咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 128 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 51 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 271 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
281 条 记 录,以下是151-160 订阅
排序:
Over-sampling algorithm for imbalanced data classification
收藏 引用
Journal of Systems Engineering and Electronics 2019年 第6期30卷 1182-1191页
作者: XU Xiaolong CHEN Wen SUN Yanfei Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China Office of Scientific R&D Nanjing University of Posts and TelecommunicationsNanjing 210023China
For imbalanced datasets, the focus of classification is to identify samples of the minority class. The performance of current data mining algorithms is not good enough for processing imbalanced datasets. The synthetic... 详细信息
来源: 评论
A Novel Gradient Descent Least Squares (GDLS) Algorithm for Efficient SMV Gridless Line Spectrum Estimation with Applications in Tomographic SAR Imaging
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Ruizhe Zhang, Zhe Qiu, Xiaolan Ding, Chibiao School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100190 China Suzhou Aerospace Information Research Institute Suzhou Key Laboratory of Intelligent Aerospace Big Data Application Technology Jiangsu Suzhou215123 China CAS Key Laboratory of Technology in Geo-spatial Information Processing and Application System Beijing100190 China
This paper presents a novel efficient method for gridless line spectrum estimation problem with single snapshot, namely the gradient descent least squares (GDLS) method. Conventional single snapshot (a.k.a. single mea... 详细信息
来源: 评论
Multi-objective optimization for fuzzy workflow scheduling
Multi-objective optimization for fuzzy workflow scheduling
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jie Zhu Jing Zhang Chang Lu Haiping Huang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China Nanjing University of Posts & Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
A fuzzy workflow scheduling problem is investigated with fuzzy temporal parameters, such as the fuzzy task processing times, fuzzy data transmission times and the fuzzy due dates. In the considered problem, the resour... 详细信息
来源: 评论
TSAR-based Expert Recommendation Mechanism for Community Question Answering
TSAR-based Expert Recommendation Mechanism for Community Que...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jian Song Xiaolong Xu Xinheng Wang Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computing and Engineering University of West London London UK
Community Question Answering (CQA) provides a platform to share knowledge for users. With the increasing number of users and questions, askers have to wait a long time for an answer with high quality while responders ... 详细信息
来源: 评论
The minority matters: a diversity-promoting collaborative metric learning algorithm  22
The minority matters: a diversity-promoting collaborative me...
收藏 引用
Proceedings of the 36th International Conference on Neural Information processing Systems
作者: Shilong Bao Qianqian Xu Zhiyong Yang Yuan He Xiaochun Cao Qingming Huang State Key Laboratory of Information Security Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences Alibaba Group School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Laboratory of Big Data Mining and Knowledge Management CAS and Peng Cheng Laboratory
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin...
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
CABAC: A content-driven attribute-based access control model for big data  5th
CABAC: A content-driven attribute-based access control model...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Ma, Ke Yang, Geng Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
In recent years, attribute-based access control (ABAC) models have been widely used in big data and cloud computing. However, with the growing importance of data content, using data content to assist authorization for... 详细信息
来源: 评论
Size-invariance matters: rethinking metrics and losses for imbalanced multi-object salient object detection  24
Size-invariance matters: rethinking metrics and losses for i...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Feiran Li Qianqian Xu Shilong Bao Zhiyong Yang Runmin Cong Xiaochun Cao Qingming Huang Institute of Information Engineering Chinese Academy of Sciences Beijing China and School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China and School of Control Science and Engineering Shandong University Jinan China and Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Shenzhen Campus Sun Yat-sen University School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China and Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China and Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s...
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论