咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 128 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 51 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 271 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
281 条 记 录,以下是211-220 订阅
排序:
Incentivizing the workers for truth discovery in crowdsourcing with copiers
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Lingyun Niu, Xiaofu Xu, Jia Yang, Dejun Xu, Lijie Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Department of Computer Science Colorado School of Mines GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm for performing large scale tasks. Truth discovery and incentive mechanism are fundamentally important for the crowdsourcing system. Many truth discovery methods and incen... 详细信息
来源: 评论
Using NSGA-Ⅲ for optimising biomedical ontology alignment
收藏 引用
CAAI Transactions on Intelligence Technology 2019年 第3期4卷 135-141页
作者: Xingsi Xue Jiawei Lu Junfeng Chen College of Information Science and Engineering Fujian University of TechnologyFuzhouFujianPeople’s Republic of China Intelligent Information Processing Research Center Fujian University of TechnologyFuzhouFujianPeople’s Republic of China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhouFujianPeople’s Republic of China Fujian Key Laboratory for Automotive Electronics and Electric Drive Fujian University of TechnologyFuzhouFujianPeople’s Republic of China College of IOT Engineering Hohai UniversityChangzhouJiangsuPeople’s Republic of China
To support semantic inter-operability between the biomedical information systems, it is necessary to determine the correspondences between the heterogeneous biomedical concepts, which is commonly known as biomedical o... 详细信息
来源: 评论
Corrigendum to Intrusion detection based on improved density peak clustering for imbalanced data on sensor-cloud systems Journal of Systems Architecture volume 118 (2021) 102212
收藏 引用
Journal of Systems Architecture 2021年 119卷
作者: Ming Yan Yewang Chen Xiaoliang Hu Dongdong Cheng Yi Chen Jixiang Du The College of Computer Science and Technology Huaqiao University Xiamen China Beijing Key Laboratory of Big Data Technology for Food Safety Beijing Technology and Business University Beijing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao University Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China College of Big Data and Intelligent Engineering Yangtze Normal University Chongqing China
来源: 评论
Deep representation learning for road detection using siamese network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Huafeng Han, Xiaofeng Li, Xiangrui Yao, Yazhou Huang, Pu Tang, Zhenming School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Robust road detection is a key challenge in safe autonomous driving. Recently, with the rapid development of 3D sensors, more and more researchers are trying to fuse information across different sensors to improve the... 详细信息
来源: 评论
Multi-agent game abstraction via graph attention neural network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Yong Wang, Weixun Hu, Yujing Hao, Jianye Chen, Xingguo Gao, Yang National Key Laboratory for Novel Software Technology Nanjing University Tianjin University NetEase Fuxi AI Lab Noah's Ark Lab Huawei Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
In large-scale multi-agent systems, the large number of agents and complex game relationship cause great difficulty for policy learning. Therefore, simplifying the learning process is an important research issue. In m... 详细信息
来源: 评论
Resource allocation in cognitive wireless powered communication networks under outage constraint  4
Resource allocation in cognitive wireless powered communicat...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Li, Qun Wang, Longqi Xu, Ding Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing China
We investigate a multi-carrier cognitive wireless powered communication network (CWPCN), where the primary user (PU) is wirelessly powered by harvesting energy from the information signals from the secondary user (SU)... 详细信息
来源: 评论
Secure communications for primary users in cognitive radio networks with collusive eavesdroppers
Secure communications for primary users in cognitive radio n...
收藏 引用
作者: Xu, Ding Li, Qun Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, t... 详细信息
来源: 评论
Localization of Deep Inpainting Using High-Pass Fully Convolutional Network
Localization of Deep Inpainting Using High-Pass Fully Convol...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Haodong Li Jiwu Huang Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Image inpainting has been substantially improved with deep learning in the past years. Deep inpainting can fill image regions with plausible contents, which are not visually apparent. Although inpainting is originally... 详细信息
来源: 评论
Sequential online prediction in the presence of outliers and change points: An instant temporal structure learning approach
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Bin Qi, Yu Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing Jiangsu210023 China College of Computer Science and Technology Zhejiang University Hangzhou Zhejiang310058 China
In this paper, we consider sequential online prediction (SOP) for streaming data in the presence of outliers and change points. We propose an INstant TEmporal structure Learning (INTEL) algorithm to address this probl... 详细信息
来源: 评论
Temporal data fusion at the edge
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Linfu Liu, Bin School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
—As an enabler technique, data fusion has gained great attention in the context of Internet of things (IoT). In traditional settings, data fusion is done at the cloud server. So the data to be fused should be transfe... 详细信息
来源: 评论