咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 90 篇 期刊文献

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 109 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 生物工程
    • 19 篇 电气工程
    • 19 篇 控制科学与工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 74 篇 理学
    • 47 篇 数学
    • 27 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 13 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 49 篇 管理学
    • 28 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 7 篇 training
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 5 篇 deep learning
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 sensors
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 57 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...

作者

  • 36 篇 xu xiaolong
  • 28 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 9 篇 yang geng
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 lejun gong
  • 6 篇 dai hua
  • 6 篇 xu qianqian

语言

  • 232 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab.of Big Data Security and Intelligent Processing"
236 条 记 录,以下是81-90 订阅
排序:
A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud data  16th
A Parallel Multi-keyword Top-k Search Scheme over Encrypted ...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2019
作者: Yang, Maohu Dai, Hua Bao, Jingjing Yi, Xun Yang, Geng Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing210023 China Royal Melbourne Institute of Technology University Melbourne3001 Australia
With searchable encryptions in the cloud computing, users can outsource their sensitive data in ciphertext to the cloud that provides efficient and privacy-preserving multi-keyword top-k searches. However, most existi... 详细信息
来源: 评论
User Grouping for Sharing Services with Capacity Limit
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2021年 第2期14卷 614-627页
作者: Liu, Xiping Dou, Wanchun Wang, Xin Nanjing Univ Posts & Telecommun Jiangsu Key Lab Big Data Security& Intelligent Pr Sch Comp Sci Nanjing 210023 Jiangsu Peoples R China Nanjing Univ State Key Lab Novel Software Technol Dept Comp Sci & Technol Nanjing 210023 Jiangsu Peoples R China SUNY Stony Brook Wireless Networking & Syst Lab Dept Elect & Comp Engn Stony Brook NY 11794 USA
Sharing a service among multiple users could bring benefit to users by reducing their service price and also benefit service providers by allowing them to make more profit. Shared services usually have a capacity limi... 详细信息
来源: 评论
TFS-index-based Multi-keyword Ranked Search Scheme over Cloud Encrypted data  29
TFS-index-based Multi-keyword Ranked Search Scheme over Clou...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Deng, Yinfu Dai, Hua Liu, Yuanlong Li, Zhangchen Yang, Geng Yi, Xun Nanjing University of Post and Telecommunication Nanjing China Nanjing University of Post and Telecommunication Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing China Royal Melbourne Institute of Technology University Melbourne Australia
Traditional searchable encryption schemes for clouds are generally based on TF-IDF vector space model, but they ignore the high-dimensional sparse characteristic of encrypted vectors. It will lead to substantial compu... 详细信息
来源: 评论
Estimating Power Consumption of Containers and Virtual Machines in data Centers
Estimating Power Consumption of Containers and Virtual Machi...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Xusheng Zhang Ziyu Shen Bin Xia Zheng Liu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
Virtualization technologies provide solutions of cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualizatio... 详细信息
来源: 评论
A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews  5
A Lexical Updating Algorithm for Sentiment Analysis on Chine...
收藏 引用
5th International Conference on Advanced Cloud and big data, CBD 2017
作者: Song, Yiwei Gu, Kaiwen Li, Huakang Sun, Guozi Bell Honor School Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
With the prevalence of Internet, sentiment analysis gets popularity among the world. Researchers have made use of kinds of online documents like commodities reivews and movie reviews as training samples to train their... 详细信息
来源: 评论
A survey on trust modeling from a bayesian perspective
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Bin School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security & Intelligent Processing
In this paper, we are concerned with trust modeling for agents in networked computing systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many attempts have been made to model... 详细信息
来源: 评论
Visco-acoustic Wave-equation Traveltime Inversion with Correct and Incorrect Attenuation Profiles  87
Visco-acoustic Wave-equation Traveltime Inversion with Corre...
收藏 引用
Society of Exploration Geophysicists International Exposition and 87th Annual Meeting, SEG 2017
作者: Yu, Han Chen, Yuqing Guo, Bowen Schuster, Gerard T. Division of Physical Sciences and Engineering King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210003 China
A visco-acoustic wave-equation traveltime inversion method is presented that inverts for a shallow subsurface velocity distribution with correct and incorrect attenuation profiles. Similar to the classical wave equati... 详细信息
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network  10
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
Semi-supervised Deep Closest Point Method for Point Cloud Registration
Semi-supervised Deep Closest Point Method for Point Cloud Re...
收藏 引用
2021 International Conference on Robotics Automation and intelligent Control, ICRAIC 2021
作者: Wu, Yong Shen, Lingfeng Li, Ping Jiangsu Power Transmission and Transformation Co. Ltd. Nanjing211106 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
Point cloud registration is one of the key issues in fields that need 3D scenes with global vision, including 3D scene reconstruction in robot technology, high-accuracy 3D map reconstruction in automatic driving, 3D r... 详细信息
来源: 评论
Learning Task-aware Robust Deep Learning Systems
arXiv
收藏 引用
arXiv 2020年
作者: Han, Keji Li, Yun Long, Xianzhong Ge, Yao Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
Many works demonstrate that deep learning system is vulnerable to adversarial attack. A deep learning system consists of two parts: the deep learning task and the deep model. Nowadays, most existing works investigate ... 详细信息
来源: 评论