咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 90 篇 期刊文献

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 111 篇 计算机科学与技术...
    • 101 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 19 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 sensors
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 57 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 9 篇 yang geng
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 lejun gong
  • 6 篇 dai hua
  • 6 篇 xu qianqian

语言

  • 232 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data and Security and Intelligent Processing"
236 条 记 录,以下是211-220 订阅
排序:
Sindiff: Spoken-to-Sign Language Generation Based Transformer Diffusion Model
SSRN
收藏 引用
SSRN 2023年
作者: Liang, Wuyan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Sign language generation (SLG) is meaningful in facilitating the communication between deaf and healthy people. Recently, transformer-based diffusion models have been achieved success in human motion generation. Howev... 详细信息
来源: 评论
Optimizing Location Quality in Privacy Preserving Crowdsensing
Optimizing Location Quality in Privacy Preserving Crowdsensi...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Yuhui Zhang Ming Li Dejun Yang Jian Tang Guoliang Xue Colorado School of Mines Golden CO Colorado School of Mines Golden CO USA Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Syracuse University Syracuse NY Arizona State University Tempe AZ
Crowdsensing enables a wide range of data collection, where the data are usually tagged with private locations. Protecting users' location privacy has been a central issue. The study of various location perturbati... 详细信息
来源: 评论
Consistent and Complementary Graph Regularized Multi-view Subspace Clustering
arXiv
收藏 引用
arXiv 2020年
作者: Zheng, Qinghai Zhu, Jihua Li, Zhongyu Pang, Shanmin Wang, Jun Chen, Lei School of Software Engineering Xi’an Jiaotong University Xi’an710049 China Shanghai Institute for Advanced Communication and Data Science School of Communication and Information Engineering Shanghai University Shanghai200444 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
This study investigates the problem of multi-view clustering, where multiple views contain consistent information and each view also includes complementary information. Exploration of all information is crucial for go... 详细信息
来源: 评论
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jishen Tan, Shunquan Liu, Guangqing Li, Bin Huang, Jiwu Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Peng Cheng Laboratory Shenzhen518052 China
Until recently, deep steganalyzers in spatial domain have been all designed for gray-scale images. In this paper, we propose WISERNet (the wider separate-then-reunion network) for steganalysis of color images. We prov... 详细信息
来源: 评论
Network-coding-based video transmission via WiFi direct in local mobile networks
Network-coding-based video transmission via WiFi direct in l...
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Lei Wang Qing Wang Zhongwei Sun Jun Yin Lijie Xu Yuwang Yang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P.R. China School of Computer Nanjing University of Posts and Telecommunications Nanjing P.R. China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing P.R. China
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of Wi... 详细信息
来源: 评论
VFL: A Verifiable Federated Learning with Privacy-Preserving for big data in Industrial IoT
arXiv
收藏 引用
arXiv 2020年
作者: Fu, Anmin Zhang, Xianglong Xiong, Naixue Gao, Yansong Wang, Huaqun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Northeastern State University Department of Mathematics and Computer Science TahlequahOK United States Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Due to the strong analytical ability of big data, deep learning has been widely applied to model the collected data in industrial IoT. However, for privacy issues, traditional data-gathering centralized learning is no... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
A Multimodal Ecological Civilization Pattern Recommendation Method Based on Large Language Models and Knowledge Graph
arXiv
收藏 引用
arXiv 2023年
作者: Yu, Zhihang Wang, Shu Zhu, Yunqiang Zou, Zhiqiang College of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
The Ecological Civilization Pattern Recommendation System (ECPRS) aims to recommend suitable ecological civilization patterns for target regions, promoting sustainable development and reducing regional disparities. Ho... 详细信息
来源: 评论
PhotoRedshift-MML: a multimodal machine learning method for estimating photometric redshifts of quasars
arXiv
收藏 引用
arXiv 2022年
作者: Hong, Shuxin Zou, Zhiqiang Luo, A-Li Kong, Xiao Yang, Wenyu Chen, Yanli College of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China CAS Key Laboratory of Optical Astronomy National Astronomical Observatories Beijing100101 China School of Astronomy and Space Science University of Chinese Academy of Sciences Beijing100049 China
We propose a Multimodal Machine Learning method for estimating the Photometric Redshifts of quasars (PhotoRedshift-MML for short), which has long been the subject of many investigations. Our method includes two main m... 详细信息
来源: 评论
Adaptive Teacher-and-Student Model for Heterogeneous Domain Adaptation
Adaptive Teacher-and-Student Model for Heterogeneous Domain ...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yunyun Wang Xuzhang Chen Songcan Chen Hui Xue College of Computer Science Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts & Telecommunications Nanjing China College of Computer Science & Technology/AI MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics & Astronautics Nanjing China College of Computer Science and Engineering Southeast University Nanjing China
In heterogeneous domain adaptation (HDA), since the feature spaces of the source and target domains are different, knowledge transfer from the source to the target domain is really challenging. How to align the differ...
来源: 评论