咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 174 篇 工学
    • 128 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 50 篇 信息与通信工程
    • 27 篇 生物工程
    • 20 篇 控制科学与工程
    • 18 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 98 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 16 篇 feature extracti...
  • 11 篇 semantics
  • 10 篇 training
  • 9 篇 machine learning
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 deep learning
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 computational mo...
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 anomaly detectio...
  • 5 篇 heuristic algori...
  • 4 篇 power demand
  • 4 篇 contrastive lear...
  • 4 篇 schedules
  • 4 篇 clustering algor...

机构

  • 58 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...

作者

  • 36 篇 xu xiaolong
  • 28 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 6 篇 lejun gong
  • 5 篇 xu lijie

语言

  • 273 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security and Intelligent Processing"
280 条 记 录,以下是121-130 订阅
排序:
Itrace: An implicit trust inference method for trust-aware collaborative filtering
arXiv
收藏 引用
arXiv 2017年
作者: He, Xu Liu, Bin Chen, Ke-Jia School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China
The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A CF algorithmrecommends items of interest to the target user by leveraging the votes given by ... 详细信息
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization  7
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
7th International Conference on Cyber security and Information Engineering, ICCSIE 2022
作者: Huang, Jianhua Tang, Yunlong Wei, Yongjun Wang, Huan Zhang, Haifeng Zhang, Bing School of Computer Science and Technology School of Software Guangxi University of Science and Technology Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
A survey on trust modeling from a bayesian perspective
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Bin School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security & Intelligent Processing
In this paper, we are concerned with trust modeling for agents in networked computing systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many attempts have been made to model... 详细信息
来源: 评论
Visco-acoustic Wave-equation Traveltime Inversion with Correct and Incorrect Attenuation Profiles  87
Visco-acoustic Wave-equation Traveltime Inversion with Corre...
收藏 引用
Society of Exploration Geophysicists International Exposition and 87th Annual Meeting, SEG 2017
作者: Yu, Han Chen, Yuqing Guo, Bowen Schuster, Gerard T. Division of Physical Sciences and Engineering King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210003 China
A visco-acoustic wave-equation traveltime inversion method is presented that inverts for a shallow subsurface velocity distribution with correct and incorrect attenuation profiles. Similar to the classical wave equati... 详细信息
来源: 评论
Privacy Protection for Image Sharing Using Reversible Adversarial Examples
Privacy Protection for Image Sharing Using Reversible Advers...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ping Yin Wei Chen Jiaxi Zheng Yiting Zhang Lifa Wu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Online image sharing on social media platforms faces information leakage due to deep learning-aided privacy attacks. To avoid these attacks, this paper proposes a privacy protection mechanism for image sharing without... 详细信息
来源: 评论
Application of C4.5 decision tree for scholarship evaluations
收藏 引用
Procedia Computer Science 2019年 151卷 179-184页
作者: X. Wang C. Zhou X. Xu College of Overseas Education Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China
Under the global trend of modern quality education, the set of higher educational scholarship is aimed to reward the students who work hard both inside and outside class activities and achieve great success in kinds o... 详细信息
来源: 评论
Exploring the Pan-Relationship Between Disease and Symptom Related to Coronary Heart Disease from Chinese Electronic Medical Records  15th
Exploring the Pan-Relationship Between Disease and Symptom R...
收藏 引用
15th International Conference on intelligent Computing, ICIC 2019
作者: Yang, Ronggen Wang, Yichen Wang, Bo Gong, Lejun Faculty of Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210046 China School of Geography and Bioinformatics Nanjing University of Posts and Telecommunication Nanjing China
Electronic Medical Records (EMRs) arises from the clinical treatment process, which reflects a patient’s physical condition, the disease, the treatment process, etc. It has an important significance for the recovery ... 详细信息
来源: 评论
Research on SDN Multi Controller Deployment based on K-means++
Research on SDN Multi Controller Deployment based on K-means...
收藏 引用
2020 International Conference on 5G Mobile Communication and Information Science, MCIS-5G 2020
作者: Yue, Li Junyan, Chen Chuxin, Liang Xiaochun, Lei School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Cloud Computing and Big Data Collaborative Innovation Center Guilin541001 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
In large-scale SDN network, a single centralized controller can not meet the demand, and multiple controllers are needed to deal with the problem, which leads to the problem of multi control balanced deployment. In th... 详细信息
来源: 评论
Maximum Likelihood Estimation based on Random Subspace EDA: Application to extrasolar planet detection
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Bin Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu210023 China
This paper addresses maximum likelihood (ML) estimation based model fitting in the context of extrasolar planet detection. This problem is featured by the following properties: 1) the candidate models under considerat... 详细信息
来源: 评论
Implementation and performance op timization of dynamic random forest
Implementation and performance op timization of dynamic rand...
收藏 引用
第九届网络分布式计算与知识发现国际会议( 2017 International Conference on Cyber-enabled distributed computing and knowledge discovery)
作者: Xiaolong Xu Wen Chen School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and
Bernard combines the weight updating of the boosting algorithm with the Random Forest(RF),and proposes a new RF induction algorithm called Dynamic Random Forest(DRF).The idea with DRF is to grow only trees that would ... 详细信息
来源: 评论