咨询与建议

限定检索结果

文献类型

  • 100 篇 会议
  • 86 篇 期刊文献

馆藏范围

  • 186 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 114 篇 工学
    • 86 篇 计算机科学与技术...
    • 76 篇 软件工程
    • 35 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电气工程
    • 13 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
  • 69 篇 理学
    • 48 篇 数学
    • 27 篇 统计学(可授理学、...
    • 18 篇 生物学
    • 12 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 24 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 machine learning
  • 5 篇 privacy
  • 5 篇 training
  • 4 篇 deep learning
  • 4 篇 task analysis
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 forecasting
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 conferences
  • 3 篇 reinforcement le...
  • 3 篇 anomaly detectio...
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...

机构

  • 59 篇 school of comput...
  • 26 篇 jiangsu key labo...
  • 23 篇 jiangsu key labo...
  • 18 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 jiangsu key labo...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 key laboratory o...
  • 5 篇 institute of inf...

作者

  • 24 篇 xu xiaolong
  • 21 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 7 篇 chen ke-jia
  • 6 篇 lei wang
  • 6 篇 bao shilong
  • 6 篇 bin liu
  • 5 篇 jia xu
  • 5 篇 wang zitai
  • 5 篇 tao li
  • 5 篇 yun li
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin
  • 4 篇 chen yiping
  • 4 篇 xu jia

语言

  • 177 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science"
186 条 记 录,以下是141-150 订阅
排序:
Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social Networks
Joint Spatial-Temporal Trajectory Clustering Method for Mobi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ji Tang Linfeng Liu Jiagao Wu Jian Zhou Yang Xiang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important issue in the trajectory mining task, the trajectory clustering technique has attracted lots of the attention in the field of data mining. Trajectory clustering technique identifies the similar trajecto... 详细信息
来源: 评论
Deep representation learning for road detection using siamese network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Huafeng Han, Xiaofeng Li, Xiangrui Yao, Yazhou Huang, Pu Tang, Zhenming School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Robust road detection is a key challenge in safe autonomous driving. Recently, with the rapid development of 3D sensors, more and more researchers are trying to fuse information across different sensors to improve the... 详细信息
来源: 评论
Temporal data fusion at the edge
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Linfu Liu, Bin School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
—As an enabler technique, data fusion has gained great attention in the context of Internet of things (IoT). In traditional settings, data fusion is done at the cloud server. So the data to be fused should be transfe... 详细信息
来源: 评论
Temporal data Fusion at the Edge
Temporal Data Fusion at the Edge
收藏 引用
IEEE International Symposium on Parallel and Distributed processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Linfu Yang Bin Liu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an enabler technique, data fusion has gained great attention in the context of Internet of things (IoT). In traditional settings, data fusion is done at the cloud server. So the data to be fused should be transferr... 详细信息
来源: 评论
Incentivizing the workers for truth discovery in crowdsourcing with copiers
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Lingyun Niu, Xiaofu Xu, Jia Yang, Dejun Xu, Lijie Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Department of Computer Science Colorado School of Mines GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm for performing large scale tasks. Truth discovery and incentive mechanism are fundamentally important for the crowdsourcing system. Many truth discovery methods and incen... 详细信息
来源: 评论
Sequential online prediction in the presence of outliers and change points: An instant temporal structure learning approach
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Bin Qi, Yu Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing Jiangsu210023 China College of Computer Science and Technology Zhejiang University Hangzhou Zhejiang310058 China
In this paper, we consider sequential online prediction (SOP) for streaming data in the presence of outliers and change points. We propose an INstant TEmporal structure Learning (INTEL) algorithm to address this probl... 详细信息
来源: 评论
DUE Distribution and Pairing in D2D Communication
DUE Distribution and Pairing in D2D Communication
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Weifeng Lu Xiaoqiang Ren Jia Xu Siguang Chen Lijun Yang Jian Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China College of IoT Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
The D2D (Device-to-Device) communication has been very popular as it is a promising and low-cost solution to reduce the burden on the cellular network. However, there are rare concerns about the distribution and pairi... 详细信息
来源: 评论
Risk evaluation of financial websites based on structure mining
Risk evaluation of financial websites based on structure min...
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Li, Huakang Dai, Yuhao Jin, Xu Sun, Guozi Li, Tao Xu, Zheng Jiangsu Key Lab of Big Data and Security and Intelligent Processing School of Computer Science and Technology School of Software Nanjing University of Posts and Telecommunications Nanjing China The Third Research Institute of the Ministry of Public Security Shanghai China
With the development of network communication and security authentication technologies, Internet finance, a new financial business model which allows customers to achieve online financing, payment, investment and lend... 详细信息
来源: 评论
Adaptive Teacher-and-Student Model for Heterogeneous Domain Adaptation
Adaptive Teacher-and-Student Model for Heterogeneous Domain ...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yunyun Wang Xuzhang Chen Songcan Chen Hui Xue College of Computer Science Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts & Telecommunications Nanjing China College of Computer Science & Technology/AI MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics & Astronautics Nanjing China College of Computer Science and Engineering Southeast University Nanjing China
In heterogeneous domain adaptation (HDA), since the feature spaces of the source and target domains are different, knowledge transfer from the source to the target domain is really challenging. How to align the differ...
来源: 评论
FIMI: A Constant Frugal Incentive Mechanism for Time WindowCoverage in Mobile Crowdsensing
收藏 引用
Journal of computer science & Technology 2017年 第5期32卷 919-935页
作者: Jia Xu Jian-Ren Fu De-Jun Yang Li-Jie Xu Lei Wang Tao Li School of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China Department of Computer Science Colorado School of Mines Golden 80401 U.S.A.
Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good service... 详细信息
来源: 评论