咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 128 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 51 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 271 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
281 条 记 录,以下是1-10 订阅
排序:
Personalized Privacy-Preserving Routing Mechanism Design in Payment Channel Network
收藏 引用
Journal of Computer Science & Technology 2024年 第6期39卷 1380-1400页
作者: Peng-Cheng Zhao Li-Jie Xu Jia Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China
Payment Channel Network(PCN)provides the off-chain settlement of *** is one of the most promising solutions to solve the scalability issue of the *** routing techniques in PCN have been ***,both incentive attack and p... 详细信息
来源: 评论
Wireless Charging Scheduling for Long-term Utility Optimization
收藏 引用
ACM Transactions on Sensor Networks 2025年 第1期21卷 1-31页
作者: Xu, Jia Chen, Wenbin Dai, Haipeng Xu, Lijie Xiao, Fu Liu, Linfeng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China The State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have inve... 详细信息
来源: 评论
An Answer Summarization Scheme Based on Multilayer Attention Model  26
An Answer Summarization Scheme Based on Multilayer Attention...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Xiaolong Dong, Yihao Song, Jian Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning  26
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Xinyu Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ... 详细信息
来源: 评论
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks  26
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Sun, Lei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs  21
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhai, Xin Xu, Lijie Zhang, Jialei Wang, Kun Xu, Jia Xu, Bei Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu... 详细信息
来源: 评论
A label-guided contrastive capsule network for few-shot text classification
收藏 引用
Neural Computing and Applications 2025年 1-26页
作者: Xu, Yang Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Few-shot text classification involves transferring knowledge from a limited dataset to perform classification tasks in unseen domains. Existing metric-based meta-learning models, such as prototypical networks, have sh... 详细信息
来源: 评论
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
DCEL:classifier fusion model for Android malware detection
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ... 详细信息
来源: 评论
Personalized Review Recommendation based on Implicit dimension mining
Personalized Review Recommendation based on Implicit dimensi...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Xu, Bei Xu, Yifan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Users usually browse product reviews before buying products from e-commerce websites. Lots of e-commerce websites can recommend reviews. However, existing research on review recommendation mainly focuses on the genera... 详细信息
来源: 评论