咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 128 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 51 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 11 篇 semantics
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules

机构

  • 59 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie

语言

  • 271 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security&Intelligent Processing"
281 条 记 录,以下是41-50 订阅
排序:
Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第10期129卷 31-45页
作者: Lejun Gong Xingxing Zhang Li Zhang Zhihong Gao Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China
Novel coronavirus disease 2019(COVID-19)is an ongoing health *** studies are related to ***,its molecular mechanism remains *** rapid publication of COVID-19 provides a new way to elucidate its mechanism through compu... 详细信息
来源: 评论
Complex Substation Scene Segmentation Method Based on Optimized Straight Line Detection
Complex Substation Scene Segmentation Method Based on Optimi...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Hao Liu, Chuang Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a scene segmentation method based on optimized line detection to address the difficulty of segmenting spatially independent equipment in complex substation scenes. The method first employs the RANS... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xinyu Liu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ...
来源: 评论
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Lei Sun Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa...
来源: 评论
Recognition of Disaster Images Based on Self-Supervised Learning  7
Recognition of Disaster Images Based on Self-Supervised Lear...
收藏 引用
7th International Conference on Cloud Computing and big data Analytics, ICCCBDA 2022
作者: Wang, Linyong Wu, Ruiqi Li, Cen Zou, Zhiqiang Nanjing University of Posts and Telecommunications NanJing China College of Computer Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanJing China
Existing supervised deep learning model requires large amounts of labeled training data to learn new tasks. This is a limitation for many practical applications in disaster areas as well as in many other fields such a... 详细信息
来源: 评论
A Network Fault Prediction-Based Service Migration Approach for Unstable Mobile Edge Environment
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Wang, Haiyan Tang, Weihao Luo, Jian Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
How to perform efficient service migration in a mobile edge environment has become one of the research hotspots in the field of service computing. Most service migration approaches assume that the mobile edge network ... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Xin Zhai Lijie Xu Jialei Zhang Kun Wang Jia Xu Bei Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu...
来源: 评论
An Answer Summarization Scheme Based on Multilayer Attention Model
An Answer Summarization Scheme Based on Multilayer Attention...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaolong Xu Yihao Dong Jian Song Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s...
来源: 评论
SSR-TA: Sequence to Sequence based expert recurrent recommendation for ticket automation
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Chenhan Fang, Xiaoyu Luo, Bingqing Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
The ticket automation provides crucial support for the normal operation of IT software systems. An essential task of ticket automation is to assign experts to solve upcoming tickets. However, facing thousands of ticke... 详细信息
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Han, Keji Ge, Yao Wang, Ruchuan Li, Yun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论