咨询与建议

限定检索结果

文献类型

  • 100 篇 会议
  • 88 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 88 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 36 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
  • 70 篇 理学
    • 49 篇 数学
    • 27 篇 统计学(可授理学、...
    • 18 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 24 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 deep learning
  • 5 篇 machine learning
  • 5 篇 privacy
  • 5 篇 training
  • 4 篇 task analysis
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 forecasting
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 conferences
  • 3 篇 reinforcement le...
  • 3 篇 anomaly detectio...
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...

机构

  • 59 篇 school of comput...
  • 26 篇 jiangsu key labo...
  • 23 篇 jiangsu key labo...
  • 19 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 jiangsu key labo...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 key laboratory o...
  • 5 篇 institute of inf...

作者

  • 25 篇 xu xiaolong
  • 21 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 chen ke-jia
  • 6 篇 lei wang
  • 6 篇 bao shilong
  • 6 篇 bin liu
  • 5 篇 jia xu
  • 5 篇 wang zitai
  • 5 篇 tao li
  • 5 篇 yun li
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin
  • 4 篇 chen yiping
  • 4 篇 xu jia

语言

  • 179 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science"
188 条 记 录,以下是31-40 订阅
排序:
Personalized Review Recommendation based on Implicit dimension mining
Personalized Review Recommendation based on Implicit dimensi...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Xu, Bei Xu, Yifan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Users usually browse product reviews before buying products from e-commerce websites. Lots of e-commerce websites can recommend reviews. However, existing research on review recommendation mainly focuses on the genera... 详细信息
来源: 评论
Multi-source Infection Pattern Mining Algorithms over Moving Objects  25
Multi-source Infection Pattern Mining Algorithms over Moving...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Chen, Yu Dai, Hua Yang, Geng Chen, Yanli Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210003 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
Using the trajectory data of moving objects to analyze and study the infection mode of viruses or germs has practical application value. The definition of infection pattern in existing works only considers one-to-one ... 详细信息
来源: 评论
Distributed Image Retrieval Base on LSH Indexing on Spark  1st
Distributed Image Retrieval Base on LSH Indexing on Spark
收藏 引用
1st International Conference on big data and security, ICBDS 2019
作者: Hou, Zelei Huang, Chao Wu, Jiagao Liu, Linfeng School of Computer Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanjingJiangsu210023 China
With the advent of the era of big data, how to process massive image, video and other multimedia data timely and accurately has become a new challenge in related fields. Aiming at the computational bottleneck and inef... 详细信息
来源: 评论
Customized scheduling for shared bus with deadlines
Customized scheduling for shared bus with deadlines
收藏 引用
作者: Jin, Yong Xu, Jia Xu, Lijie Liu, Linfeng Xiao, Fu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science & Engineering Changshu Institute of Technology Jiangsu Changshu China
Public transportation system is one of the most effective ways to conserve energy and reduce carbon emissions. However, the traditional public transportation system does not provide customized service and cannot guara... 详细信息
来源: 评论
Discrimination-Aware Domain Adversarial Neural Network
收藏 引用
Journal of computer science & Technology 2020年 第2期35卷 259-267页
作者: Yun-Yun Wang Jian-Min Gu Chao Wang Song-Can Chen Hui Xue College of Computer Science and Engineering Nanjing University of Posts and Telecommunications Nanjing 210046China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210046China College of Computer Science and Technology/College of Artificial Intelligence Nanjing University of Aeronautics and AstronauticsNanjing 210023China Key Laboratory of Pattern Analysis and Machine Intelligence Ministry of Industry and Information Technology Nanjing 210023China School of Computer Science and Engineering Southeast UniversityNanjing 210096China
The domain adversarial neural network(DANN)methods have been successfully proposed and attracted much attention *** DANNs,a discriminator is trained to discriminate the domain labels of features generated by a generat... 详细信息
来源: 评论
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 评论
Community-based message forwarding in mobile social networks
Community-based message forwarding in mobile social networks
收藏 引用
2019 International Conference on Advances in computer Technology, Information science and Communications, CTISC 2019
作者: Chen, Zhiming Xiang, Yang School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
With the popularity of various smart devices and the application of sensor network technology, message transmission using mobile devices is becoming widespread. This paper focuses on the forwarding in mobile social ne... 详细信息
来源: 评论
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products  15
Point Cloud Compression Method Based on Curvature Grading an...
收藏 引用
15th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Ran Nanjing University of Posts and Telecommunications School of Computer Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The traditional point cloud compression methods fail to meet the compression requirements of complex surface point cloud files in the industrial field. This paper proposes a point cloud compression method suitable for... 详细信息
来源: 评论
Learning Disentangled Latent Factors for Individual Treatment Effect Estimation Using Variational Generative Adversarial Nets  25
Learning Disentangled Latent Factors for Individual Treatmen...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Bao, Qingsen Mao, Zeyong Chen, Lei Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Estimating individual treatment effect (ITE) is a challenging task due to the need for individual potential outcomes to be learned from biased data and counterfactuals are inherently unobservable. Some researchers pro... 详细信息
来源: 评论
An adaptive flow table adjustment algorithm for SDN  21
An adaptive flow table adjustment algorithm for SDN
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data science and Systems, HPCC/SmartCity/DSS 2019
作者: Xu, Xiaolong Hu, Liuyun Lin, Haowei Fan, Zexuan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
SDN (Software-defined networking) are important for current network systems, such as cloud systems. The characteristics of flow in SDN and the impact of flow table entries and controllers on data packet transmission a... 详细信息
来源: 评论