咨询与建议

限定检索结果

文献类型

  • 152 篇 期刊文献
  • 128 篇 会议

馆藏范围

  • 280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 129 篇 计算机科学与技术...
    • 104 篇 软件工程
    • 50 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 23 篇 电子科学与技术(可...
    • 19 篇 电气工程
    • 19 篇 生物工程
    • 18 篇 光学工程
    • 15 篇 机械工程
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 11 篇 生物医学工程(可授...
    • 8 篇 化学工程与技术
    • 7 篇 动力工程及工程热...
    • 6 篇 建筑学
    • 5 篇 网络空间安全
  • 96 篇 理学
    • 48 篇 数学
    • 26 篇 物理学
    • 23 篇 生物学
    • 12 篇 化学
    • 10 篇 统计学(可授理学、...
    • 6 篇 系统科学
  • 56 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 17 篇 医学
    • 13 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 7 篇 药学(可授医学、理...
  • 9 篇 农学
  • 8 篇 法学
    • 7 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 教育学
  • 2 篇 军事学

主题

  • 9 篇 deep learning
  • 6 篇 computational mo...
  • 6 篇 feature extracti...
  • 6 篇 security
  • 5 篇 computer science
  • 5 篇 educational inst...
  • 5 篇 quality of servi...
  • 5 篇 internet
  • 4 篇 conferences
  • 4 篇 wireless communi...
  • 4 篇 neural networks
  • 4 篇 laboratories
  • 4 篇 authentication
  • 4 篇 wireless sensor ...
  • 4 篇 costs
  • 4 篇 machine learning
  • 4 篇 protocols
  • 4 篇 routing protocol...
  • 4 篇 industries
  • 4 篇 forecasting

机构

  • 35 篇 college of compu...
  • 26 篇 jiangsu high tec...
  • 14 篇 state key labora...
  • 13 篇 jiangsu high tec...
  • 10 篇 key lab of broad...
  • 8 篇 school of comput...
  • 8 篇 key lab. of broa...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 purple mountain ...
  • 6 篇 state key labora...
  • 6 篇 college of infor...
  • 6 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 key laboratory o...
  • 5 篇 artificial intel...
  • 5 篇 school of comput...
  • 5 篇 information secu...
  • 5 篇 provincial key l...

作者

  • 15 篇 wang ruchuan
  • 8 篇 gong jian
  • 7 篇 li peng
  • 6 篇 xiao fu
  • 5 篇 zhongyuan qin
  • 5 篇 yang xibei
  • 5 篇 yu fei
  • 5 篇 sun lijuan
  • 5 篇 qin zhongyuan
  • 5 篇 peng li
  • 5 篇 yang geng
  • 5 篇 chen liquan
  • 5 篇 liquan chen
  • 5 篇 jian gong
  • 5 篇 chao zuo
  • 4 篇 duan xuting
  • 4 篇 fei yu
  • 4 篇 qian chen
  • 4 篇 guo peng
  • 4 篇 ye xiaoguo

