咨询与建议

限定检索结果

文献类型

  • 132 篇 会议
  • 101 篇 期刊文献

馆藏范围

  • 233 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 111 篇 计算机科学与技术...
    • 101 篇 软件工程
    • 37 篇 信息与通信工程
    • 23 篇 生物工程
    • 18 篇 控制科学与工程
    • 15 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 8 篇 机械工程
    • 8 篇 交通运输工程
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 仪器科学与技术
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 75 篇 理学
    • 41 篇 数学
    • 24 篇 生物学
    • 16 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 47 篇 管理学
    • 27 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 8 篇 machine learning
  • 7 篇 deep learning
  • 7 篇 training
  • 6 篇 conferences
  • 6 篇 neural networks
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 anomaly detectio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 contrastive lear...
  • 4 篇 schedules
  • 4 篇 computational mo...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 54 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...
  • 6 篇 state key labora...
  • 6 篇 jiangsu key labo...

作者

  • 37 篇 xu xiaolong
  • 25 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 chen ke-jia
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie
  • 5 篇 huang jiwu
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng

语言

  • 225 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Liuzhou Key Laboratory of Big Data Intelligent Processing and Security"
233 条 记 录,以下是21-30 订阅
排序:
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization  7
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
7th International Conference on Cyber security and Information Engineering, ICCSIE 2022
作者: Huang, Jianhua Tang, Yunlong Wei, Yongjun Wang, Huan Zhang, Haifeng Zhang, Bing School of Computer Science and Technology School of Software Guangxi University of Science and Technology Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
Sharing of Encrypted Lock keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption
收藏 引用
China Communications 2022年 第5期19卷 164-177页
作者: Zhiwei Wang Liping Qian Danwei Chen Guozi sun School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Guangxi Key Laboratory of Cryptography and Information Security Department of Computer SciencesGuilin University of Electronic TechnologyGuilin 541004China
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ... 详细信息
来源: 评论
RFC:a feature selection algorithm for software defect prediction
收藏 引用
Journal of Systems Engineering and Electronics 2021年 第2期32卷 389-398页
作者: XU Xiaolong CHEN Wen WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China School of Computing and Engineering University of West LondonLondon W55RFUK
Software defect prediction(SDP)is used to perform the statistical analysis of historical defect data to find out the distribution rule of historical defects,so as to effectively predict defects in the new ***,there ar... 详细信息
来源: 评论
Protocol Design of Efficient Access for Laptop in Wi-Fi Networks with Guaranteed security
Protocol Design of Efficient Access for Laptop in Wi-Fi Netw...
收藏 引用
International Conference on Communications, Signal processing, and Systems, CSPS 2018
作者: Zhao, Juan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210003 China
Computer security is very important since three decades ago, which becomes quite challenging especially in the wireless access scenarios. In this paper, we summarize the technologies of the development over the comput... 详细信息
来源: 评论
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks  26
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Sun, Lei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa... 详细信息
来源: 评论
Wireless Information and Power Transmission for Two-Directional Traffic in Spatial-Division Multiple Access Networks
Wireless Information and Power Transmission for Two-Directio...
收藏 引用
International Conference on Communications, Signal processing, and Systems, CSPS 2018
作者: Zhao, Juan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210003 China
Both the power and the information are transmitted wirelessly, respectively, in downlink and uplink traffics for spatial-division multiple access networks. The receiver in uplink is equipped with multiple antennas to ... 详细信息
来源: 评论
Relation Classification based on Selective Entity-Aware Attention  25
Relation Classification based on Selective Entity-Aware Atte...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Ding, Haijie Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China
Relation classification aims to classify the entity pairs into a certain relation, which is an important task of natural language processing. The latest end-to-end models based on attention mechanism still have shortc... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs  21
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhai, Xin Xu, Lijie Zhang, Jialei Wang, Kun Xu, Jia Xu, Bei Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu... 详细信息
来源: 评论
CETO-Sim: A Simulation Platform for Cloud-Edge Task Offloading  25
CETO-Sim: A Simulation Platform for Cloud-Edge Task Offloadi...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Yao, Rui Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China
In order to verify the effectiveness of task offloading algorithms in large-scale cloud and edge computing systems, scholars usually use simulation platforms to conduct extensive experiments. However, existing simulat... 详细信息
来源: 评论
Over-sampling algorithm for imbalanced data classification
收藏 引用
Journal of Systems Engineering and Electronics 2019年 第6期30卷 1182-1191页
作者: XU Xiaolong CHEN Wen SUN Yanfei Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China Office of Scientific R&D Nanjing University of Posts and TelecommunicationsNanjing 210023China
For imbalanced datasets, the focus of classification is to identify samples of the minority class. The performance of current data mining algorithms is not good enough for processing imbalanced datasets. The synthetic... 详细信息
来源: 评论