingyu Zhang, Wenzhe Liu, Linfeng Xu, Jia Nanjing University of Posts and Telecommunications School of Computer Science and Technology Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The deployment of Unmanned Aerial Vehicle (UAV) cluster is an available solution for object detection missions. In the harsh environment, UAV cluster could suffer from some significant threats (e.g., forest fire hazar... 详细信息
来源: 评论
Multi-source Infection Pattern Mining Algorithms over Moving Objects  25
Multi-source Infection Pattern Mining Algorithms over Moving...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Chen, Yu Dai, Hua Yang, Geng Chen, Yanli Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210003 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
Using the trajectory data of moving objects to analyze and study the infection mode of viruses or germs has practical application value. The definition of infection pattern in existing works only considers one-to-one ... 详细信息
来源: 评论
Learning Disentangled Latent Factors for Individual Treatment Effect Estimation Using Variational Generative Adversarial Nets  25
Learning Disentangled Latent Factors for Individual Treatmen...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Bao, Qingsen Mao, Zeyong Chen, Lei Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Estimating individual treatment effect (ITE) is a challenging task due to the need for individual potential outcomes to be learned from biased data and counterfactuals are inherently unobservable. Some researchers pro... 详细信息
来源: 评论
Privacy Protection for Image Sharing Using Reversible Adversarial Examples
Privacy Protection for Image Sharing Using Reversible Advers...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ping Yin Wei Chen Jiaxi Zheng Yiting Zhang Lifa Wu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Online image sharing on social media platforms faces information leakage due to deep learning-aided privacy attacks. To avoid these attacks, this paper proposes a privacy protection mechanism for image sharing without... 详细信息
来源: 评论
Robust Federated Learning for Privacy Preservation and Efficiency in Edge Computing
收藏 引用
IEEE Transactions on Services Computing 2025年
作者: Zhou, Hao Dai, Hua Yang, Geng Xiang, Yang Nanjing University of Posts and Telecommunications School of Computer Science Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing210023 China Swinburne University of Technology Department of Computer Science HawthornVIC3122 Australia
Federated Learning (FL) has emerged as a key enabler of privacy-preserving distributed model training in edge computing environments, crucial for service-oriented applications such as personalized healthcare, smart ci... 详细信息
来源: 评论
Decomposing Source Codes by Program Slicing for Bug Localization
Decomposing Source Codes by Program Slicing for Bug Localiza...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jian Yong Ziye Zhu Yun Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications
Bug localization, which aims to automatically locate buggy source code files based on the given bug report, is a critical yet time-consuming task in the software engineering field. Existing advanced bug localization m...
来源: 评论
Community Detection Based on Deep Network Embedding with Dual Self-supervised Training  3rd
Community Detection Based on Deep Network Embedding with Dua...
收藏 引用
3rd International Conference on big data and security, ICBDS 2021
作者: Chen, Yunfang Mao, Haotian Wang, Li Zhang, Wei School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
We propose a community discovery method based on deep auto-encoding (DGAE_DST). Firstly, we use the pre-trained two-layer neural network and k-means algorithm to initialize the centroid vector, and then use the DNN mo... 详细信息
来源: 评论
Design Guidance for Lightweight Object Detection Models  3rd
Design Guidance for Lightweight Object Detection Models
收藏 引用
3rd International Conference on big data and security, ICBDS 2021
作者: Wang, Rui Wang, Xueli Chen, Yunfang Zhang, Wei School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
The lightweight target detection model is deployed in an environment with limited computing power and power consumption, which is widely used in many fields. Most of the current lightweight technologies only focus on ... 详细信息
来源: 评论
PM$^{2}$2VE: Power Metering Model for Virtualization Environments in Cloud data Centers
收藏 引用
IEEE Transactions on Cloud Computing 2023年 第3期11卷 3126-3138页
作者: Ziyu Shen Xusheng Zhang Zheng Liu Yun Li School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory for Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Virtualization technologies provide solutions for cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualizati... 详细信息
来源: 评论
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Huang, Yuxian Yang, Geng Yuan, Dong Yu, Shui Nanjing University of Posts and Telecommunication College of Computer Science and Software China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China University of Sydney School of Electrical and Information Engineering Australia University of Technology Sydney School of Computer Science Australia
Recently, self-supervised learning has garnered significant attention for its ability to extract high-quality features from unlabeled data. However, existing research indicates that backdoor attacks can pose significa... 详细信息
来源: 评论