咨询与建议

限定检索结果

文献类型

  • 100 篇 会议
  • 88 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 88 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 36 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
  • 70 篇 理学
    • 49 篇 数学
    • 27 篇 统计学(可授理学、...
    • 18 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 24 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 deep learning
  • 5 篇 machine learning
  • 5 篇 privacy
  • 5 篇 training
  • 4 篇 task analysis
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 forecasting
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 conferences
  • 3 篇 reinforcement le...
  • 3 篇 anomaly detectio...
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...

机构

  • 59 篇 school of comput...
  • 26 篇 jiangsu key labo...
  • 23 篇 jiangsu key labo...
  • 19 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 jiangsu key labo...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 key laboratory o...
  • 5 篇 institute of inf...

作者

  • 25 篇 xu xiaolong
  • 21 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 chen ke-jia
  • 6 篇 lei wang
  • 6 篇 bao shilong
  • 6 篇 bin liu
  • 5 篇 jia xu
  • 5 篇 wang zitai
  • 5 篇 tao li
  • 5 篇 yun li
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin
  • 4 篇 chen yiping
  • 4 篇 xu jia

语言

  • 179 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science"
188 条 记 录,以下是91-100 订阅
排序:
LogPal: A Generic Anomaly Detection Scheme of Heterogeneous Logs for Network Systems
收藏 引用
security and Communication Networks 2023年 第1期2023卷
作者: Sun, Lei Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
As a key resource for diagnosing and identifying problems, network syslog contains vast quantities of information. And it is the main source of data for anomaly detection of systems. Syslog presents the characteristic... 详细信息
来源: 评论
MNN: Mixed Nearest-Neighbors for Self-Supervised Learning
arXiv
收藏 引用
arXiv 2023年
作者: Long, Xianzhong Peng, Chen Li, Yun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
In contrastive self-supervised learning, positive samples are typically drawn from the same image but in different augmented views, resulting in a relatively limited source of positive samples. An effective way to all... 详细信息
来源: 评论
Dafl: Domain Adaptation-Based Federated Learning for Privacy-Preserving Biometric Recognition
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zhousheng Yang, Geng Dai, Hua Bai, Yunlu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big data Security & Intelligent Processing Nanjing210023 China
With the introduction of data protection regulation in various countries, traditional centralized learning for the exploitation of sensitive biological information will gradually become unsustainable. We take face and... 详细信息
来源: 评论
SLBERT: An Improved FLAT-BERT for Named Entity Recognition
SSRN
收藏 引用
SSRN 2022年
作者: Fei, Yuefan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China
Named Entity Recognition (NER) aims to identify named entities mentioned in unstructured text and classify them into predefined named entity classes. Although models using word fusion have achieved relatively high per... 详细信息
来源: 评论
Incentivizing the Biased Requesters: Truthful Task Assignment Mechanisms in Crowdsourcing
Incentivizing the Biased Requesters: Truthful Task Assignmen...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Jia Xu Hui Li Yanxu Li Dejun Yang Tao Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing Jiangsu China School of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Department of Computer Science Colorado School of Mines Golden CO USA
Crowdsourcing has become an effective tool to utilize human intelligence to perform tasks that are challenging for machines. In the integrated crowdsourcing systems, the requesters are non- monopolistic and may show p... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Qun Ding Xiaolong Xu Wenming Gui Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jinling Institute of Technology Nanjing China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis...
来源: 评论
Indoor Navigation Mechanism based on 5G network for Large Parking Garage
Indoor Navigation Mechanism based on 5G network for Large Pa...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xiaolong Xu Qun Ding Licheng Lin School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
With the increase of car ownership in China, the problem of difficult parking in cities has become more and more serious. In large parking garage, finding an ideal parking space has become a daily problem for people; ...
来源: 评论
Impact of Feature Selection Methods on data Classification for IDS
Impact of Feature Selection Methods on Data Classification f...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The rapid increase of data has led to many security issues. Various new technologies and other sub-disciplines have been introduced into the research of intrusion detection system (IDS), which has become a hot topic i... 详细信息
来源: 评论
Network data Classification Mechanism for Intrusion Detection System
Network Data Classification Mechanism for Intrusion Detectio...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Intrusion detection system (IDS), as a network security device, monitors network data in real time and responds actively when it detects suspicious transmissions. However, suffered from the large amount of redundancy ... 详细信息
来源: 评论
HERMES: Pedestrian Real-Time Offline Positioning and Moving Trajectory Tracking System Based on MEMS Sensors
HERMES: Pedestrian Real-Time Offline Positioning and Moving ...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Xinxin Liu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of positioning technology, sensor-based positioning has become the most commonly used positioning method because it is more low-cost and efficient with the popularity of smart phones. In this pape... 详细信息
来源: 评论