咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 143 篇 工学
    • 107 篇 计算机科学与技术...
    • 96 篇 软件工程
    • 44 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 19 篇 生物工程
    • 16 篇 电气工程
    • 9 篇 机械工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 交通运输工程
    • 8 篇 网络空间安全
    • 6 篇 安全科学与工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 79 篇 理学
    • 55 篇 数学
    • 30 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 物理学
    • 10 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 45 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 12 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 8 篇 privacy
  • 7 篇 conferences
  • 7 篇 data mining
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 power demand
  • 5 篇 machine learning
  • 5 篇 data models
  • 5 篇 heuristic algori...
  • 4 篇 telecommunicatio...
  • 4 篇 big data
  • 4 篇 schedules
  • 4 篇 computational mo...
  • 4 篇 costs

机构

  • 58 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 11 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 college of compu...
  • 7 篇 school of comput...
  • 6 篇 jiangsu key labo...
  • 5 篇 university of ch...
  • 5 篇 nanjing universi...
  • 4 篇 jiangsu key lab ...
  • 4 篇 wireless communi...
  • 4 篇 faculty intellig...
  • 4 篇 key laboratory o...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 yang geng
  • 6 篇 lejun gong
  • 5 篇 xu lijie
  • 5 篇 wang lei
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li

语言

  • 228 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing"
232 条 记 录,以下是91-100 订阅
排序:
Risk evaluation of financial websites based on structure mining
Risk evaluation of financial websites based on structure min...
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Li, Huakang Dai, Yuhao Jin, Xu Sun, Guozi Li, Tao Xu, Zheng Jiangsu Key Lab of Big Data and Security and Intelligent Processing School of Computer Science and Technology School of Software Nanjing University of Posts and Telecommunications Nanjing China The Third Research Institute of the Ministry of Public Security Shanghai China
With the development of network communication and security authentication technologies, Internet finance, a new financial business model which allows customers to achieve online financing, payment, investment and lend... 详细信息
来源: 评论
Estimating Power Consumption of Containers and Virtual Machines in data Centers
Estimating Power Consumption of Containers and Virtual Machi...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Xusheng Zhang Ziyu Shen Bin Xia Zheng Liu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
Virtualization technologies provide solutions of cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualizatio... 详细信息
来源: 评论
Bidirectional LSTM-CRF for biomedical named entity recognition  14
Bidirectional LSTM-CRF for biomedical named entity recogniti...
收藏 引用
14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Yang, Xuemin Gao, Zhihong Li, Yongmin Pan, Chuandi Yang, Ronggen Gong, Lejun Yang, Geng Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210003 China Zhejiang Engineering Research Center of Intelligence Medicine Wenzhou325035 China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China
Bio-medical entity recognition extracts significant entities, for instance cells, proteins and genes, which is an arduous task in an automatic system that mine knowledge in bioinformatics texts. In this thesis, we uti... 详细信息
来源: 评论
An attribute reduction framework for inconsistent decision tables from view of the boundary region
An attribute reduction framework for inconsistent decision t...
收藏 引用
2016 International Conference on Machine Learning and Cybernetics, ICMLC 2016
作者: Qian, Jin Chang, Yu-Hui Lv, Ping Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City Jiangsu University of Technology Changzhou213015 China Jiangsu Key Laboratory of Big Data Analysis Technology/B-DAT Nanjing University of Information Science and Technology Nanjing China
Attribute reduction is one of the key issues for data preprocess in data mining. Many heuristic attribute reduction algorithms based on discernibility matrix have been proposed for inconsistent decision tables. Howeve... 详细信息
来源: 评论
On link formation in heterogeneous information networks: A view based on multi-Label learning  9
On link formation in heterogeneous information networks: A v...
收藏 引用
9th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017
作者: Chen, Ke-Jia Xue, Shijun Li, Yun Liu, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Center for the Neural Basis of Cognition Carnegie Mellon University PittsburghPA15213 United States
This paper studies the problem of relationship prediction in heterogeneous information networks. Our goal is not only to predict links/relationships more accurately but also to provide more viable paths to facilitate ... 详细信息
来源: 评论
A relation prediction method based on PU learning
A relation prediction method based on PU learning
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Gao-Jing Peng Ke-Jia Chen Shijun Xue Bin Liu Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China
This paper studies relation prediction in heterogeneous information networks under PU learning context. One of the challenges of this problem is the imbalance of data number between the positive set P (the set of node... 详细信息
来源: 评论
Robustness May be at Odds with Stability in Adversarial Training based Feature Selection?
Robustness May be at Odds with Stability in Adversarial Trai...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yue Liu Yun Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important stage in machine learning pipeline, feature selection techniques are mainly used to improve the generalization performance and training efficiency of machine learning model, but few works have focused ... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xinyu Liu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ...
来源: 评论
Modeling Disease Progression via Weakly Supervised Temporal Multitask Matrix Completion
Modeling Disease Progression via Weakly Supervised Temporal ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Lingsheng Wang Lei Xu Ping Li Siming Zha Lei Chen Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Alzheimer's disease (AD) is one of the most common neurodegenerative diseases. Understanding AD progression can empower the patients in taking proactive care. Mini Mental State Examination (MMSE) and AD Assessment... 详细信息
来源: 评论
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Lei Sun Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa...
来源: 评论