咨询与建议

限定检索结果

文献类型

  • 160 篇 会议
  • 124 篇 期刊文献

馆藏范围

  • 284 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 128 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 51 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 274 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
284 条 记 录,以下是201-210 订阅
排序:
Application of C4.5 decision tree for scholarship evaluations
收藏 引用
Procedia Computer Science 2019年 151卷 179-184页
作者: X. Wang C. Zhou X. Xu College of Overseas Education Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China
Under the global trend of modern quality education, the set of higher educational scholarship is aimed to reward the students who work hard both inside and outside class activities and achieve great success in kinds o... 详细信息
来源: 评论
Exploring the Pan-Relationship Between Disease and Symptom Related to Coronary Heart Disease from Chinese Electronic Medical Records  15th
Exploring the Pan-Relationship Between Disease and Symptom R...
收藏 引用
15th International Conference on intelligent Computing, ICIC 2019
作者: Yang, Ronggen Wang, Yichen Wang, Bo Gong, Lejun Faculty of Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210046 China School of Geography and Bioinformatics Nanjing University of Posts and Telecommunication Nanjing China
Electronic Medical Records (EMRs) arises from the clinical treatment process, which reflects a patient’s physical condition, the disease, the treatment process, etc. It has an important significance for the recovery ... 详细信息
来源: 评论
Harnessing low-fidelity data to accelerate Bayesian optimization via posterior regularization
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Bin School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Bayesian optimization (BO) is a powerful paradigm for derivative-free global optimization of a black-box objective function (BOF) that is expensive to evaluate. However, the overhead of BO can still be prohibitive for... 详细信息
来源: 评论
Robust Particle Filtering via Bayesian Nonparametric Outlier Modeling (Poster)
Robust Particle Filtering via Bayesian Nonparametric Outlier...
收藏 引用
International Conference on Information Fusion
作者: Bin Liu School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
This paper is concerned with the online estimation of a nonlinear dynamic system from a series of noisy measurements. The focus is on cases wherein outliers are present in-between normal noises. We assume that the out... 详细信息
来源: 评论
Topic modeling for noisy short texts with multiple relations  30
Topic modeling for noisy short texts with multiple relations
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Liu, Chiyu Liu, Zheng Li, Tao Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Understanding contents in social networks by inferring high-quality latent topics from short texts is a significant task in social analysis, which is challenging because social network contents are usually extremely s... 详细信息
来源: 评论
Anomaly detection for drinking water quality via deep bilSTM ensemble  18
Anomaly detection for drinking water quality via deep bilSTM...
收藏 引用
2018 Genetic and Evolutionary Computation Conference, GECCO 2018
作者: Chen, Xingguo Feng, Fan Wu, Jikai Liu, Wenyu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu Province China
In this paper, a deep BiLSTM ensemble method was proposed to detect anomaly of drinking water quality. First, a convolutional neural network (CNN) is utilized as a feature extractor in order to process the raw data of... 详细信息
来源: 评论
data-DRIVEN MODEL SET DESIGN FOR MODEL AVERAGED PARTICLE FILTER
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Bin School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper is concerned with sequential state filtering in the presence of nonlinearity, non-Gaussianity and model uncertainty. For this problem, the Bayesian model averaged particle filter (BMAPF) is perhaps one of t... 详细信息
来源: 评论
Non-structured Pruning for Deep-learning based Steganalytic Frameworks
Non-structured Pruning for Deep-learning based Steganalytic ...
收藏 引用
Asia-Pacific Signal and Information processing Association Annual Summit and Conference (APSIPA)
作者: Qiushi Li Zilong Shao Shunquan Tan Jishen Zeng Bin Li Shenzhen Key Laboratory of Media Security Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Image steganalysis aims to discriminate innocent cover images and those suspected stego images embedded with secret message. Recently, increasing advanced deep neural networks have been proposed and used in image steg... 详细信息
来源: 评论
Impact of Feature Selection Methods on data Classification for IDS
Impact of Feature Selection Methods on Data Classification f...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The rapid increase of data has led to many security issues. Various new technologies and other sub-disciplines have been introduced into the research of intrusion detection system (IDS), which has become a hot topic i... 详细信息
来源: 评论
Lightweight EEG Classification Model Based on EEG-sensor with Few Channels
Lightweight EEG Classification Model Based on EEG-sensor wit...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Haoyan Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In the traditional work, based on EEG Sensors monitoring the physiological and emotional state of humans, the time-frequency analysis method is usually used to extract the characteristics of the signal, and then analy... 详细信息
来源: 评论