咨询与建议

限定检索结果

文献类型

  • 132 篇 会议
  • 99 篇 期刊文献

馆藏范围

  • 231 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 143 篇 工学
    • 110 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 37 篇 信息与通信工程
    • 23 篇 生物工程
    • 18 篇 控制科学与工程
    • 14 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 8 篇 机械工程
    • 8 篇 交通运输工程
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 仪器科学与技术
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 75 篇 理学
    • 41 篇 数学
    • 24 篇 生物学
    • 16 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 47 篇 管理学
    • 27 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 8 篇 machine learning
  • 8 篇 training
  • 7 篇 deep learning
  • 6 篇 conferences
  • 6 篇 neural networks
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 anomaly detectio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 computational mo...
  • 4 篇 contrastive lear...
  • 4 篇 schedules
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie
  • 5 篇 huang jiwu
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng

语言

  • 226 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Liuzhou Key Laboratory of Big Data Intelligent Processing and Security"
231 条 记 录,以下是101-110 订阅
排序:
Semi-supervised Deep Closest Point Method for Point Cloud Registration
Semi-supervised Deep Closest Point Method for Point Cloud Re...
收藏 引用
2021 International Conference on Robotics Automation and intelligent Control, ICRAIC 2021
作者: Wu, Yong Shen, Lingfeng Li, Ping Jiangsu Power Transmission and Transformation Co. Ltd. Nanjing211106 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
Point cloud registration is one of the key issues in fields that need 3D scenes with global vision, including 3D scene reconstruction in robot technology, high-accuracy 3D map reconstruction in automatic driving, 3D r... 详细信息
来源: 评论
Decomposing Source Codes by Program Slicing for Bug Localization
Decomposing Source Codes by Program Slicing for Bug Localiza...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jian Yong Ziye Zhu Yun Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications
Bug localization, which aims to automatically locate buggy source code files based on the given bug report, is a critical yet time-consuming task in the software engineering field. Existing advanced bug localization m...
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Han, Keji Ge, Yao Wang, Ruchuan Li, Yun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
CROA: A content-based recommendation optimization algorithm for personalized knowledge services  21
CROA: A content-based recommendation optimization algorithm ...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Sun, Xiao Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Information explosion is a typical feature of the big data. Learners can easily find a wide variety of knowledge information online. However, the expansion of information also makes it difficult for learners to retrie... 详细信息
来源: 评论
An optimal profit route planning scheme based on ACO-OPP  21
An optimal profit route planning scheme based on ACO-OPP
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Qiu, Yuhua Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Taxi plays an important role of urban public transportation system. However, without appropriate route planning scheme, taxi drivers can only choose to wait or seek passengers in the absence of orders, leading to wast... 详细信息
来源: 评论
Non-structured Pruning for Deep-learning based Steganalytic Frameworks
Non-structured Pruning for Deep-learning based Steganalytic ...
收藏 引用
Asia-Pacific Signal and Information processing Association Annual Summit and Conference (APSIPA)
作者: Qiushi Li Zilong Shao Shunquan Tan Jishen Zeng Bin Li Shenzhen Key Laboratory of Media Security Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Image steganalysis aims to discriminate innocent cover images and those suspected stego images embedded with secret message. Recently, increasing advanced deep neural networks have been proposed and used in image steg... 详细信息
来源: 评论
Evaluating Consideration Level of Responses For Mental Health Chatbots
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Bei Zhuang, Ziyuan Wang, Yue Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China
Mental health chatbots are widely used and proven useful in the conversation of psychological treatments. The users of mental health chatbots require "considerate" responses because they are relatively sensi... 详细信息
来源: 评论
Hyperspectral Image Destriping and Denoising with Spectral Low Rank and Tensor Nuclear Norm
Hyperspectral Image Destriping and Denoising with Spectral L...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Pengfei Liu Lanlan Liu School of Computer Science Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing China
In this paper, we propose a new method for simultaneous hyperspectral image (HSI) destriping and denoising with spectral low-rank and tensor nuclear norm under the tensor framework. Specifically, the tensor nuclear no...
来源: 评论
Privacy Protection for Image Sharing Using Reversible Adversarial Examples
Privacy Protection for Image Sharing Using Reversible Advers...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ping Yin Wei Chen Jiaxi Zheng Yiting Zhang Lifa Wu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Online image sharing on social media platforms faces information leakage due to deep learning-aided privacy attacks. To avoid these attacks, this paper proposes a privacy protection mechanism for image sharing without... 详细信息
来源: 评论
Application of C4.5 decision tree for scholarship evaluations
收藏 引用
Procedia Computer Science 2019年 151卷 179-184页
作者: X. Wang C. Zhou X. Xu College of Overseas Education Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China
Under the global trend of modern quality education, the set of higher educational scholarship is aimed to reward the students who work hard both inside and outside class activities and achieve great success in kinds o... 详细信息
来源: 评论