咨询与建议

限定检索结果

文献类型

  • 17 篇 期刊文献
  • 15 篇 会议

馆藏范围

  • 32 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 14 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 12 篇 理学
    • 7 篇 数学
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地理学
    • 1 篇 系统科学
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 5 篇 feature extracti...
  • 2 篇 image segmentati...
  • 2 篇 decision tables
  • 2 篇 data mining
  • 2 篇 acceleration
  • 2 篇 security
  • 2 篇 low pass filters
  • 2 篇 training
  • 2 篇 heuristic algori...
  • 1 篇 facial expressio...
  • 1 篇 road sign
  • 1 篇 collaborative fi...
  • 1 篇 greedy algorithm...
  • 1 篇 rendering (compu...
  • 1 篇 rough sets
  • 1 篇 e-learning
  • 1 篇 automatic classi...
  • 1 篇 deep learning
  • 1 篇 adversarial lear...
  • 1 篇 image segment

机构

  • 6 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 trusted cloud co...
  • 3 篇 key laboratory o...
  • 3 篇 shanxi key labor...
  • 3 篇 guangxi key labo...
  • 2 篇 school of inform...
  • 2 篇 school of comput...
  • 2 篇 jiangsu key labo...
  • 2 篇 school of inform...
  • 2 篇 university of el...
  • 2 篇 guangxi key labo...
  • 2 篇 jangsu automatio...
  • 2 篇 state key labora...
  • 1 篇 college of compu...
  • 1 篇 guangxi key labo...
  • 1 篇 beijing electro-...
  • 1 篇 jiangsu key labo...
  • 1 篇 state key labora...
  • 1 篇 department of co...

作者

  • 6 篇 hao zheng
  • 3 篇 gao shangbing
  • 3 篇 wan-li song
  • 3 篇 cai xingjuan
  • 2 篇 ping lv
  • 2 篇 yanqing wang
  • 2 篇 kang zhao
  • 2 篇 zhang haiyan
  • 2 篇 zheng hao
  • 2 篇 jin qian
  • 2 篇 liu liang
  • 2 篇 jian yang
  • 2 篇 chen jinjun
  • 2 篇 ma zhengrui
  • 2 篇 chen peng
  • 1 篇 lin shi
  • 1 篇 min xia
  • 1 篇 hang renlong
  • 1 篇 min hu
  • 1 篇 xue jianxun

