咨询与建议

限定检索结果

文献类型

  • 82 篇 会议
  • 69 篇 期刊文献

馆藏范围

  • 151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 74 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 31 篇 信息与通信工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 光学工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 56 篇 理学
    • 40 篇 数学
    • 26 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 9 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 30 篇 管理学
    • 22 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 8 篇 feature extracti...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 machine learning
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 3 篇 crowdsourcing
  • 3 篇 accuracy

机构

  • 58 篇 school of comput...
  • 21 篇 jiangsu key labo...
  • 20 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 school of comput...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...

作者

  • 23 篇 xu xiaolong
  • 22 篇 xiaolong xu
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 lejun gong
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 yang geng
  • 4 篇 yun li
  • 4 篇 xu jia
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo

语言

  • 144 篇 英文
  • 7 篇 其他
检索条件"机构=School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing"
151 条 记 录,以下是11-20 订阅
排序:
MedBLIP: A Multimodal Method of Medical Question-Answering Based on Fine-Tuning Large Language Model
收藏 引用
computerized Medical Imaging and Graphics 2025年
作者: Lejun Gong Jiaming Yang Shengyuan Han Yimu Ji Jiangsu Key Lab of Big Data Security & Intelligent Processing School of computer science Nanjing University of Posts and Telecommunications Nanjing210023 China Institute of High Performance Computing and Bigdata Nanjing University of Posts and Telecommunications Nanjing 210023 China
Medical visual question answering is crucial for effectively interpreting medical images containing clinically relevant information. This study proposes a method called MedBLIP (Medical Treatment Bootstrapping Languag...
来源: 评论
HeRB: Heterophily-Resolved Structure Balancer for Graph Neural Networks
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Ke-Jia Mu, Wenhui ZhengLiu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China State Key Laboratory of Novel Software Technology Nanjing University Jiangsu Nanjing210093 China
—Recent research has witnessed the remarkable progress of Graph Neural Networks (GNNs) in the realm of graph data representation. However, GNNs still encounter the challenge of structural imbalance. Prior solutions t... 详细信息
来源: 评论
Congestion Relief in Downlink OFDMA Cellular System Using Inter-Cell Relay
收藏 引用
China Communications 2019年 第4期16卷 35-46页
作者: Weifeng Lu Mingqi Zhu Jia Xu Siguang Chen Lijun Yang Jian Xu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications College of Internet of Things Nanjing University of Posts and Telecommunications School of Computer Science and Engineering Nanjing University of Science and Technology
This paper proposes the concept of inter-cell relay for downlink orthogonal frequency division multiple access(OFDMA) cellular systems, which uses multi-hop to relay calls from overloaded cells to light-load neighbori... 详细信息
来源: 评论
ALEDAR: An Attentions-based Encoder-Decoder and Autoregressive model for workload Forecasting of Cloud data Center  25
ALEDAR: An Attentions-based Encoder-Decoder and Autoregressi...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Sun, Wei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing China
Effective workload forecasting can provide a reference for resource scheduling in cloud data centers. Compared with the normal single data center, the multi-data center has a more complicated architecture design and p... 详细信息
来源: 评论
A New Semi-supervised Approach for Network Encrypted Traffic Clustering and Classification  25
A New Semi-supervised Approach for Network Encrypted Traffic...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Lin, Kunda Xu, Xiaolong Jiang, Yu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Encrypted network traffic classification is an essential task in modern communications, which is used in a wide range of applications, such as network resource allocation, QoS (Quality of Service), malicious detection... 详细信息
来源: 评论
Raft Consensus Algorithm Based on Credit Model in Consortium Blockchain
收藏 引用
Wuhan University Journal of Natural sciences 2020年 第2期25卷 146-154页
作者: CHEN Yunfang LIU Ping ZHANG Wei School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023JiangsuChina Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023JiangsuChina
As one of the underlying technologies of the blockchain,the consensus algorithm plays a vital role in ensuring security and *** a consensus algorithm for the private blockchain,Raft has better performance than the res... 详细信息
来源: 评论
MTSS: multi-path traffic scheduling mechanism based on SDN
收藏 引用
Journal of Systems Engineering and Electronics 2019年 第5期30卷 974-984页
作者: XU Xiaolong CHEN Yun HU Liuyun KUMAR Anup Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Engineering and Computer Science University of LouisvilleLouisville KY40292USA
Large-scale and diverse businesses based on the cloud computing platform bring the heavy network traffic to cloud data ***,the unbalanced workload of cloud data center network easily leads to the network congestion,th... 详细信息
来源: 评论
Topic modeling for noisy short texts with multiple relations  30
Topic modeling for noisy short texts with multiple relations
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Liu, Chiyu Liu, Zheng Li, Tao Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Understanding contents in social networks by inferring high-quality latent topics from short texts is a significant task in social analysis, which is challenging because social network contents are usually extremely s... 详细信息
来源: 评论
Sharing of Encrypted Lock keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption
收藏 引用
China Communications 2022年 第5期19卷 164-177页
作者: Zhiwei Wang Liping Qian Danwei Chen Guozi sun School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Guangxi Key Laboratory of Cryptography and Information Security Department of Computer SciencesGuilin University of Electronic TechnologyGuilin 541004China
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ... 详细信息
来源: 评论
Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods
收藏 引用
computer Modeling in Engineering & sciences 2021年 第10期129卷 31-45页
作者: Lejun Gong Xingxing Zhang Li Zhang Zhihong Gao Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China
Novel coronavirus disease 2019(COVID-19)is an ongoing health *** studies are related to ***,its molecular mechanism remains *** rapid publication of COVID-19 provides a new way to elucidate its mechanism through compu... 详细信息
来源: 评论