咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 185 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 112 篇 工学
    • 86 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 30 篇 信息与通信工程
    • 16 篇 生物工程
    • 13 篇 控制科学与工程
    • 11 篇 电气工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 2 篇 建筑学
  • 55 篇 理学
    • 33 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 7 篇 系统科学
    • 3 篇 化学
    • 3 篇 地球物理学
    • 2 篇 天文学
  • 35 篇 管理学
    • 20 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 7 篇 training
  • 6 篇 conferences
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 machine learning
  • 5 篇 forecasting
  • 4 篇 schedules
  • 4 篇 computational mo...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy
  • 4 篇 sensors
  • 3 篇 power demand

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...
  • 4 篇 university of ch...
  • 4 篇 key laboratory o...
  • 4 篇 college of compu...
  • 3 篇 college of compu...
  • 3 篇 institute of big...
  • 3 篇 school of comput...

作者

  • 36 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 5 篇 xu lijie
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng
  • 5 篇 zhang wei
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin

语言

  • 183 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Dig Data Security and Intelligent Processing"
185 条 记 录,以下是141-150 订阅
排序:
Anomaly detection and traceback scheme for cloud-edge networks
Anomaly detection and traceback scheme for cloud-edge networ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xuanyan Liu Jinling He Hu Song Xinyun Cheng Luyun Hu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Cloud-edge networks (CEN) has revolutionized the traditional network architecture. However, there are many security issues in CEN needing to be solved. In this case, CEN administrator should be able to detect network ... 详细信息
来源: 评论
Model-based Offline Policy Optimization with Adversarial Network
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
Darkfight: A Detection Method of Violent Behavior in Dark Place for intelligent Monitoring System
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Jun Xu, Xiaolong Nanjing University of Posts & Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts & Telecommunications School of Computer Science Nanjing210023 China
With the continuous development of deep learning, the use of deep learning methods for intelligent violent behavior recognition has become an active research field in computer vision. However, there are relatively few... 详细信息
来源: 评论
Area Charging for Wireless Rechargeable Sensors
Area Charging for Wireless Rechargeable Sensors
收藏 引用
International Conference on Computer Communications and Networks (ICCCN)
作者: Haipeng Dai Xiaoyu Wang Lijie Xu Chao Dong Qian Liu Lei Meng Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing CHINA Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing CHINA Nanjing University of Aeronautics and Astronautics Nanjing CHINA
In this paper, we consider the problem of area charging, that is, assuming that there is a mobile charger (MC) equipped with a directional wireless charger whose charging area is in the shape of a sector, and the MC c... 详细信息
来源: 评论
Collaborative Bi-Aggregation for Directed Graph Embedding
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Linsong Chen, Ke-Jia Liu, Zheng Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China State Key Laboratory of Novel Software Technology Nanjing University Jiangsu Nanjing210093 China
Directed graph is able to model asymmetric relationships between nodes and research on directed graph embedding is of great significance in downstream graph analysis and inference. Learning source and target embedding... 详细信息
来源: 评论
Deep representation learning for road detection using siamese network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Huafeng Han, Xiaofeng Li, Xiangrui Yao, Yazhou Huang, Pu Tang, Zhenming School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Robust road detection is a key challenge in safe autonomous driving. Recently, with the rapid development of 3D sensors, more and more researchers are trying to fuse information across different sensors to improve the... 详细信息
来源: 评论
A Privacy-Preserving and Verifiable Federated Learning Scheme
A Privacy-Preserving and Verifiable Federated Learning Schem...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Xianglong Zhang Anmin Fu Huaqun Wang Chunyi Zhou Zhenzhu Chen School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Due to the complexity of the data environment, many organizations prefer to train deep learning models together by sharing training sets. However, this process is always accompanied by the restriction of distributed s... 详细信息
来源: 评论
Multi-agent game abstraction via graph attention neural network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Yong Wang, Weixun Hu, Yujing Hao, Jianye Chen, Xingguo Gao, Yang National Key Laboratory for Novel Software Technology Nanjing University Tianjin University NetEase Fuxi AI Lab Noah's Ark Lab Huawei Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
In large-scale multi-agent systems, the large number of agents and complex game relationship cause great difficulty for policy learning. Therefore, simplifying the learning process is an important research issue. In m... 详细信息
来源: 评论
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud
Proxy Re-Encryption Scheme For Complicated Access Control Fa...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zheng Lian Mang Su Anmin Fu Huaqun Wang Chunyi Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Hybrid cloud has both the strong computing power of public cloud and easy control of private cloud. It provides users with robust services and convenience, meanwhile faces numerous security challenges. How to implemen... 详细信息
来源: 评论
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products
Point Cloud Compression Method Based on Curvature Grading an...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Lei Wang Wei Huang Yiping Chen Ran Chen School of Computer Nanjing University of Posts and Telecommunications Nanjing P. R. China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P. R. China
The traditional point cloud compression methods fail to meet the compression requirements of complex surface point cloud files in the industrial field. This paper proposes a point cloud compression method suitable for...
来源: 评论