咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 128 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 51 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 271 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory for Big Data Security and Intelligent Processing"
281 条 记 录,以下是81-90 订阅
排序:
A Novel Gradient Descent Least-Squares (GDLSs) Algorithm for Efficient Gridless Line Spectrum Estimation With Applications in Tomographic SAR Imaging
A Novel Gradient Descent Least-Squares (GDLSs) Algorithm for...
收藏 引用
作者: Shi, Ruizhe Zhang, Zhe Qiu, Xiaolan Ding, Chibiao University of Chinese Academy of Sciences School of Electronic Electrical and Communication Engineering Beijing100190 China Suzhou Aerospace Information Research Institute Suzhou Key Laboratory of Intelligent Aerospace Big Data Application Technology Suzhou Jiangsu215123 China CAS Key Laboratory of Technology in Geo-Spatial Information Processing and Application System Beijing100190 China
This article presents a novel efficient method for gridless line spectrum estimation problems with single snapshot and sparse signals, namely the gradient descent least-squares (GDLS) method. Conventional single-snaps... 详细信息
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
ReconBoost: Boosting Can Achieve Modality Reconcilement  41
ReconBoost: Boosting Can Achieve Modality Reconcilement
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Hua, Cong Xu, Qianqian Bao, Shilong Yang, Zhiyong Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores a novel multi-modal alternating learning paradigm pursuing a reconciliation between the exploitation of uni-modal features and the exploration of cross-modal interactions. This is motivated by the ... 详细信息
来源: 评论
Variable projection algorithms with sparse constraint for separable nonlinear models
收藏 引用
Control Theory and Technology 2024年 第1期22卷 135-146页
作者: Hui-Lang Xu Guang-Yong Chen Si-Qing Cheng Min Gan Jing Chen College of Computer and Data Science Fuzhou UniversityFuzhou350116FujianChina Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350116FujianChina Key Laboratory of Intelligent Metro of Universities in Fujian Fuzhou UniversityFuzhou350116FujianChina Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou UniversityFuzhou350116FujianChina School of Science Jiangnan UniversityWuxi214122JiangsuChina
Separable nonlinear models are widely used in various fields such as time series analysis, system modeling, and machine learning, due to their flexible structures and ability to capture nonlinear behavior of data. How... 详细信息
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud  27
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
27th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2021
作者: Jiang, Yu Xu, Xiaolong Lin, Kunda Duan, Weihua Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
Model-based Offline Policy Optimization with Adversarial Network
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
Multi-task regression learning for survival analysis via prior information guided transductive matrix completion
收藏 引用
Frontiers of Computer Science 2020年 第5期14卷 99-112页
作者: Lei Chen Kai Shao Xianzhong Long Lingsheng Wang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210023China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics and AstronauticsNanjing211106China
Survival analysis aims to predict the occurrence time of a particular event of interest,which is crucial for the prognosis analysis of ***,due to the limited study period and potential losing tracks,the observed data ... 详细信息
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization  7
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
7th International Conference on Cyber security and Information Engineering, ICCSIE 2022
作者: Huang, Jianhua Tang, Yunlong Wei, Yongjun Wang, Huan Zhang, Haifeng Zhang, Bing School of Computer Science and Technology School of Software Guangxi University of Science and Technology Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2024年
作者: Han, Keji Li, Yun Ge, Yao Wang, Ruchuan Nanjing University of Posts and Telecommunications Wenyuan Road 9 Nanjing210046 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Wenyuan Road 9 Nanjing210046 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Wenyuan Road 9 Nanjing210046 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
A Fraud Detection Approach Based on Combined Feature Weighting  10th
A Fraud Detection Approach Based on Combined Feature Weighti...
收藏 引用
10th EAI International Conference on Cloud Computing, CloudComp 2020
作者: Liu, Xiaoqian Yu, Chenfei Xia, Bin Gu, Haiyan Wang, Zhenli Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China
data mining technology has yielded fruitful results in the area of crime discovery and intelligent decision making. Credit card is one of the most popular payment methods, providing great convenience and efficiency. H... 详细信息
来源: 评论