咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 125 篇 期刊文献

馆藏范围

  • 283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 177 篇 工学
    • 130 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 52 篇 信息与通信工程
    • 27 篇 生物工程
    • 22 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 99 篇 理学
    • 62 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 deep learning
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 chen ke-jia
  • 10 篇 cao xiaochun
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 273 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
283 条 记 录,以下是71-80 订阅
排序:
Identifying Outliers in Astronomical Images with Unsupervised Machine Learning
收藏 引用
Research in Astronomy and Astrophysics 2022年 第8期22卷 74-84页
作者: Yang Han Zhiqiang Zou Nan Li Yanli Chen School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Key Laboratory of Optical Astronomy National Astronomical ObservatoriesChinese Academy of SciencesBeijing 100101China University of Chinese Academy of Sciences Beijing 100049China
Astronomical outliers,such as unusual,rare or unknown types of astronomical objects or phenomena,constantly lead to the discovery of genuinely unforeseen knowledge in *** unpredictable outliers will be uncovered in pr... 详细信息
来源: 评论
A Fraud Detection Approach Based on Combined Feature Weighting  10th
A Fraud Detection Approach Based on Combined Feature Weighti...
收藏 引用
10th EAI International Conference on Cloud Computing, CloudComp 2020
作者: Liu, Xiaoqian Yu, Chenfei Xia, Bin Gu, Haiyan Wang, Zhenli Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China
data mining technology has yielded fruitful results in the area of crime discovery and intelligent decision making. Credit card is one of the most popular payment methods, providing great convenience and efficiency. H... 详细信息
来源: 评论
Model-Based Offline Policy Optimization with Adversarial Network  26
Model-Based Offline Policy Optimization with Adversarial Net...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
QoI-aware incentive for multimedia crowdsensing enabled learning system
QoI-aware incentive for multimedia crowdsensing enabled lear...
收藏 引用
作者: Gu, Yiren Shen, Hang Bai, Guangwei Wang, Tianjing Liu, Xuejun College of Computer Science and Technology Nanjing Tech University Nanjing211816 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
While much research has been devoted to algorithm improvement of the machine learning model for multimedia applications, relatively little research has focused on the acquisition of massive multimedia datasets with st... 详细信息
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems  26
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Shicheng Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere... 详细信息
来源: 评论
Energy Consumption of IT System in Cloud data Center: Architecture, Factors and Prediction  16th
Energy Consumption of IT System in Cloud Data Center: Archit...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2019
作者: Lin, Haowei Xu, Xiaolong Wang, Xinheng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China University of West London LondonW55RF United Kingdom
In recent years, as cloud data center has grown constantly in size and quantity, the energy consumption of cloud data center has increased dramatically. Therefore, it is of great significance to study the energy-savin... 详细信息
来源: 评论
Resource allocation in cognitive wireless powered communication networks under outage constraint  4
Resource allocation in cognitive wireless powered communicat...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Li, Qun Wang, Longqi Xu, Ding Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing China
We investigate a multi-carrier cognitive wireless powered communication network (CWPCN), where the primary user (PU) is wirelessly powered by harvesting energy from the information signals from the secondary user (SU)... 详细信息
来源: 评论
Indoor Navigation Mechanism based on 5G network for Large Parking Garage  26
Indoor Navigation Mechanism based on 5G network for Large Pa...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Xiaolong Ding, Qun Lin, Licheng Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing210023 China
With the increase of car ownership in China, the problem of difficult parking in cities has become more and more serious. In large parking garage, finding an ideal parking space has become a daily problem for people;e... 详细信息
来源: 评论
Application and visualization of typical clustering algorithms in seismic data analysis
收藏 引用
Procedia Computer Science 2019年 151卷 171-178页
作者: Z. Fan X. Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China
Earthquake brings enormous loss of lives and properties to human beings due to its suddenness, destructiveness and inscrutability. The new techniques for analyzing seismic data can reveal the distribution of earthquak... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding  10
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Wang, Boyang He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论