咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 92 篇 期刊文献

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 148 篇 工学
    • 111 篇 计算机科学与技术...
    • 101 篇 软件工程
    • 45 篇 信息与通信工程
    • 21 篇 电气工程
    • 20 篇 生物工程
    • 19 篇 控制科学与工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 75 篇 理学
    • 48 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 13 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 6 篇 training
  • 5 篇 deep learning
  • 5 篇 sensors
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 clustering algor...

机构

  • 58 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 nanjing universi...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 15 篇 liu bin
  • 10 篇 yang geng
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 dai hua
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian

语言

  • 233 篇 英文
  • 7 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab.of Big Data Security and Intelligent Processing"
240 条 记 录,以下是111-120 订阅
排序:
Identifying eclipsing binary stars with TESS data based on a new hybrid deep learning model
arXiv
收藏 引用
arXiv 2025年
作者: Shan, Ying Chen, Jing Zhang, Zichong Wang, Liang Zou, Zhiqiang Li, Min College of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China Nanjing Institute of Astronomical and Optics & Technology Chinese Academy of Sciences Nanjing210042 China CAS Key Laboratory of Astronomical Optics & Technology Nanjing Institute of Astronomical Optics & Technology Nanjing210042 China University of Chinese Academy of Sciences Beijing100049 China University of Chinese Academy of Sciences Jiangsu Nanjing211135 China
Eclipsing binary systems (EBs), as foundational objects in stellar astrophysics, have garnered significant attention in recent years. These systems exhibit periodic decreases in light intensity when one star obscures ... 详细信息
来源: 评论
Identifying outliers in astronomical images with unsupervised machine learning
arXiv
收藏 引用
arXiv 2022年
作者: Han, Yang Zou, Zhiqiang Li, Nan Chen, Yanli School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China Key Laboratory of Optical Astronomy National Astronomical Observatories Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Astronomical outliers, such as unusual, rare or unknown types of astronomical objects or phenomena, constantly lead to the discovery of genuinely unforeseen knowledge in astronomy. More unpredictable outliers will be ... 详细信息
来源: 评论
Learning Comprehensive Representation via Selective Activation and Dual-Level Orthogonality for Pedestrian Attribute Recognition
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Wu, Junyi Huang, Yan Gao, Min Niu, Yuzhen Chen, Yuzhong Wu, Qiang Zhao, Jianqiang Ministry of Education Engineering Research Center of Big Data Intelligence China Ai Research Center Sdic Intelligence Xiamen Information Co. Ltd Xiamen China Xiamen Meiya Pico Information Security Research Institute Co. Ltd Xiamen China Institute of Automation Beijing China Fuzhou University Fujian Key Lab for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering Fuzhou China University of Technology Sydney School of Electrical and Data Engineering Ultimo Australia
Multi-label Pedestrian Attribute Recognition (PAR) involves identifying a series of semantic attributes in person images. Existing PAR solutions typically rely on CNN as the backbone network to extract pedestrian feat... 详细信息
来源: 评论
Classifying Galaxy Morphologies with Few-Shot Learning
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Zhirui Zou, Zhiqiang Li, Nan Chen, Yanli College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China Key Laboratory of Optical Astronomy National Astronomical Observatories Chinese Academy of Sciences Beijing China University of Chinese Academy of Science Beijing China
The taxonomy of galaxy morphology is critical in astrophysics as the morphological properties are powerful tracers of galaxy evolution. With the upcoming Large-scale Imaging Surveys, billions of galaxy images challeng... 详细信息
来源: 评论
Dual-Correction Adaptation Network for Noisy Knowledge Transfer
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Yunyun Zheng, Weiwen Chen, Songcan The Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Computer Science and Engineering Nanjing University of Posts & Telecommunications Nanjing210046 China The MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Computer Science & Technology/AI Nanjing University of Aeronautics & Astronautics Nanjing210023 China
Previous unsupervised domain adaptation (UDA) methods aim to promote target learning via a single-directional knowledge transfer from label-rich source domain to unlabeled target domain, while its reverse adaption fro... 详细信息
来源: 评论
Unveiling Optimal SDG Pathways: An Innovative Approach Leveraging Graph Pruning and Intent Graph for Effective Recommendations
arXiv
收藏 引用
arXiv 2023年
作者: Yu, Zhihang Wang, Shu Zhu, Yunqiang Yuan, Wen Dai, Xiaoliang Zou, Zhiqiang College of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China University of Chinese Academy of Sciences Beijing China
The recommendation of appropriate development pathways, also known as ecological civilization patterns for achieving Sustainable Development Goals (namely, sustainable development patterns), are of utmost importance f... 详细信息
来源: 评论
QoI-aware incentive for multimedia crowdsensing enabled learning system
QoI-aware incentive for multimedia crowdsensing enabled lear...
收藏 引用
作者: Gu, Yiren Shen, Hang Bai, Guangwei Wang, Tianjing Liu, Xuejun College of Computer Science and Technology Nanjing Tech University Nanjing211816 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
While much research has been devoted to algorithm improvement of the machine learning model for multimedia applications, relatively little research has focused on the acquisition of massive multimedia datasets with st... 详细信息
来源: 评论
Network data Classification Mechanism for Intrusion Detection System
Network Data Classification Mechanism for Intrusion Detectio...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Intrusion detection system (IDS), as a network security device, monitors network data in real time and responds actively when it detects suspicious transmissions. However, suffered from the large amount of redundancy ... 详细信息
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yu Jiang Xiaolong Xu Kunda Lin Weihua Duan Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task... 详细信息
来源: 评论