语言

  • 255 篇 英文
  • 20 篇 中文
  • 7 篇 其他
检索条件"机构=Key Laboratory of Computer Networking Technology of Jiangsu Province"
280 条 记 录,以下是51-60 订阅
排序:
Adversarial Samples Generation Based on RMSProp
Adversarial Samples Generation Based on RMSProp
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Yacong Yu Lei Zhang Liquan Chen Zhongyuan Qin Key Laboratory of Computer Networking Technology of Jiangsu Province School of Cyber Science and Engineering Southeast University Nanjing China
Adversarial sample attacks seriously threaten the security and robustness of deep learning models. There are three problems in state-of-the-art adversarial sample generation schemes: the gradient update step size need... 详细信息
来源: 评论
COUNTING RANDOM k-SAT NEAR THE SATISFIABILITY THRESHOLD
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zongchen Lonkar, Aditya Wang, Chunyang Yang, Kuan Yin, Yitong School of Computer Science Georgia Institute of Technology AtlantaGA United States State Key Laboratory for Novel Software Technology New Cornerstone Science Laboratory Nanjing University 163 Xianlin Avenue Jiangsu Province Nanjing210023 China John Hopcroft Center for Computer Science Shanghai Jiao Tong University Shanghai China
We present efficient counting and sampling algorithms for random k-SAT when the clause density satisfies α ≤ 2k poly(k) . In particular, the exponential term 2k matches the satisfiability threshold Θ(2k) for the ex... 详细信息
来源: 评论
Towards Optimal Customized Architecture for Heterogeneous Federated Learning with Contrastive Cloud-Edge Model Decoupling
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xingyan Du, Tian Wang, Mu Gu, Tiancheng Zhao, Yu Kou, Gang Xu, Changqiao Wu, Dapeng Oliver Financial Intelligence and Financial Engineering Key Laboratory of Sichuan Province Institute of Digital Economy and Interdisciplinary Science Innovation School of Computer and Artificial Intelligence Southwestern University of Finance and Economics Chengdu611130 China The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China The Data Engineering at the Department of Computer Science City University of Hong Kong Hong Kong
Federated learning, as a promising distributed learning paradigm, enables collaborative training of a global model across multiple network edge clients without the need for central data collecting. However, the hetero... 详细信息
来源: 评论
Adaptive optical quantitative phase imaging based on annular illumination Fourier ptychographic microscopy
收藏 引用
PhotoniX 2022年 第1期3卷 101-115页
作者: Yefeng Shu Jiasong Sun Jiaming Lyu Yao Fan Ning Zhou Ran Ye Guoan Zheng Qian Chen Chao Zuo Smart Computational Imaging Laboratory(SCILab) School of Electronic and Optical EngineeringNanjing University of Science and Technolog210094 NanjingJiangsu ProvincePeople’s Republic of China Smart Computational Imaging Research Institute(SCIRI)of Nanjing University of Science and Technology 210019 NanjingJiangsu ProvincePeople’s Republic of China Jiangsu Key Laboratory of Spectral Imaging Intelligent Sense 210094 NanjingJiangsu ProvincePeople’s Republic of China Terahertz Technology Innovation Research Institute University of Shanghai for Science and Technology200093 ShanghaiPeople’s Republic of China School of Computer and Electronic Information Nanjing Normal University210023 NanjingJiangsu ProvincePeople’s Republic of China Department of Biomedical Engineering University of Connecticut06269 StorrsConnecticutUSA
Quantitative phase imaging(QPI)has emerged as a valuable tool for biomedical research thanks to its unique capabilities for quantifying optical thickness variation of living cells and *** many QPI methods,Fourier ptyc... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
CADEC: A Combinatorial Auction for Dynamic Distributed DNN Inference Scheduling in Edge-Cloud Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Xu, Xiaolong Hu, Yuhao Cui, Guangming Qi, Lianyong Dou, Wanchun Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software China Nanjing University State Key Laboratory for Novel Software Technology China College of Computer science and technology Qingdao China Georgia State University Department of Computer Science United States
Deep Neural Network (DNN) Inference, as a key enabler of intelligent applications, is often computation-intensive and latency-sensitive. Combining the advantages of cloud computing (abundant computing resources) and e... 详细信息
来源: 评论
NLGT: Neighborhood-based and Label-enhanced Graph Transformer Framework for Node Classification  39
NLGT: Neighborhood-based and Label-enhanced Graph Transforme...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Xiaolong Zhou, Yibo Xiang, Haolong Li, Xiaoyong Zhang, Xuyun Qi, Lianyong Dou, Wanchun School of Software Nanjing University of Information Science and Technology China Yunnan Key Laboratory of Service Computing Yunan University of Finance and Economics China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology China College of Meteorology and Oceanography National University of Defense Technology China School of Computing Macquarie University Australia College of Computer Science and Technology China University of Petroleum (East China) China State Key Laboratory for Novel Software Technology Nanjing University China
Graph Neural Networks (GNNs) are widely applied on graph-level tasks, such as node classification, link prediction and graph generation. Existing GNNs mostly adopt a message-passing mechanism to aggregate node informa... 详细信息
来源: 评论
Clustering Interval and Triangular Granular Data: Modeling, Execution, and Assessment
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2024年 第6期36卷 10000-10014页
作者: Yiming Tang Wenbin Wu Witold Pedrycz Jianwei Gao Xianghui Hu Zhaohong Deng Rui Chen Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer and Information Hefei University of Technology Hefei China Department of Electrical and Computer Engineering University of Alberta Edmonton AB Canada School of Computer and Information Hefei University of Technology Hefei China Faculty of Automatic Control Electronics and Computer Science Silesian University of Tecghnology Gliwice Poland Research Center of Performance and Productivity Analysis Istinye University Istanbul TÃrkiye School of Computer Science and Engineering Southeast University Nanjing China School of Artificial Intelligence and Computer Jiangnan University Wuxi Jiangsu China
In current granular clustering algorithms, numeric representatives were selected by users or an ordinary strategy, which seemed simple; meanwhile, weight settings for granular data could not adequately express their s... 详细信息
来源: 评论
Background-Driven and Foreground-Refined Network for Weakly Supervised Change Detection
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Liu, Fang Zhang, Peng Liu, Jia Yang, Jingxiang Tang, Xu Xiao, Liang Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Jiangsu Province Engineering Research Center of Airborne Detecting and Intelligent Perceptive Technology Nanjing210049 China Nanjing University of Science and Technology School of Computer Science and Engineering Key Laboratory of Analysis of Mathematical Theory and Modeling of Complex Systems Ministry of Industry and Information Technology Nanjing210094 China Xidian University School of Artificial Intelligence Xi'an710071 China
Change detection (CD) in remote sensing aims to reveal meaningful surface changes and has been flourishing in recent years. Compared with fully supervised methods based on pixel-level labels, image-level labels are ea... 详细信息
来源: 评论
Enhancing Wi-Fi Device Authentication Protocol Leveraging Channel State Information  14th
Enhancing Wi-Fi Device Authentication Protocol Leveraging Ch...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Chen, Bing Song, Yubo Wu, Tianqi Zheng, Tianyu Chen, Hongyuan Wang, Junbo Li, Tao School of Cyber Science and Engineering Key Laboratory of Computer Network Technology of Jiangsu Province Southeast University Nanjing China School of Information Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories Nanjing China
Wi-Fi device authentication is crucial for defending against impersonation attacks and information forgery attacks. Most of the existing authentication technologies rely on complex cryptographic algorithms. However, t... 详细信息
来源: 评论