咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 185 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 112 篇 工学
    • 86 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 30 篇 信息与通信工程
    • 16 篇 生物工程
    • 13 篇 控制科学与工程
    • 11 篇 电气工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 2 篇 建筑学
  • 55 篇 理学
    • 33 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 7 篇 系统科学
    • 3 篇 化学
    • 3 篇 地球物理学
    • 2 篇 天文学
  • 35 篇 管理学
    • 20 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 7 篇 training
  • 6 篇 conferences
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 machine learning
  • 5 篇 forecasting
  • 4 篇 schedules
  • 4 篇 computational mo...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy
  • 4 篇 sensors
  • 3 篇 power demand

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...
  • 4 篇 university of ch...
  • 4 篇 key laboratory o...
  • 4 篇 college of compu...
  • 3 篇 college of compu...
  • 3 篇 institute of big...
  • 3 篇 school of comput...

作者

  • 36 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 5 篇 xu lijie
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng
  • 5 篇 zhang wei
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin

语言

  • 183 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Dig Data Security and Intelligent Processing"
185 条 记 录,以下是101-110 订阅
排序:
Evaluating Consideration Level of Responses For Mental Health Chatbots
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Bei Zhuang, Ziyuan Wang, Yue Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China
Mental health chatbots are widely used and proven useful in the conversation of psychological treatments. The users of mental health chatbots require "considerate" responses because they are relatively sensi... 详细信息
来源: 评论
Hyperspectral Image Destriping and Denoising with Spectral Low Rank and Tensor Nuclear Norm
Hyperspectral Image Destriping and Denoising with Spectral L...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Pengfei Liu Lanlan Liu School of Computer Science Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing China
In this paper, we propose a new method for simultaneous hyperspectral image (HSI) destriping and denoising with spectral low-rank and tensor nuclear norm under the tensor framework. Specifically, the tensor nuclear no...
来源: 评论
Privacy Protection for Image Sharing Using Reversible Adversarial Examples
Privacy Protection for Image Sharing Using Reversible Advers...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ping Yin Wei Chen Jiaxi Zheng Yiting Zhang Lifa Wu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Online image sharing on social media platforms faces information leakage due to deep learning-aided privacy attacks. To avoid these attacks, this paper proposes a privacy protection mechanism for image sharing without... 详细信息
来源: 评论
Application of C4.5 decision tree for scholarship evaluations
收藏 引用
Procedia Computer Science 2019年 151卷 179-184页
作者: X. Wang C. Zhou X. Xu College of Overseas Education Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China
Under the global trend of modern quality education, the set of higher educational scholarship is aimed to reward the students who work hard both inside and outside class activities and achieve great success in kinds o... 详细信息
来源: 评论
Maximum Likelihood Estimation based on Random Subspace EDA: Application to extrasolar planet detection
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Bin Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu210023 China
This paper addresses maximum likelihood (ML) estimation based model fitting in the context of extrasolar planet detection. This problem is featured by the following properties: 1) the candidate models under considerat... 详细信息
来源: 评论
Implementation and performance op timization of dynamic random forest
Implementation and performance op timization of dynamic rand...
收藏 引用
第九届网络分布式计算与知识发现国际会议( 2017 International Conference on Cyber-enabled distributed computing and knowledge discovery)
作者: Xiaolong Xu Wen Chen School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and
Bernard combines the weight updating of the boosting algorithm with the Random Forest(RF),and proposes a new RF induction algorithm called Dynamic Random Forest(DRF).The idea with DRF is to grow only trees that would ... 详细信息
来源: 评论
SCALABLE ATTRIBUTION OF ADVERSARIAL ATTACKS VIA MULTI-TASK LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Zhongyi Han, Keji Ge, Yao Ji, Wei Li, Yun Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Deep neural networks (DNNs) can be easily fooled by adversarial attacks during inference phase when attackers add imperceptible perturbations to original examples, i.e., adversarial examples. Many works focus on adver... 详细信息
来源: 评论
On Link Formation in Heterogeneous Information Networks: A View Based on Multi-Label Learning
On Link Formation in Heterogeneous Information Networks: A V...
收藏 引用
International Conference on Advances in Social Network Analysis and Mining, ASONAM
作者: Ke-Jia Chen Shijun Xue Yun Li Bin Liu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu China
This paper studies the problem of relationship prediction in heterogeneous information networks. Our goal is not only to predict links/relationships more accurately but also to provide more viable paths to facilitate ... 详细信息
来源: 评论
SLBERT: An Improved FLAT-BERT for Named Entity Recognition
SSRN
收藏 引用
SSRN 2022年
作者: Fei, Yuefan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China
Named Entity Recognition (NER) aims to identify named entities mentioned in unstructured text and classify them into predefined named entity classes. Although models using word fusion have achieved relatively high per... 详细信息
来源: 评论
LogPal: A Generic Anomaly Detection Scheme of Heterogeneous Logs for Network Systems
收藏 引用
security and Communication Networks 2023年 第1期2023卷
作者: Sun, Lei Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
As a key resource for diagnosing and identifying problems, network syslog contains vast quantities of information. And it is the main source of data for anomaly detection of systems. Syslog presents the characteristic... 详细信息
来源: 评论