咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 68 篇 期刊文献

馆藏范围

  • 187 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 114 篇 工学
    • 87 篇 计算机科学与技术...
    • 80 篇 软件工程
    • 31 篇 信息与通信工程
    • 16 篇 生物工程
    • 14 篇 控制科学与工程
    • 12 篇 电气工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 2 篇 建筑学
  • 56 篇 理学
    • 34 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 11 篇 物理学
    • 7 篇 系统科学
    • 3 篇 化学
    • 3 篇 地球物理学
    • 2 篇 天文学
  • 35 篇 管理学
    • 20 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 12 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 6 篇 conferences
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 privacy
  • 6 篇 training
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 machine learning
  • 5 篇 forecasting
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 schedules
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 sensors
  • 3 篇 aggregates
  • 3 篇 reliability

机构

  • 54 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...
  • 5 篇 university of ch...
  • 5 篇 nanjing universi...
  • 4 篇 key laboratory o...
  • 4 篇 college of compu...
  • 3 篇 college of compu...
  • 3 篇 institute of big...
  • 3 篇 school of comput...

作者

  • 37 篇 xu xiaolong
  • 25 篇 xiaolong xu
  • 8 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 5 篇 xu lijie
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng
  • 5 篇 zhang wei
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin

语言

  • 183 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Dig Data Security and Intelligent Processing"
187 条 记 录,以下是1-10 订阅
Wireless Charging Scheduling for Long-term Utility Optimization
收藏 引用
ACM Transactions on Sensor Networks 2025年 第1期21卷 1-31页
作者: Xu, Jia Chen, Wenbin Dai, Haipeng Xu, Lijie Xiao, Fu Liu, Linfeng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China The State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have inve... 详细信息
来源: 评论
A label-guided contrastive capsule network for few-shot text classification
收藏 引用
Neural Computing and Applications 2025年 1-26页
作者: Xu, Yang Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Few-shot text classification involves transferring knowledge from a limited dataset to perform classification tasks in unseen domains. Existing metric-based meta-learning models, such as prototypical networks, have sh... 详细信息
来源: 评论
An Adaptive DoH Encrypted Tunnel Detection Method Based on Contrastive Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Tong, Jiacheng Zhao, Yilin Jin, Chongju Chen, Wei Zhang, Yiting Wu, Lifa Nanjing University of Posts and Telecommunications School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi... 详细信息
来源: 评论
Task Offloading Scheduling and Privacy Protection Optimization in Vehicular Edge Computing Based on Double Deep Q-Network  18th
Task Offloading Scheduling and Privacy Protection Optimizat...
收藏 引用
18th China Conference on Wireless Sensor Networks, CWSN 2024
作者: Weifeng, Lu Saijun, Yang Jia, Xu Lijie, Xu Lingyun, Jiang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Xianlin Street Jiangsu Nanjing210023 China
As the applications and services within vehicular networking systems become increasingly diverse, vehicles with limited computing resources face challenges in handling these computationally intensive and latency-sensi... 详细信息
来源: 评论
Exploring the Robustness: Hierarchical Federated Learning Framework for Object Detection of UAV Cluster
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Xingyu Zhang, Wenzhe Liu, Linfeng Xu, Jia Nanjing University of Posts and Telecommunications School of Computer Science and Technology Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The deployment of Unmanned Aerial Vehicle (UAV) cluster is an available solution for object detection missions. In the harsh environment, UAV cluster could suffer from some significant threats (e.g., forest fire hazar... 详细信息
来源: 评论
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Huang, Yuxian Yang, Geng Yuan, Dong Yu, Shui Nanjing University of Posts and Telecommunication College of Computer Science and Software China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China University of Sydney School of Electrical and Information Engineering Australia University of Technology Sydney School of Computer Science Australia
Recently, self-supervised learning has garnered significant attention for its ability to extract high-quality features from unlabeled data. However, existing research indicates that backdoor attacks can pose significa... 详细信息
来源: 评论
SAug: Structural Imbalance Aware Augmentation for Graph Neural Networks
收藏 引用
ACM Transactions on intelligent Systems and Technology 2025年 第2期16卷
作者: Chen, Ke-Jia Mu, Wenhui Liu, Zulong Liu, Zheng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
Graph machine learning (GML) has made great progress in node classification, link prediction, graph classification, and so on. However, graphs in reality are often structurally imbalanced, that is, only a few hub node... 详细信息
来源: 评论
Acoustic backdoor attacks on speech recognition via frequency offset perturbation
收藏 引用
Applied Soft Computing 2025年 177卷
作者: Tang, Yu Xu, Xiaolong Sun, Lijuan Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Jiangsu Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Jiangsu Nanjing210023 China School of computer Science and Technology Huaiyin Normal University Jiangsu Huai'an223300 China
With the increasing deployment of deep learning-based speech recognition systems, backdoor attacks have become a serious security threat, enabling adversaries to implant hidden triggers that activate malicious behavio... 详细信息
来源: 评论
Personalized Privacy-Preserving Routing Mechanism Design in Payment Channel Network
收藏 引用
Journal of Computer Science & Technology 2024年 第6期39卷 1380-1400页
作者: Peng-Cheng Zhao Li-Jie Xu Jia Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China
Payment Channel Network(PCN)provides the off-chain settlement of *** is one of the most promising solutions to solve the scalability issue of the *** routing techniques in PCN have been ***,both incentive attack and p... 详细信息
来源: 评论
Identifying eclipsing binary stars with TESS data based on a new hybrid deep learning model
arXiv
收藏 引用
arXiv 2025年
作者: Shan, Ying Chen, Jing Zhang, Zichong Wang, Liang Zou, Zhiqiang Li, Min College of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China Nanjing Institute of Astronomical and Optics & Technology Chinese Academy of Sciences Nanjing210042 China CAS Key Laboratory of Astronomical Optics & Technology Nanjing Institute of Astronomical Optics & Technology Nanjing210042 China University of Chinese Academy of Sciences Beijing100049 China University of Chinese Academy of Sciences Jiangsu Nanjing211135 China
Eclipsing binary systems (EBs), as foundational objects in stellar astrophysics, have garnered significant attention in recent years. These systems exhibit periodic decreases in light intensity when one star obscures ... 详细信息
来源: 评论