咨询与建议

限定检索结果

文献类型

  • 160 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 128 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 51 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 273 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory Big Data Security and Intelligent Processing"
283 条 记 录,以下是51-60 订阅
排序:
Design Guidance for Lightweight Object Detection Models  3rd
Design Guidance for Lightweight Object Detection Models
收藏 引用
3rd International Conference on big data and security, ICBDS 2021
作者: Wang, Rui Wang, Xueli Chen, Yunfang Zhang, Wei School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
The lightweight target detection model is deployed in an environment with limited computing power and power consumption, which is widely used in many fields. Most of the current lightweight technologies only focus on ... 详细信息
来源: 评论
Privacy Protection for Image Sharing Using Reversible Adversarial Examples
Privacy Protection for Image Sharing Using Reversible Advers...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ping Yin Wei Chen Jiaxi Zheng Yiting Zhang Lifa Wu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Online image sharing on social media platforms faces information leakage due to deep learning-aided privacy attacks. To avoid these attacks, this paper proposes a privacy protection mechanism for image sharing without... 详细信息
来源: 评论
Decomposing Source Codes by Program Slicing for Bug Localization
Decomposing Source Codes by Program Slicing for Bug Localiza...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jian Yong Ziye Zhu Yun Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications
Bug localization, which aims to automatically locate buggy source code files based on the given bug report, is a critical yet time-consuming task in the software engineering field. Existing advanced bug localization m...
来源: 评论
Identifying Outliers in Astronomical Images with Unsupervised Machine Learning
收藏 引用
Research in Astronomy and Astrophysics 2022年 第8期22卷 74-84页
作者: Yang Han Zhiqiang Zou Nan Li Yanli Chen School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Key Laboratory of Optical Astronomy National Astronomical ObservatoriesChinese Academy of SciencesBeijing 100101China University of Chinese Academy of Sciences Beijing 100049China
Astronomical outliers,such as unusual,rare or unknown types of astronomical objects or phenomena,constantly lead to the discovery of genuinely unforeseen knowledge in *** unpredictable outliers will be uncovered in pr... 详细信息
来源: 评论
RFC:a feature selection algorithm for software defect prediction
收藏 引用
Journal of Systems Engineering and Electronics 2021年 第2期32卷 389-398页
作者: XU Xiaolong CHEN Wen WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China School of Computing and Engineering University of West LondonLondon W55RFUK
Software defect prediction(SDP)is used to perform the statistical analysis of historical defect data to find out the distribution rule of historical defects,so as to effectively predict defects in the new ***,there ar... 详细信息
来源: 评论
Hyperspectral Image Destriping and Denoising with Spectral Low Rank and Tensor Nuclear Norm
Hyperspectral Image Destriping and Denoising with Spectral L...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Pengfei Liu Lanlan Liu School of Computer Science Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing China
In this paper, we propose a new method for simultaneous hyperspectral image (HSI) destriping and denoising with spectral low-rank and tensor nuclear norm under the tensor framework. Specifically, the tensor nuclear no...
来源: 评论
Evaluating Consideration Level of Responses For Mental Health Chatbots
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Bei Zhuang, Ziyuan Wang, Yue Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China
Mental health chatbots are widely used and proven useful in the conversation of psychological treatments. The users of mental health chatbots require "considerate" responses because they are relatively sensi... 详细信息
来源: 评论
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving Objects
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: You Chen Hua Dai Mingfeng Jiang Qu Lu Pengyue Li Bohan Li Geng Yang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
During infectious disease outbreaks, tracking contacted objects is important for suppressing the spread of the virus and using trajectories of moving objects to discover contacted objects is one of effective approache... 详细信息
来源: 评论
A Variance Minimization Approach to Temporal-Difference Learning
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xingguo Gong, Yu Yang, Shangdong Wang, Wenhao Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China College of Electronic Engineering National University of Defense Technology China
Fast-converging algorithms are a contemporary requirement in reinforcement learning. In the context of linear function approximation, the magnitude of the smallest eigenvalue of the key matrix is a major factor reflec... 详细信息
来源: 评论
Semi-supervised Deep Closest Point Method for Point Cloud Registration
Semi-supervised Deep Closest Point Method for Point Cloud Re...
收藏 引用
2021 International Conference on Robotics Automation and intelligent Control, ICRAIC 2021
作者: Wu, Yong Shen, Lingfeng Li, Ping Jiangsu Power Transmission and Transformation Co. Ltd. Nanjing211106 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
Point cloud registration is one of the key issues in fields that need 3D scenes with global vision, including 3D scene reconstruction in robot technology, high-accuracy 3D map reconstruction in automatic driving, 3D r... 详细信息
来源: 评论