咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 113 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 46 篇 信息与通信工程
    • 21 篇 电气工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 6 篇 training
  • 5 篇 sensors
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 clustering algor...

机构

  • 58 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 15 篇 liu bin
  • 10 篇 chen ke-jia
  • 10 篇 yang geng
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 dai hua
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian

语言

  • 233 篇 英文
  • 7 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data and Security and Intelligent Processing"
240 条 记 录,以下是181-190 订阅
排序:
Darkfight: A Detection Method of Violent Behavior in Dark Place for intelligent Monitoring System
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Jun Xu, Xiaolong Nanjing University of Posts & Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts & Telecommunications School of Computer Science Nanjing210023 China
With the continuous development of deep learning, the use of deep learning methods for intelligent violent behavior recognition has become an active research field in computer vision. However, there are relatively few... 详细信息
来源: 评论
Anomaly detection and traceback scheme for cloud-edge networks
Anomaly detection and traceback scheme for cloud-edge networ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xuanyan Liu Jinling He Hu Song Xinyun Cheng Luyun Hu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Cloud-edge networks (CEN) has revolutionized the traditional network architecture. However, there are many security issues in CEN needing to be solved. In this case, CEN administrator should be able to detect network ... 详细信息
来源: 评论
Deep representation learning for road detection using siamese network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Huafeng Han, Xiaofeng Li, Xiangrui Yao, Yazhou Huang, Pu Tang, Zhenming School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Robust road detection is a key challenge in safe autonomous driving. Recently, with the rapid development of 3D sensors, more and more researchers are trying to fuse information across different sensors to improve the... 详细信息
来源: 评论
A Privacy-Preserving and Verifiable Federated Learning Scheme
A Privacy-Preserving and Verifiable Federated Learning Schem...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Xianglong Zhang Anmin Fu Huaqun Wang Chunyi Zhou Zhenzhu Chen School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Due to the complexity of the data environment, many organizations prefer to train deep learning models together by sharing training sets. However, this process is always accompanied by the restriction of distributed s... 详细信息
来源: 评论
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud
Proxy Re-Encryption Scheme For Complicated Access Control Fa...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zheng Lian Mang Su Anmin Fu Huaqun Wang Chunyi Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Hybrid cloud has both the strong computing power of public cloud and easy control of private cloud. It provides users with robust services and convenience, meanwhile faces numerous security challenges. How to implemen... 详细信息
来源: 评论
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products
Point Cloud Compression Method Based on Curvature Grading an...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Lei Wang Wei Huang Yiping Chen Ran Chen School of Computer Nanjing University of Posts and Telecommunications Nanjing P. R. China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P. R. China
The traditional point cloud compression methods fail to meet the compression requirements of complex surface point cloud files in the industrial field. This paper proposes a point cloud compression method suitable for...
来源: 评论
TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted data
TFS-index-based Multi-keyword Ranked Search Scheme Over Clou...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yinfu Deng Hua Dai Yuanlong Liu Zhangchen Li Geng Yang Xun Yi Nanjing University of Post and Telecommunication Nanjing China Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing University of Post and Telecommunication Nanjing China Royal Melbourne Institute of Technology University Melbourne Australia
Traditional searchable encryption schemes for clouds are generally based on TF-IDF vector space model, but they ignore the high-dimensional sparse characteristic of encrypted vectors. It will lead to substantial compu...
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qun Ding Xiaolong Xu Wenming Gui Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jinling Institute of Technology Nanjing China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis...
来源: 评论
A particle filter based multi-objective optimization algorithm: PFOPS
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Bin Jin, Yaochu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing Jiangsu210023 China Department of Computer Science University of Surrey Guildford SurreyGU2 7XH United Kingdom
This paper is concerned with a recently developed paradigm for population-based optimization, termed particle filter optimization (PFO). This paradigm is attractive in terms of coherence in theory and easiness in math... 详细信息
来源: 评论
Area Charging for Wireless Rechargeable Sensors
Area Charging for Wireless Rechargeable Sensors
收藏 引用
International Conference on Computer Communications and Networks (ICCCN)
作者: Haipeng Dai Xiaoyu Wang Lijie Xu Chao Dong Qian Liu Lei Meng Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing CHINA Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing CHINA Nanjing University of Aeronautics and Astronautics Nanjing CHINA
In this paper, we consider the problem of area charging, that is, assuming that there is a mobile charger (MC) equipped with a directional wireless charger whose charging area is in the shape of a sector, and the MC c... 详细信息
来源: 评论