咨询与建议

限定检索结果

文献类型

  • 17 篇 期刊文献
  • 15 篇 会议

馆藏范围

  • 32 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 14 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 12 篇 理学
    • 7 篇 数学
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地理学
    • 1 篇 系统科学
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 5 篇 feature extracti...
  • 2 篇 image segmentati...
  • 2 篇 decision tables
  • 2 篇 data mining
  • 2 篇 acceleration
  • 2 篇 security
  • 2 篇 low pass filters
  • 2 篇 training
  • 2 篇 heuristic algori...
  • 1 篇 facial expressio...
  • 1 篇 road sign
  • 1 篇 collaborative fi...
  • 1 篇 greedy algorithm...
  • 1 篇 rendering (compu...
  • 1 篇 rough sets
  • 1 篇 e-learning
  • 1 篇 automatic classi...
  • 1 篇 deep learning
  • 1 篇 adversarial lear...
  • 1 篇 image segment

机构

  • 6 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 trusted cloud co...
  • 3 篇 key laboratory o...
  • 3 篇 shanxi key labor...
  • 3 篇 guangxi key labo...
  • 2 篇 school of inform...
  • 2 篇 school of comput...
  • 2 篇 jiangsu key labo...
  • 2 篇 school of inform...
  • 2 篇 university of el...
  • 2 篇 guangxi key labo...
  • 2 篇 jangsu automatio...
  • 2 篇 state key labora...
  • 1 篇 college of compu...
  • 1 篇 guangxi key labo...
  • 1 篇 beijing electro-...
  • 1 篇 jiangsu key labo...
  • 1 篇 state key labora...
  • 1 篇 department of co...

作者

  • 6 篇 hao zheng
  • 3 篇 gao shangbing
  • 3 篇 wan-li song
  • 3 篇 cai xingjuan
  • 2 篇 ping lv
  • 2 篇 yanqing wang
  • 2 篇 kang zhao
  • 2 篇 zhang haiyan
  • 2 篇 zheng hao
  • 2 篇 jin qian
  • 2 篇 liu liang
  • 2 篇 jian yang
  • 2 篇 chen jinjun
  • 2 篇 ma zhengrui
  • 2 篇 chen peng
  • 1 篇 lin shi
  • 1 篇 min xia
  • 1 篇 hang renlong
  • 1 篇 min hu
  • 1 篇 xue jianxun

