咨询与建议

限定检索结果

文献类型

  • 209 篇 期刊文献
  • 202 篇 会议

馆藏范围

  • 411 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 273 篇 工学
    • 217 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 66 篇 信息与通信工程
    • 45 篇 电气工程
    • 34 篇 生物工程
    • 32 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 11 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
  • 118 篇 理学
    • 61 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 73 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 12 篇 privacy
  • 11 篇 contrastive lear...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 graph neural net...
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 14 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 south china univ...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 nanjing universi...

作者

  • 36 篇 xu xiaolong
  • 25 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 cao xiaochun
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 378 篇 英文
  • 32 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
411 条 记 录,以下是81-90 订阅
排序:
Disentangling Heterogeneous Knowledge Concept Embedding for Cognitive Diagnosis on Untested Knowledge
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Miao Wang, Ziming Xing, Runtian Xiao, Kui Li, Zhifei Zhang, Yan Tang, Chang School of Computer Science and Information Engineering Hubei University China Key Laboratory of Intelligent Sensing System and Security China Hubei Key Laboratory of Big Data Intelligent Analysis and Application China
Cognitive diagnosis is a fundamental and critical task in learning assessment, which aims to infer students’ proficiency on knowledge concepts from their response logs. Current works assume each knowledge concept wil... 详细信息
来源: 评论
Exploring the Robustness: Hierarchical Federated Learning Framework for Object Detection of UAV Cluster
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Xingyu Zhang, Wenzhe Liu, Linfeng Xu, Jia Nanjing University of Posts and Telecommunications School of Computer Science and Technology Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The deployment of Unmanned Aerial Vehicle (UAV) cluster is an available solution for object detection missions. In the harsh environment, UAV cluster could suffer from some significant threats (e.g., forest fire hazar... 详细信息
来源: 评论
Task Offloading Scheduling and Privacy Protection Optimization in Vehicular Edge Computing Based on Double Deep Q-Network  18th
Task Offloading Scheduling and Privacy Protection Optimizat...
收藏 引用
18th China Conference on Wireless Sensor Networks, CWSN 2024
作者: Weifeng, Lu Saijun, Yang Jia, Xu Lijie, Xu Lingyun, Jiang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Xianlin Street Jiangsu Nanjing210023 China
As the applications and services within vehicular networking systems become increasingly diverse, vehicles with limited computing resources face challenges in handling these computationally intensive and latency-sensi... 详细信息
来源: 评论
Multi-source Infection Pattern Mining Algorithms over Moving Objects  25
Multi-source Infection Pattern Mining Algorithms over Moving...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Chen, Yu Dai, Hua Yang, Geng Chen, Yanli Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210003 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
Using the trajectory data of moving objects to analyze and study the infection mode of viruses or germs has practical application value. The definition of infection pattern in existing works only considers one-to-one ... 详细信息
来源: 评论
Research on the Parallel SM4-OFB Acceleration Based on Multiple Rounds of Iteration
Research on the Parallel SM4-OFB Acceleration Based on Multi...
收藏 引用
International Conference on Artificial Intelligence and Computer Information Technology (AICIT)
作者: Ya Han Mingsheng Wang Yongqiang Li Lifeng Ren Key Laboratory of Cyberspace Security Defense Institute of Information Engineering CAS Beijing China Chongqing Research Institute of Big Data Peking University Chongqing China
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte... 详细信息
来源: 评论
SRv6-INT Enabled Network Monitoring and Measurement: Toward High-Yield Network Observability for Digital Twin  3rd
SRv6-INT Enabled Network Monitoring and Measurement: Toward...
收藏 引用
3rd International Conference on Machine Learning, Cloud Computing and intelligent Mining, MLCCIM 2024
作者: Zhang, Xu Feng, Chuan Han, Pengchao Liu, Wei Gong, Xiaoxue Zhang, Qiupei Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China School of Information Engineering Guangdong University of Technology Guangzhou510006 China
Network monitoring and measurement is an important part of realizing the network digital twin. However, it introduces the problem of high cost when obtaining the status data of physical networks. Therefore, to efficie... 详细信息
来源: 评论
A Point Cloud Registration Method for Substations Based on an Improved SAC-IA Algorithm
A Point Cloud Registration Method for Substations Based on a...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Chen, Yiping Zong, Haonan Wang, Lulu Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs  26
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Ding, Qun Xu, Xiaolong Gui, Wenming Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Jinling Institute of Technology School of Computer Science Nanjing211169 China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis... 详细信息
来源: 评论
A Point Cloud Completion Method for Industrial Component Based on Multiple Encoders
A Point Cloud Completion Method for Industrial Component Bas...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Chen, Ran Huang, Wei Chen, Yiping Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
In real-world scenarios, laser-scanned point clouds often suffer from missing data points due to occlusion and other factors, significantly impacting subsequent tasks. We propose a novel point cloud completion method ... 详细信息
来源: 评论
Complex Substation Scene Segmentation Method Based on Optimized Straight Line Detection
Complex Substation Scene Segmentation Method Based on Optimi...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Hao Liu, Chuang Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a scene segmentation method based on optimized line detection to address the difficulty of segmenting spatially independent equipment in complex substation scenes. The method first employs the RANS... 详细信息
来源: 评论