咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 90 篇 期刊文献

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 111 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 生物工程
    • 19 篇 电气工程
    • 19 篇 控制科学与工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 75 篇 理学
    • 48 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 13 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 sensors
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 57 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...

作者

  • 36 篇 xu xiaolong
  • 28 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 9 篇 yang geng
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 lejun gong
  • 6 篇 dai hua
  • 6 篇 xu qianqian

语言

  • 232 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab.of Big Data Security and Intelligent Processing"
236 条 记 录,以下是51-60 订阅
排序:
Community Detection Based on DeepWalk in Large Scale Networks  1st
Community Detection Based on DeepWalk in Large Scale Network...
收藏 引用
1st International Conference on big data and security, ICBDS 2019
作者: Chen, Yunfang Wang, Li Qi, Dehao Zhang, Wei Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China
The large scale and complex structure of real networks bring enormous challenges to traditional community detection methods. In order to detect community structure in large scale networks more accurately and efficient... 详细信息
来源: 评论
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products  15
Point Cloud Compression Method Based on Curvature Grading an...
收藏 引用
15th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Ran Nanjing University of Posts and Telecommunications School of Computer Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The traditional point cloud compression methods fail to meet the compression requirements of complex surface point cloud files in the industrial field. This paper proposes a point cloud compression method suitable for... 详细信息
来源: 评论
Congestion Relief in Downlink OFDMA Cellular System Using Inter-Cell Relay
收藏 引用
China Communications 2019年 第4期16卷 35-46页
作者: Weifeng Lu Mingqi Zhu Jia Xu Siguang Chen Lijun Yang Jian Xu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications College of Internet of Things Nanjing University of Posts and Telecommunications School of Computer Science and Engineering Nanjing University of Science and Technology
This paper proposes the concept of inter-cell relay for downlink orthogonal frequency division multiple access(OFDMA) cellular systems, which uses multi-hop to relay calls from overloaded cells to light-load neighbori... 详细信息
来源: 评论
DCEL:classifier fusion model for Android malware detection
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ... 详细信息
来源: 评论
MTSS: multi-path traffic scheduling mechanism based on SDN
收藏 引用
Journal of Systems Engineering and Electronics 2019年 第5期30卷 974-984页
作者: XU Xiaolong CHEN Yun HU Liuyun KUMAR Anup Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Engineering and Computer Science University of LouisvilleLouisville KY40292USA
Large-scale and diverse businesses based on the cloud computing platform bring the heavy network traffic to cloud data ***,the unbalanced workload of cloud data center network easily leads to the network congestion,th... 详细信息
来源: 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of Network Security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric Power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 评论
Personalized Review Recommendation based on Implicit dimension mining
Personalized Review Recommendation based on Implicit dimensi...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Xu, Bei Xu, Yifan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Users usually browse product reviews before buying products from e-commerce websites. Lots of e-commerce websites can recommend reviews. However, existing research on review recommendation mainly focuses on the genera... 详细信息
来源: 评论
Customized scheduling for shared bus with deadlines
Customized scheduling for shared bus with deadlines
收藏 引用
作者: Jin, Yong Xu, Jia Xu, Lijie Liu, Linfeng Xiao, Fu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science & Engineering Changshu Institute of Technology Jiangsu Changshu China
Public transportation system is one of the most effective ways to conserve energy and reduce carbon emissions. However, the traditional public transportation system does not provide customized service and cannot guara... 详细信息
来源: 评论
Multi-source Infection Pattern Mining Algorithms over Moving Objects  25
Multi-source Infection Pattern Mining Algorithms over Moving...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Chen, Yu Dai, Hua Yang, Geng Chen, Yanli Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210003 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
Using the trajectory data of moving objects to analyze and study the infection mode of viruses or germs has practical application value. The definition of infection pattern in existing works only considers one-to-one ... 详细信息
来源: 评论
Risk evaluation of financial websites based on structure mining
Risk evaluation of financial websites based on structure min...
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Li, Huakang Dai, Yuhao Jin, Xu Sun, Guozi Li, Tao Xu, Zheng Jiangsu Key Lab of Big Data and Security and Intelligent Processing School of Computer Science and Technology School of Software Nanjing University of Posts and Telecommunications Nanjing China The Third Research Institute of the Ministry of Public Security Shanghai China
With the development of network communication and security authentication technologies, Internet finance, a new financial business model which allows customers to achieve online financing, payment, investment and lend... 详细信息
来源: 评论