语言

  • 32 篇 英文
检索条件"机构=Nanjing Key Laboratory of Trusted Cloud Computing and Big Data Analysis"
32 条 记 录,以下是1-10 订阅
排序:
Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第7期140卷 363-383页
作者: Liang Chen Jingbo Zhang Linjie Wu Xingjuan Cai Yubin Xu Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and TechnologyTaiyuan030024China School of State Key Laboratory of Novel Software Technology Nanjing UniversityNanjing210008China
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among de... 详细信息
来源: 评论
The research of human interaction recognition based on fusion features of key frame feature library
收藏 引用
International Journal of Information and Communication Technology 2021年 第1期18卷 57-69页
作者: Zhang, Haiyan Gao, Shangbing Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai'an China Nanjing Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing China
Some issues such as computational complexity and low recognition accuracy still exist in human interaction recognition. In order to solve the problem, the paper has proposed innovative and effective method based on fi... 详细信息
来源: 评论
Plausible Heterogeneous Graph k-Anonymization for Social Networks
收藏 引用
Tsinghua Science and Technology 2022年 第6期27卷 912-924页
作者: Kaiyang Li Ling Tian Xu Zheng Bei Hui School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu 610000China
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra... 详细信息
来源: 评论
Intersection-union dual-stream cross-attention Lova-SwinUnet for skin cancer hair segmentation and image repair
收藏 引用
Computers in Biology and Medicine 2024年 180卷 108931页
作者: Qin, Juanjuan Pei, Dong Guo, Qian Cai, Xingjuan Xie, Liping Zhang, Wensheng Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Taiyuan China State Key Laboratory for Novel Software Technology at Nanjing University Nanjing University Nanjing China Beijing China
Skin cancer images have hair occlusion problems, which greatly affects the accuracy of diagnosis and classification. Current dermoscopic hair removal methods use segmentation networks to locate hairs, and then uses re... 详细信息
来源: 评论
Government intervention model based on behavioral heterogeneity for China’s stock market
收藏 引用
Financial Innovation 2022年 第1期8卷 2569-2587页
作者: Zhong-Qiang Zhou Jie Li Wei Zhang Xiong Xiong School of Big Data Applications and Economics Guizhou University of Finance and EconomicsGuiyang 550025China Guizhou Key Laboratory of Big Data Statistical Analysis Guizhou University of Finance and EconomicsGuiyang 550025China School of Finance Nanjing Audit UniversityNanjing 211815JiangsuChina College of Management and Economics Tianjin UniversityTianjin 300072China China Center for Social Computing and Analytics Tianjin UniversityTianjin 300072China
Active government intervention is a striking characteristic of the Chinese stock *** study develops a behavioral heterogeneous agent model(HAM)comprising fundamentalists,chartists,and stabilizers to investigate invest... 详细信息
来源: 评论
Smoothed Multi-view Subspace Clustering  1
收藏 引用
2nd International Conference on Neural computing for Advanced Applications, NCAA 2021
作者: Chen, Peng Liu, Liang Ma, Zhengrui Kang, Zhao Jangsu Automation Research Institute Lianyungang Jiangsu China University of Electronic Science and Technology of China Chengdu Sichuan China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu Sichuan China
In recent years, multi-view subspace clustering has achieved impressive performance due to the exploitation of complementary information across multiple views. However, multi-view data can be very complicated and are ... 详细信息
来源: 评论
Edge computing service deployment and task offloading based on multi-task high-dimensional multi-objective optimization
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Yanheng Zhang, Yan Wu, Linjie Li, Mengxia Cai, Xingjuan Chen, Jinjun Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Shanxi Taiyuan030024 China State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia
The Mobile Edge computing (MEC) system located close to the client allows mobile smart devices to offload their computations onto edge servers, enabling them to benefit from low-latency computing services. Both cloud ... 详细信息
来源: 评论
Resource-Aware Multi-Criteria Vehicle Participation for Federated Learning in Internet of Vehicles
SSRN
收藏 引用
SSRN 2023年
作者: Wen, Jie Zhang, Jingbo Zhang, Zhixia Cui, Zhihua Cai, Xingjuan Chen, Jinjun The Shanxi Key Laboratory of Advanced Control and Equipment intelligence Taiyuan University of Science and Technology Shanxi Taiyuan China The Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Shanxi Taiyuan China The State Key Lab for Novel Software Technology Nanjing University China Department of Computing Technologies Swinburne University of Technology Melbourne Australia
Federated learning (FL), as a safe distributed training mode, provides strong support for the edge intelligence of the Internet of Vehicles (IoV) to realize efficient collaborative control and safe data sharing. Howev... 详细信息
来源: 评论
Smoothed multi-view subspace clustering
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Peng Liu, Liang Ma, Zhengrui Kang, Zhao Jangsu Automation Research Institute Jiangsu Lianyungang China University of Electronic Science and Technology of China Sichuan Chengdu China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Sichuan Chengdu China
In recent years, multi-view subspace clustering has achieved impressive performance due to the exploitation of complementary imformation across multiple views. However, multi-view data can be very complicated and are ... 详细信息
来源: 评论
Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN
Malicious Family Identify Combining Multi-channel Mapping Fe...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Chenghua Tang Chen Zhou Min Hu Mengmeng Yang Baohua Qiang Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Strategic Centre for Research in Privacy-Preserving Technologies & Systems Nanyang Technological University Singapore Guangxi Cloud Computing and Big Data Collaborative Innovation Center Guilin University of Electronic Technology Guilin China
Using the features of malicious family to detect malicious code can improve the analysis efficiency and reduce the workload. Aiming at the problems of low efficiency and low accuracy of classifiers in analyzing and de... 详细信息
来源: 评论