咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 185 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 112 篇 工学
    • 86 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 30 篇 信息与通信工程
    • 16 篇 生物工程
    • 13 篇 控制科学与工程
    • 11 篇 电气工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 2 篇 建筑学
  • 55 篇 理学
    • 33 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 7 篇 系统科学
    • 3 篇 化学
    • 3 篇 地球物理学
    • 2 篇 天文学
  • 35 篇 管理学
    • 20 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 7 篇 training
  • 6 篇 conferences
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 machine learning
  • 5 篇 forecasting
  • 4 篇 schedules
  • 4 篇 computational mo...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy
  • 4 篇 sensors
  • 3 篇 power demand

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...
  • 4 篇 university of ch...
  • 4 篇 key laboratory o...
  • 4 篇 college of compu...
  • 3 篇 college of compu...
  • 3 篇 institute of big...
  • 3 篇 school of comput...

作者

  • 36 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 5 篇 xu lijie
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng
  • 5 篇 zhang wei
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin

语言

  • 183 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Dig Data Security and Intelligent Processing"
185 条 记 录,以下是121-130 订阅
排序:
Network data Classification Mechanism for Intrusion Detection System
Network Data Classification Mechanism for Intrusion Detectio...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Intrusion detection system (IDS), as a network security device, monitors network data in real time and responds actively when it detects suspicious transmissions. However, suffered from the large amount of redundancy ... 详细信息
来源: 评论
Lightweight EEG Classification Model Based on EEG-sensor with Few Channels
Lightweight EEG Classification Model Based on EEG-sensor wit...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Haoyan Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In the traditional work, based on EEG Sensors monitoring the physiological and emotional state of humans, the time-frequency analysis method is usually used to extract the characteristics of the signal, and then analy... 详细信息
来源: 评论
Flight Path Optimization for UAVs to Provide Location Service to Ground Targets
Flight Path Optimization for UAVs to Provide Location Servic...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Youpeng Wang Xiaojun Zhu Lijie Xu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications China
We consider using UAVs to provide location service to ground targets. UAVs fly over the target area and broadcast their locations periodically via wireless signals. When a UAV flies along a straight line, a target wil...
来源: 评论
A Variance Minimization Approach to Temporal-Difference Learning
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xingguo Gong, Yu Yang, Shangdong Wang, Wenhao Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China College of Electronic Engineering National University of Defense Technology China
Fast-converging algorithms are a contemporary requirement in reinforcement learning. In the context of linear function approximation, the magnitude of the smallest eigenvalue of the key matrix is a major factor reflec... 详细信息
来源: 评论
FP-WDDQN: An improved deep reinforcement learning algorithm for adaptive traffic signal control
FP-WDDQN: An improved deep reinforcement learning algorithm ...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Xiao Zhang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Current adaptive traffic signal control methods based on centralized deep reinforcement learning are not applicable in large-scale adaptive traffic control environment. The scalability problem is overcome by assigning...
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yu Jiang Xiaolong Xu Kunda Lin Weihua Duan Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
Lgccn: A Label-Guided Contrastive Capsule Network for Few-Shot Text Classification
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Yang Xu, Xiaolong Xiao, Fu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Few-shot text classification aims to learn transferable knowledge from a limited dataset to perform classification tasks in unseen domains. Recently, metric-based meta-learning methods have demonstrated their advantag... 详细信息
来源: 评论
HERMES: Pedestrian Real-Time Offline Positioning and Moving Trajectory Tracking System Based on MEMS Sensors
HERMES: Pedestrian Real-Time Offline Positioning and Moving ...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Xinxin Liu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of positioning technology, sensor-based positioning has become the most commonly used positioning method because it is more low-cost and efficient with the popularity of smart phones. In this pape... 详细信息
来源: 评论
Impact of Feature Selection Methods on data Classification for IDS
Impact of Feature Selection Methods on Data Classification f...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The rapid increase of data has led to many security issues. Various new technologies and other sub-disciplines have been introduced into the research of intrusion detection system (IDS), which has become a hot topic i... 详细信息
来源: 评论
BLRGCN: A dynamic traffic flow prediction model based on spatiotemporal graph convolutional network
BLRGCN: A dynamic traffic flow prediction model based on spa...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Qiuhao Shi Xiaolong Xu Xuanyan Liu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Because of the complex topology of urban road and the dynamic changes of traffic information over time, how to accurately and efficiently predict traffic flow has become a difficult problem. In order to capture spatio...
来源: 评论