咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 89 篇 期刊文献

馆藏范围

  • 230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 141 篇 工学
    • 106 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 44 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 19 篇 生物工程
    • 14 篇 电气工程
    • 9 篇 机械工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 交通运输工程
    • 8 篇 网络空间安全
    • 6 篇 安全科学与工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 79 篇 理学
    • 55 篇 数学
    • 30 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 物理学
    • 10 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 45 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 conferences
  • 7 篇 data mining
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 machine learning
  • 5 篇 heuristic algori...
  • 4 篇 power demand
  • 4 篇 big data
  • 4 篇 schedules
  • 4 篇 costs
  • 4 篇 security

机构

  • 58 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 11 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 5 篇 nanjing universi...
  • 4 篇 jiangsu key lab ...
  • 4 篇 wireless communi...
  • 4 篇 university of ch...
  • 4 篇 faculty intellig...
  • 4 篇 key laboratory o...

作者

  • 37 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 lejun gong
  • 5 篇 xu lijie
  • 5 篇 wang lei
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng

语言

  • 228 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing"
230 条 记 录,以下是101-110 订阅
排序:
A Network Fault Prediction-Based Service Migration Approach for Unstable Mobile Edge Environment
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Wang, Haiyan Tang, Weihao Luo, Jian Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
How to perform efficient service migration in a mobile edge environment has become one of the research hotspots in the field of service computing. Most service migration approaches assume that the mobile edge network ... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Xin Zhai Lijie Xu Jialei Zhang Kun Wang Jia Xu Bei Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu...
来源: 评论
Latent Group Recommendation based on Double Fuzzy Clustering and Matrix Tri-factorization
Latent Group Recommendation based on Double Fuzzy Clustering...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Haiyan Wang Jinxia Zhu Zhousheng Wang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Group recommendation has received great attention owing to its practical value in real applications. However, group members are implicit and groups are formed occasionally in some scenarios. Existing solutions for lat... 详细信息
来源: 评论
An Answer Summarization Scheme Based on Multilayer Attention Model
An Answer Summarization Scheme Based on Multilayer Attention...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaolong Xu Yihao Dong Jian Song Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s...
来源: 评论
SSR-TA: Sequence to Sequence based expert recurrent recommendation for ticket automation
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Chenhan Fang, Xiaoyu Luo, Bingqing Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
The ticket automation provides crucial support for the normal operation of IT software systems. An essential task of ticket automation is to assign experts to solve upcoming tickets. However, facing thousands of ticke... 详细信息
来源: 评论
Learning Task-aware Robust Deep Learning Systems
arXiv
收藏 引用
arXiv 2020年
作者: Han, Keji Li, Yun Long, Xianzhong Ge, Yao Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
Many works demonstrate that deep learning system is vulnerable to adversarial attack. A deep learning system consists of two parts: the deep learning task and the deep model. Nowadays, most existing works investigate ... 详细信息
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Han, Keji Ge, Yao Wang, Ruchuan Li, Yun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
Community-based Message Forwarding in Mobile Social Networks
Community-based Message Forwarding in Mobile Social Networks
收藏 引用
作者: Zhiming Chen Yang Xiang School of Computer Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
With the popularity of various smart devices and the application of sensor network technology, message transmission using mobile devices is becoming *** paper focuses on the forwarding in mobile social network(MSN).Th...
来源: 评论
Exploring the Pan-Relationship Between Disease and Symptom Related to Coronary Heart Disease from Chinese Electronic Medical Records  15th
Exploring the Pan-Relationship Between Disease and Symptom R...
收藏 引用
15th International Conference on intelligent Computing, ICIC 2019
作者: Yang, Ronggen Wang, Yichen Wang, Bo Gong, Lejun Faculty of Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210046 China School of Geography and Bioinformatics Nanjing University of Posts and Telecommunication Nanjing China
Electronic Medical Records (EMRs) arises from the clinical treatment process, which reflects a patient’s physical condition, the disease, the treatment process, etc. It has an important significance for the recovery ... 详细信息
来源: 评论
An Interpretability Method of Workflow Power Consumption Based on Feature Contribution
An Interpretability Method of Workflow Power Consumption Bas...
收藏 引用
IEEE International Conference on big data Analysis (ICBDA)
作者: Wanpeng Ji Xusheng Zhang Ziyu Shen Bin Xia Binghui Liu Huizhong Shan Shajia Shan Zheng Liu Jiangsu Key Laboratory of Big Data Securit & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Securit & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
The scheduling of workflows is one of the important tasks in cloud data centers. The power consumption of workflows is a vital factor of workflow scheduling. Workflow scheduling strategies are usually designed based o... 详细信息
来源: 评论