咨询与建议

限定检索结果

文献类型

  • 132 篇 会议
  • 99 篇 期刊文献

馆藏范围

  • 231 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 143 篇 工学
    • 110 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 37 篇 信息与通信工程
    • 23 篇 生物工程
    • 18 篇 控制科学与工程
    • 14 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 8 篇 机械工程
    • 8 篇 交通运输工程
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 仪器科学与技术
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 75 篇 理学
    • 41 篇 数学
    • 24 篇 生物学
    • 16 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 47 篇 管理学
    • 27 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 8 篇 machine learning
  • 8 篇 training
  • 7 篇 deep learning
  • 6 篇 conferences
  • 6 篇 neural networks
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 anomaly detectio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 computational mo...
  • 4 篇 contrastive lear...
  • 4 篇 schedules
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie
  • 5 篇 huang jiwu
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng

语言

  • 226 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Liuzhou Key Laboratory of Big Data Intelligent Processing and Security"
231 条 记 录,以下是181-190 订阅
排序:
Research and application of artificial intelligence based webshell detection model: A literature review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Mingrui Han, Lansheng Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Key Laboratory of Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
Webshell, as the"culprit" behind numerous network attacks, is one of the research hotspots in the field of cybersecurity. However, the complexity, stealthiness, and confusing nature of webshells pose signifi... 详细信息
来源: 评论
Research and application of Transformer based anomaly detection model: A literature review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Mingrui Han, Lansheng Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China The Key Laboratory of Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
Transformer, as one of the most advanced neural network models in Natural Language processing (NLP), exhibits diverse applications in the field of anomaly detection. To inspire research on Transformer-based anomaly de... 详细信息
来源: 评论
Collaborative Bi-Aggregation for Directed Graph Embedding
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Linsong Chen, Ke-Jia Liu, Zheng Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China State Key Laboratory of Novel Software Technology Nanjing University Jiangsu Nanjing210093 China
Directed graph is able to model asymmetric relationships between nodes and research on directed graph embedding is of great significance in downstream graph analysis and inference. Learning source and target embedding... 详细信息
来源: 评论
Multi-objective optimization for fuzzy workflow scheduling
Multi-objective optimization for fuzzy workflow scheduling
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jie Zhu Jing Zhang Chang Lu Haiping Huang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China Nanjing University of Posts & Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
A fuzzy workflow scheduling problem is investigated with fuzzy temporal parameters, such as the fuzzy task processing times, fuzzy data transmission times and the fuzzy due dates. In the considered problem, the resour... 详细信息
来源: 评论
Identifying outliers in astronomical images with unsupervised machine learning
arXiv
收藏 引用
arXiv 2022年
作者: Han, Yang Zou, Zhiqiang Li, Nan Chen, Yanli School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China Key Laboratory of Optical Astronomy National Astronomical Observatories Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Astronomical outliers, such as unusual, rare or unknown types of astronomical objects or phenomena, constantly lead to the discovery of genuinely unforeseen knowledge in astronomy. More unpredictable outliers will be ... 详细信息
来源: 评论
Throughput Maximization for UAV-Enabled data Collection
Throughput Maximization for UAV-Enabled Data Collection
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Junchao Gong Xiaojun Zhu Lijie Xu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China
In this paper, we consider a scenario where an unmanned aerial vehicle (UAV) collects data from a set of nodes placed on a two-dimensional (2-D) plane. The UAV flies along a given line to collect data. To prevent tran... 详细信息
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2024年
作者: Han, Keji Li, Yun Ge, Yao Wang, Ruchuan Nanjing University of Posts and Telecommunications Wenyuan Road 9 Nanjing210046 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Wenyuan Road 9 Nanjing210046 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Wenyuan Road 9 Nanjing210046 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
Pptcdr: Personalized Preference Transfer Cross-Domain Recommendation Based on Heterogeneous Graph Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Zhu, Fan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Cross-domain recommendation methods aim to solve the problems of data sparsity and cold start by leveraging rich information from the source domain to enhance the recommendation accuracy of the target domain. Many met... 详细信息
来源: 评论
Sindiff: Spoken-to-Sign Language Generation Based Transformer Diffusion Model
SSRN
收藏 引用
SSRN 2023年
作者: Liang, Wuyan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Sign language generation (SLG) is meaningful in facilitating the communication between deaf and healthy people. Recently, transformer-based diffusion models have been achieved success in human motion generation. Howev... 详细信息
来源: 评论
Universal deep network for steganalysis of color image based on channel representation
arXiv
收藏 引用
arXiv 2021年
作者: Wei, Kangkang Luo, Weiqi Tan, Shunquan Huang, Jiwu The Guangdong Key Lab of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Up to now, most existing steganalytic methods are designed for grayscale images, and they are not suitable for color images that are widely used in current social networks. In this paper, we design a universal color i... 详细信息
来源: 评论