咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 113 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 46 篇 信息与通信工程
    • 21 篇 电气工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 6 篇 training
  • 5 篇 sensors
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 clustering algor...

机构

  • 58 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 15 篇 liu bin
  • 10 篇 chen ke-jia
  • 10 篇 yang geng
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 dai hua
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian

语言

  • 233 篇 英文
  • 7 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data and Security and Intelligent Processing"
240 条 记 录,以下是41-50 订阅
排序:
Secure communications for primary users in cognitive radio networks with collusive eavesdroppers
Secure communications for primary users in cognitive radio n...
收藏 引用
作者: Xu, Ding Li, Qun Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, t... 详细信息
来源: 评论
CABAC: A content-driven attribute-based access control model for big data  5th
CABAC: A content-driven attribute-based access control model...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Ma, Ke Yang, Geng Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
In recent years, attribute-based access control (ABAC) models have been widely used in big data and cloud computing. However, with the growing importance of data content, using data content to assist authorization for... 详细信息
来源: 评论
Topic-aware Incentive Mechanism for Task Diffusion in Mobile Crowdsourcing through Social Network
收藏 引用
ACM Transactions on Internet Technology 2021年 第1期22卷 1-23页
作者: Xu, Jia Zhou, Yuanhang Chen, Gongyu Ding, Yuqing Yang, Dejun Liu, Linfeng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications 9 Wenyuan Rd Jiangsu Nanjing210023 China Colorado School of Mines 1500 Illinois St. GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm to utilize human intelligence to perform tasks that are challenging for machines. Many incentive mechanisms for crowdsourcing systems have been proposed. However, most of... 详细信息
来源: 评论
Topic modeling for noisy short texts with multiple relations  30
Topic modeling for noisy short texts with multiple relations
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Liu, Chiyu Liu, Zheng Li, Tao Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Understanding contents in social networks by inferring high-quality latent topics from short texts is a significant task in social analysis, which is challenging because social network contents are usually extremely s... 详细信息
来源: 评论
Distributed Image Retrieval Base on LSH Indexing on Spark  1st
Distributed Image Retrieval Base on LSH Indexing on Spark
收藏 引用
1st International Conference on big data and security, ICBDS 2019
作者: Hou, Zelei Huang, Chao Wu, Jiagao Liu, Linfeng School of Computer Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanjingJiangsu210023 China
With the advent of the era of big data, how to process massive image, video and other multimedia data timely and accurately has become a new challenge in related fields. Aiming at the computational bottleneck and inef... 详细信息
来源: 评论
Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第10期129卷 31-45页
作者: Lejun Gong Xingxing Zhang Li Zhang Zhihong Gao Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China
Novel coronavirus disease 2019(COVID-19)is an ongoing health *** studies are related to ***,its molecular mechanism remains *** rapid publication of COVID-19 provides a new way to elucidate its mechanism through compu... 详细信息
来源: 评论
Maximum likelihood estimation based on random subspace EDA: Application to extrasolar planet detection  11th
Maximum likelihood estimation based on random subspace EDA: ...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Liu, Bin Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanjingJiangsu210023 China
This paper addresses maximum likelihood (ML) estimation based model fitting in the context of extrasolar planet detection. This problem is featured by the following properties: (1) the candidate models under considera... 详细信息
来源: 评论
BDLR:lncRNA identification using ensemble learning
收藏 引用
BIOCELL 2022年 第4期46卷 951-960页
作者: LEJUN GONG SHEHAI ZHOU JINGMEI CHEN YONGMIN LI LI ZHANG ZHIHONG GAO Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with ... 详细信息
来源: 评论
Anomaly detection for drinking water quality via deep bilSTM ensemble  18
Anomaly detection for drinking water quality via deep bilSTM...
收藏 引用
2018 Genetic and Evolutionary Computation Conference, GECCO 2018
作者: Chen, Xingguo Feng, Fan Wu, Jikai Liu, Wenyu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu Province China
In this paper, a deep BiLSTM ensemble method was proposed to detect anomaly of drinking water quality. First, a convolutional neural network (CNN) is utilized as a feature extractor in order to process the raw data of... 详细信息
来源: 评论
CSMRS: An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud data  25
CSMRS: An Efficient and Effective Semantic-aware Ranked Sear...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Hu, Zheng Dai, Hua Liu, Yuanlong Yang, Geng Zhou, Qian Chen, Yanli Nanjing University of Post and Telecommunication Nanjing China Nanjing University of Post and Telecommunication Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing China
The document vectors constructed by the traditional searchable encryption scheme based on the term frequency-inverse document frequency model not only have high dimensionality and sparsity, but also ignore the semanti... 详细信息
来源: 评论