咨询与建议

限定检索结果

文献类型

  • 158 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 172 篇 工学
    • 126 篇 计算机科学与技术...
    • 112 篇 软件工程
    • 50 篇 信息与通信工程
    • 27 篇 生物工程
    • 20 篇 控制科学与工程
    • 18 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 97 篇 理学
    • 60 篇 数学
    • 30 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 57 篇 管理学
    • 31 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 16 篇 feature extracti...
  • 11 篇 semantics
  • 10 篇 training
  • 9 篇 machine learning
  • 8 篇 conferences
  • 8 篇 task analysis
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 computational mo...
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 anomaly detectio...
  • 5 篇 heuristic algori...
  • 4 篇 power demand
  • 4 篇 schedules
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 58 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 nanjing universi...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...

作者

  • 36 篇 xu xiaolong
  • 28 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 6 篇 lejun gong
  • 5 篇 xu lijie

语言

  • 273 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security and Intelligent Processing"
280 条 记 录,以下是61-70 订阅
排序:
BDLR:lncRNA identification using ensemble learning
收藏 引用
BIOCELL 2022年 第4期46卷 951-960页
作者: LEJUN GONG SHEHAI ZHOU JINGMEI CHEN YONGMIN LI LI ZHANG ZHIHONG GAO Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with ... 详细信息
来源: 评论
Learning Disentangled Latent Factors for Individual Treatment Effect Estimation Using Variational Generative Adversarial Nets  25
Learning Disentangled Latent Factors for Individual Treatmen...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Bao, Qingsen Mao, Zeyong Chen, Lei Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Estimating individual treatment effect (ITE) is a challenging task due to the need for individual potential outcomes to be learned from biased data and counterfactuals are inherently unobservable. Some researchers pro... 详细信息
来源: 评论
Community Detection Based on Deep Network Embedding with Dual Self-supervised Training  3rd
Community Detection Based on Deep Network Embedding with Dua...
收藏 引用
3rd International Conference on big data and security, ICBDS 2021
作者: Chen, Yunfang Mao, Haotian Wang, Li Zhang, Wei School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
We propose a community discovery method based on deep auto-encoding (DGAE_DST). Firstly, we use the pre-trained two-layer neural network and k-means algorithm to initialize the centroid vector, and then use the DNN mo... 详细信息
来源: 评论
An adaptive flow table adjustment algorithm for SDN  21
An adaptive flow table adjustment algorithm for SDN
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Xu, Xiaolong Hu, Liuyun Lin, Haowei Fan, Zexuan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
SDN (Software-defined networking) are important for current network systems, such as cloud systems. The characteristics of flow in SDN and the impact of flow table entries and controllers on data packet transmission a... 详细信息
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud  27
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
27th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2021
作者: Jiang, Yu Xu, Xiaolong Lin, Kunda Duan, Weihua Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
APDPk-means: A new differential privacy clustering algorithm based on arithmetic progression privacy budget allocation  21
APDPk-means: A new differential privacy clustering algorithm...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Fan, Zexuan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
How to protect users' private data during network data mining has become a hot issue in the fields of big data and network information security. Most current researches on differential privacy k-means clustering a... 详细信息
来源: 评论
Design Guidance for Lightweight Object Detection Models  3rd
Design Guidance for Lightweight Object Detection Models
收藏 引用
3rd International Conference on big data and security, ICBDS 2021
作者: Wang, Rui Wang, Xueli Chen, Yunfang Zhang, Wei School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
The lightweight target detection model is deployed in an environment with limited computing power and power consumption, which is widely used in many fields. Most of the current lightweight technologies only focus on ... 详细信息
来源: 评论
Identifying Outliers in Astronomical Images with Unsupervised Machine Learning
收藏 引用
Research in Astronomy and Astrophysics 2022年 第8期22卷 74-84页
作者: Yang Han Zhiqiang Zou Nan Li Yanli Chen School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Key Laboratory of Optical Astronomy National Astronomical ObservatoriesChinese Academy of SciencesBeijing 100101China University of Chinese Academy of Sciences Beijing 100049China
Astronomical outliers,such as unusual,rare or unknown types of astronomical objects or phenomena,constantly lead to the discovery of genuinely unforeseen knowledge in *** unpredictable outliers will be uncovered in pr... 详细信息
来源: 评论
A Fraud Detection Approach Based on Combined Feature Weighting  10th
A Fraud Detection Approach Based on Combined Feature Weighti...
收藏 引用
10th EAI International Conference on Cloud Computing, CloudComp 2020
作者: Liu, Xiaoqian Yu, Chenfei Xia, Bin Gu, Haiyan Wang, Zhenli Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China
data mining technology has yielded fruitful results in the area of crime discovery and intelligent decision making. Credit card is one of the most popular payment methods, providing great convenience and efficiency. H... 详细信息
来源: 评论
Model-Based Offline Policy Optimization with Adversarial Network  26
Model-Based Offline Policy Optimization with Adversarial Net...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论