咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 89 篇 期刊文献

馆藏范围

  • 230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 141 篇 工学
    • 106 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 44 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 19 篇 生物工程
    • 14 篇 电气工程
    • 9 篇 机械工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 交通运输工程
    • 8 篇 网络空间安全
    • 6 篇 安全科学与工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 79 篇 理学
    • 55 篇 数学
    • 30 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 物理学
    • 10 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 45 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 conferences
  • 7 篇 data mining
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 machine learning
  • 5 篇 heuristic algori...
  • 4 篇 power demand
  • 4 篇 big data
  • 4 篇 schedules
  • 4 篇 costs
  • 4 篇 security

机构

  • 58 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 11 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 5 篇 nanjing universi...
  • 4 篇 jiangsu key lab ...
  • 4 篇 wireless communi...
  • 4 篇 university of ch...
  • 4 篇 faculty intellig...
  • 4 篇 key laboratory o...

作者

  • 37 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 lejun gong
  • 5 篇 xu lijie
  • 5 篇 wang lei
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng

语言

  • 228 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing"
230 条 记 录,以下是51-60 订阅
排序:
Classifying Galaxy Morphologies with Few-shot Learning
收藏 引用
Research in Astronomy and Astrophysics 2022年 第5期22卷 9-20页
作者: Zhirui Zhang Zhiqiang Zou Nan Li Yanli Chen College of Computer Nanjing University of Posts and Telecommunications Nanjing 210023.China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Key Laboratory of Optical Astronomy National Astronomical ObservatoriesChinese Academy of SciencesBeijing 100101China University of Chinese Academy of Sciences Beijing 100049China
The taxonomy of galaxy morphology is critical in astrophysics as the morphological properties are powerful tracers of galaxy *** the upcoming Large-scale Imaging Surveys,billions of galaxy images challenge astronomers... 详细信息
来源: 评论
Personalized Review Recommendation based on Implicit dimension mining
Personalized Review Recommendation based on Implicit dimensi...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Xu, Bei Xu, Yifan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Users usually browse product reviews before buying products from e-commerce websites. Lots of e-commerce websites can recommend reviews. However, existing research on review recommendation mainly focuses on the genera... 详细信息
来源: 评论
Multi-source Infection Pattern Mining Algorithms over Moving Objects  25
Multi-source Infection Pattern Mining Algorithms over Moving...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Chen, Yu Dai, Hua Yang, Geng Chen, Yanli Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210003 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
Using the trajectory data of moving objects to analyze and study the infection mode of viruses or germs has practical application value. The definition of infection pattern in existing works only considers one-to-one ... 详细信息
来源: 评论
Recognition of Disaster Images Based on Self-Supervised Learning  7
Recognition of Disaster Images Based on Self-Supervised Lear...
收藏 引用
7th International Conference on Cloud Computing and big data Analytics, ICCCBDA 2022
作者: Wang, Linyong Wu, Ruiqi Li, Cen Zou, Zhiqiang Nanjing University of Posts and Telecommunications NanJing China College of Computer Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanJing China
Existing supervised deep learning model requires large amounts of labeled training data to learn new tasks. This is a limitation for many practical applications in disaster areas as well as in many other fields such a... 详细信息
来源: 评论
BDLR:lncRNA identification using ensemble learning
收藏 引用
BIOCELL 2022年 第4期46卷 951-960页
作者: LEJUN GONG SHEHAI ZHOU JINGMEI CHEN YONGMIN LI LI ZHANG ZHIHONG GAO Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with ... 详细信息
来源: 评论
Minimum Time Extrema Estimation for Large-Scale Radio-Frequency Identification Systems
收藏 引用
Journal of Computer Science & Technology 2020年 第5期35卷 1099-1114页
作者: Xiao-Jun Zhu Li-Jie Xu Xiao-Bing Wu Bing Chen College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China Jiangsu Key Laboratory of Dig Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210049China Wireless Research Centre University of CanterburyChristchurch 8041New Zealand
We consider the extrema estimation problem in large-scale radio-frequency identification(RFID)systems,where there are thousands of tags and each tag contains a finite *** objective is to design an extrema estimation p... 详细信息
来源: 评论
Learning Disentangled Latent Factors for Individual Treatment Effect Estimation Using Variational Generative Adversarial Nets  25
Learning Disentangled Latent Factors for Individual Treatmen...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Bao, Qingsen Mao, Zeyong Chen, Lei Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Estimating individual treatment effect (ITE) is a challenging task due to the need for individual potential outcomes to be learned from biased data and counterfactuals are inherently unobservable. Some researchers pro... 详细信息
来源: 评论
An adaptive flow table adjustment algorithm for SDN  21
An adaptive flow table adjustment algorithm for SDN
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Xu, Xiaolong Hu, Liuyun Lin, Haowei Fan, Zexuan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
SDN (Software-defined networking) are important for current network systems, such as cloud systems. The characteristics of flow in SDN and the impact of flow table entries and controllers on data packet transmission a... 详细信息
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud  27
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
27th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2021
作者: Jiang, Yu Xu, Xiaolong Lin, Kunda Duan, Weihua Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
APDPk-means: A new differential privacy clustering algorithm based on arithmetic progression privacy budget allocation  21
APDPk-means: A new differential privacy clustering algorithm...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Fan, Zexuan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
How to protect users' private data during network data mining has become a hot issue in the fields of big data and network information security. Most current researches on differential privacy k-means clustering a... 详细信息
来源: 评论