咨询与建议

限定检索结果

文献类型

  • 82 篇 会议
  • 71 篇 期刊文献

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 76 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 32 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 12 篇 电气工程
    • 12 篇 生物工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 光学工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 57 篇 理学
    • 41 篇 数学
    • 26 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 10 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 30 篇 管理学
    • 22 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 8 篇 feature extracti...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 deep learning
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 machine learning
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 task analysis
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 3 篇 crowdsourcing
  • 3 篇 accuracy

机构

  • 58 篇 school of comput...
  • 21 篇 jiangsu key labo...
  • 20 篇 jiangsu key labo...
  • 17 篇 jiangsu key labo...
  • 12 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 school of comput...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...

作者

  • 24 篇 xu xiaolong
  • 22 篇 xiaolong xu
  • 14 篇 liu bin
  • 7 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 lejun gong
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 yang geng
  • 4 篇 yun li
  • 4 篇 xu jia
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo

语言

  • 146 篇 英文
  • 7 篇 其他
检索条件"机构=School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing"
153 条 记 录,以下是101-110 订阅
排序:
RPSBPT: A Route Planning Scheme with Best Profit for Taxi
RPSBPT: A Route Planning Scheme with Best Profit for Taxi
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Yuhua Qiu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Reasonable route planning for taxi can not only improve quality of customer experience, but also maximize the benefit of taxi drivers. Most current taxi planning schemes are designed to achieve the shortest route or t... 详细信息
来源: 评论
Comparison and Analysis on Typical Network Representation Learning Algorithms
Comparison and Analysis on Typical Network Representation Le...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Yang Wang Xiaolong Xu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Large-scale complex networks show complex nonlinear relationships among objects, such as the social relationships in the real world, the citation relationship among papers and the interactions among proteins in biolog... 详细信息
来源: 评论
Model-based Offline Policy Optimization with Adversarial Network
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social Networks
Joint Spatial-Temporal Trajectory Clustering Method for Mobi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ji Tang Linfeng Liu Jiagao Wu Jian Zhou Yang Xiang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important issue in the trajectory mining task, the trajectory clustering technique has attracted lots of the attention in the field of data mining. Trajectory clustering technique identifies the similar trajecto... 详细信息
来源: 评论
Modeling Layout Reading Order as Ordering Relations for Visually-rich Document Understanding
Modeling Layout Reading Order as Ordering Relations for Visu...
收藏 引用
2024 Conference on Empirical Methods in Natural Language processing, EMNLP 2024
作者: Zhang, Chong Tu, Yi Zhao, Yixi Yuan, Chenshu Chen, Huan Zhang, Yue Chai, Mingxu Guo, Ya Zhu, Huijia Zhang, Qi Gui, Tao School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China Ant Tiansuan Security Lab Ant Group Hangzhou China School of Statistics and Data Science Nankai University Tianjin China Institute of Modern Languages and Linguistics Fudan University Shanghai China
Modeling and leveraging layout reading order in visually-rich documents (VrDs) is critical in document intelligence as it captures the rich structure semantics within documents. Previous works typically formulated lay... 详细信息
来源: 评论
Deep representation learning for road detection using siamese network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Huafeng Han, Xiaofeng Li, Xiangrui Yao, Yazhou Huang, Pu Tang, Zhenming School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Robust road detection is a key challenge in safe autonomous driving. Recently, with the rapid development of 3D sensors, more and more researchers are trying to fuse information across different sensors to improve the... 详细信息
来源: 评论
A Privacy-Preserving and Verifiable Federated Learning Scheme
A Privacy-Preserving and Verifiable Federated Learning Schem...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Xianglong Zhang Anmin Fu Huaqun Wang Chunyi Zhou Zhenzhu Chen School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Due to the complexity of the data environment, many organizations prefer to train deep learning models together by sharing training sets. However, this process is always accompanied by the restriction of distributed s... 详细信息
来源: 评论
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud
Proxy Re-Encryption Scheme For Complicated Access Control Fa...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zheng Lian Mang Su Anmin Fu Huaqun Wang Chunyi Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Hybrid cloud has both the strong computing power of public cloud and easy control of private cloud. It provides users with robust services and convenience, meanwhile faces numerous security challenges. How to implemen... 详细信息
来源: 评论
Incentivizing the workers for truth discovery in crowdsourcing with copiers
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Lingyun Niu, Xiaofu Xu, Jia Yang, Dejun Xu, Lijie Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Department of Computer Science Colorado School of Mines GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm for performing large scale tasks. Truth discovery and incentive mechanism are fundamentally important for the crowdsourcing system. Many truth discovery methods and incen... 详细信息
来源: 评论
Image representation based on multi-features
Image representation based on multi-features
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Xianzhong Long Lei Chen Qun Li College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China
As one kind of popular application in computer vision, image clustering has attracted many attentions. Some machine learning algorithms have been widely employed, such as K-Means, Non-negative Matrix Factorization (NM... 详细信息
来源: 评论