咨询与建议

限定检索结果

文献类型

  • 100 篇 会议
  • 88 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 88 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 36 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
  • 70 篇 理学
    • 49 篇 数学
    • 27 篇 统计学(可授理学、...
    • 18 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 24 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 deep learning
  • 5 篇 machine learning
  • 5 篇 privacy
  • 5 篇 training
  • 4 篇 task analysis
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 forecasting
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 conferences
  • 3 篇 reinforcement le...
  • 3 篇 anomaly detectio...
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...

机构

  • 59 篇 school of comput...
  • 26 篇 jiangsu key labo...
  • 23 篇 jiangsu key labo...
  • 19 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 jiangsu key labo...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 key laboratory o...
  • 5 篇 institute of inf...

作者

  • 25 篇 xu xiaolong
  • 21 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 chen ke-jia
  • 6 篇 lei wang
  • 6 篇 bao shilong
  • 6 篇 bin liu
  • 5 篇 jia xu
  • 5 篇 wang zitai
  • 5 篇 tao li
  • 5 篇 yun li
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin
  • 4 篇 chen yiping
  • 4 篇 xu jia

语言

  • 179 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science"
188 条 记 录,以下是51-60 订阅
排序:
A Privacy Leak Detection Mechanism based on Service Binding  10
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Wang, Boyang He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for processing Large-scale datasets on Distributed Platforms  10
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Song, Hu Cheng, Xinyun Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews  5
A Lexical Updating Algorithm for Sentiment Analysis on Chine...
收藏 引用
5th International Conference on Advanced Cloud and big data, CBD 2017
作者: Song, Yiwei Gu, Kaiwen Li, Huakang Sun, Guozi Bell Honor School Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
With the prevalence of Internet, sentiment analysis gets popularity among the world. Researchers have made use of kinds of online documents like commodities reivews and movie reviews as training samples to train their... 详细信息
来源: 评论
Risk evaluation of financial websites based on structure mining
Risk evaluation of financial websites based on structure min...
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Li, Huakang Dai, Yuhao Jin, Xu Sun, Guozi Li, Tao Xu, Zheng Jiangsu Key Lab of Big Data and Security and Intelligent Processing School of Computer Science and Technology School of Software Nanjing University of Posts and Telecommunications Nanjing China The Third Research Institute of the Ministry of Public Security Shanghai China
With the development of network communication and security authentication technologies, Internet finance, a new financial business model which allows customers to achieve online financing, payment, investment and lend... 详细信息
来源: 评论
QoI-aware incentive for multimedia crowdsensing enabled learning system
QoI-aware incentive for multimedia crowdsensing enabled lear...
收藏 引用
作者: Gu, Yiren Shen, Hang Bai, Guangwei Wang, Tianjing Liu, Xuejun College of Computer Science and Technology Nanjing Tech University Nanjing211816 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
While much research has been devoted to algorithm improvement of the machine learning model for multimedia applications, relatively little research has focused on the acquisition of massive multimedia datasets with st... 详细信息
来源: 评论
CBLNER: A Multi-models Biomedical Named Entity Recognition System Based on Machine Learning  1
收藏 引用
15th International Conference on intelligent Computing, ICIC 2019
作者: Lejun, Gong Xiaolin, Liu Xuemin, Yang Lipeng, Zhang Yao, Jia Ronggen, Yang Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China
Biomedical named entities is fundamental recognition task in biomedical text mining. This paper developed a system for identifying biomedical entities with four models including CRF, LSTM, Bi-LSTM and BiLSTM-CRF. The ... 详细信息
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network  10
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
A Social-Aware Mode Selection Algorithm for D2D Communications
A Social-Aware Mode Selection Algorithm for D2D Communicatio...
收藏 引用
International Conference on Communications, Signal processing, and Systems, CSPS 2018
作者: Lu, Wei-feng Lin, Wei-jun Chen, Si-guang Yang, Li-jun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China College of IoT Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Aiming at mode selection in D2D communication, a mode selection strategy based on social-aware was proposed. In addition to physical connection status, users’ social relationships also served as an observation elemen... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
An optimal profit route planning scheme based on ACO-OPP  21
An optimal profit route planning scheme based on ACO-OPP
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data science and Systems, HPCC/SmartCity/DSS 2019
作者: Qiu, Yuhua Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Taxi plays an important role of urban public transportation system. However, without appropriate route planning scheme, taxi drivers can only choose to wait or seek passengers in the absence of orders, leading to wast... 详细信息
来源: 评论