语言

  • 32 篇 英文
检索条件"机构=Nanjing Key Laboratory of Trusted Cloud Computing and Big Data Analysis"
32 条 记 录,以下是11-20 订阅
排序:
Budgeted Persuasion on User Opinions via Varying Susceptibility
Budgeted Persuasion on User Opinions via Varying Susceptibil...
收藏 引用
IEEE International Conference on Performance, computing and Communications (IPCCC)
作者: Wenyi Tang Xinrui Xu Guangchun Luo Zaobo He Kaiming Zhan School of Computer Science and Engineering University of Electronic Science and Technology of China School of Information and Software Engineering University of Electronic Science and Technology of China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Miami University Sichuan Jiuyuan Yinhai Software Co. Ltd
Nowadays, the social network becomes an indispensable part of people's daily life, meanwhile offers an unprecedentedly convenient access for purposive individuals to influence the opinions of network users. Curren... 详细信息
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
Robust unsupervised feature selection by nonnegative sparse subspace learning
收藏 引用
Neurocomputing 2019年 334卷 156-171页
作者: Wei Zheng Hui Yan Jian Yang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China School of Computer Engineering Jinling Institute of Technology Nanjing PR China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing PR China
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the viewpoi... 详细信息
来源: 评论
Facial expression recognition via weighted group sparsity
收藏 引用
Frontiers of Computer Science 2017年 第2期11卷 266-275页
作者: Hao ZHENG Xin GENG Key Laboratory of Trusted Cloud Computing and Big Data Analysis School of Information Engineering Nanjing Xiaozhuang University Nanjing 211171 China School of Computer Science and Engineering Southeast University Nanjing 211189 China
Considering the distinctiveness of different group features in the sparse representation, a novel joint multi- task and weighted group sparsity (JMT-WGS) method is pro- posed. By weighting popular group sparsity, no... 详细信息
来源: 评论
Unsupervised feature selection based on Markov blanket and particle swarm optimization
收藏 引用
Journal of Systems Engineering and Electronics 2017年 第1期28卷 151-161页
作者: Yintong Wang Jiandong Wang Hao Liao Haiyan Chen College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University College of Computer Science and Software Engineering Shenzhen University
Feature selection plays an important role in data mining and recognition, especially in the large scale text, image and biological data. Specifically, the class label information is unavailable to guide the selection ... 详细信息
来源: 评论
Online Test Paper Composition Based on Genetic Algorithm
Online Test Paper Composition Based on Genetic Algorithm
收藏 引用
2018 3rd International Conference on Modelling, Simulation and Applied Mathematics(MSAM 2018)
作者: Wanli Song School of Information Engineering Nanjing Xiaozhuang University Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing XiaoZhuang University
The application of online examination is used more and more widely. Test paper composition is the core function in this application. Online examination system requires that the test paper should be quick and flexible,... 详细信息
来源: 评论
News Recommendation System Based on Collaborative Filtering and SVM
News Recommendation System Based on Collaborative Filtering ...
收藏 引用
2018 3rd International Conference on Automation, Mechanical and Electrical Engineering (AMEE 2018)
作者: Wan-li SONG School of Information Engineering Nanjing Xiaozhuang University Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiao Zhuang University
News system requires news classification and personalized recommendation to improve user's efficiency and interest, and to enhance user's experiences. This paper constructed a news automatic classification and... 详细信息
来源: 评论
Truncated Nuclear Norm Based Low Rank Embedding  12th
Truncated Nuclear Norm Based Low Rank Embedding
收藏 引用
12th Chinese Conference on Biometric Recognition, CCBR 2017
作者: Zhang, Fanlong Chang, Heyou Yang, Guowei Yang, Zhangjing Wan, Minghua School of Technology Nanjing Audit University Nanjing211815 China Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing211171 China
Dimensionality reduction, also called feature extraction, is an important issue in pattern recognition. However, many existing dimensionality reduction methods, such as principal component analysis, fail when there ex... 详细信息
来源: 评论
Time-based trajectory data partitioning for efficient range query  23rd
Time-based trajectory data partitioning for efficient range ...
收藏 引用
23rd International Conference on database Systems for Advanced Applications, DASFAA 2018
作者: Yue, Zhongwei Zhang, Jingwei Zhang, Huibing Yang, Qing Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China Guangxi Key Laboratory of Automatic Measurement Technology and Instrument Guilin University of Electronic Technology Guilin541004 China
The popularity of mobile terminals has given rise to an extremely large number of trajectories of moving objects. As a result, it is critical to provide effective and efficient query operations on large-scale trajecto... 详细信息
来源: 评论
Robust Matrix Discriminative analysis for Feature Extraction From Hyperspectral Images
收藏 引用
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING 2017年 第5期10卷 2002-2011页
作者: Hang, Renlong Liu, Qingshan Sun, Yubao Yuan, Xiaotong Pei, Hucheng Plaza, Javier Plaza, Antonio Jiangsu Key Laboratory of Big Data Analysis Technology Nanjing University of Information Science and Technology Nanjing China Beijing Electro-Mechanical Engineering Institute Beijing China Hyperspectral Computing Laboratory University of Extremadura Caceres Spain
Linear discriminative analysis (LDA) is an effective feature extraction method for hyperspectral image (HSI) classification. Most of the existing LDA-related methods are based on spectral features, ignoring spatial in... 详细信息
来源: 评论