咨询与建议

限定检索结果

文献类型

  • 82 篇 会议
  • 68 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 93 篇 工学
    • 74 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 32 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 12 篇 生物工程
    • 10 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 光学工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
  • 57 篇 理学
    • 41 篇 数学
    • 26 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 10 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
    • 2 篇 地球物理学
  • 30 篇 管理学
    • 22 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 9 篇 feature extracti...
  • 5 篇 computational mo...
  • 5 篇 privacy
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 deep learning
  • 4 篇 optimization
  • 4 篇 machine learning
  • 4 篇 accuracy
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 task analysis
  • 3 篇 telecommunicatio...
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...

机构

  • 57 篇 school of comput...
  • 21 篇 jiangsu key labo...
  • 19 篇 jiangsu key labo...
  • 18 篇 jiangsu key labo...
  • 12 篇 jiangsu key labo...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 6 篇 peng cheng labor...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 4 篇 institute of inf...
  • 4 篇 school of comput...
  • 4 篇 jiangsu key labo...
  • 3 篇 jiangsu key lab ...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...

作者

  • 24 篇 xu xiaolong
  • 23 篇 xiaolong xu
  • 14 篇 liu bin
  • 6 篇 chen ke-jia
  • 6 篇 huang qingming
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian
  • 5 篇 jia xu
  • 5 篇 tao li
  • 5 篇 bin liu
  • 4 篇 jinling he
  • 4 篇 yang zhiyong
  • 4 篇 wang zitai
  • 4 篇 xu jia
  • 4 篇 lejun gong
  • 4 篇 meng benyuan
  • 3 篇 xu lijie
  • 3 篇 zhao jinbo
  • 3 篇 chen yunfang
  • 3 篇 li tao

语言

  • 145 篇 英文
  • 5 篇 其他
检索条件"机构=School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing"
150 条 记 录,以下是41-50 订阅
排序:
Design Guidance for Lightweight Object Detection Models  3rd
Design Guidance for Lightweight Object Detection Models
收藏 引用
3rd International Conference on big data and security, ICBDS 2021
作者: Wang, Rui Wang, Xueli Chen, Yunfang Zhang, Wei School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
The lightweight target detection model is deployed in an environment with limited computing power and power consumption, which is widely used in many fields. Most of the current lightweight technologies only focus on ... 详细信息
来源: 评论
Model-Based Offline Policy Optimization with Adversarial Network  26
Model-Based Offline Policy Optimization with Adversarial Net...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems  26
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Shicheng Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs  26
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Ding, Qun Xu, Xiaolong Gui, Wenming Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Jinling Institute of Technology School of Computer Science Nanjing211169 China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis... 详细信息
来源: 评论
Indoor Navigation Mechanism based on 5G network for Large Parking Garage  26
Indoor Navigation Mechanism based on 5G network for Large Pa...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Xiaolong Ding, Qun Lin, Licheng Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing210023 China
With the increase of car ownership in China, the problem of difficult parking in cities has become more and more serious. In large parking garage, finding an ideal parking space has become a daily problem for people;e... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding  10
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Wang, Boyang He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for processing Large-scale datasets on Distributed Platforms  10
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Song, Hu Cheng, Xinyun Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
Identifying Outliers in Astronomical Images with Unsupervised Machine Learning
收藏 引用
Research in Astronomy and Astrophysics 2022年 第8期22卷 74-84页
作者: Yang Han Zhiqiang Zou Nan Li Yanli Chen School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Key Laboratory of Optical Astronomy National Astronomical ObservatoriesChinese Academy of SciencesBeijing 100101China University of Chinese Academy of Sciences Beijing 100049China
Astronomical outliers,such as unusual,rare or unknown types of astronomical objects or phenomena,constantly lead to the discovery of genuinely unforeseen knowledge in *** unpredictable outliers will be uncovered in pr... 详细信息
来源: 评论
A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews  5
A Lexical Updating Algorithm for Sentiment Analysis on Chine...
收藏 引用
5th International Conference on Advanced Cloud and big data, CBD 2017
作者: Song, Yiwei Gu, Kaiwen Li, Huakang Sun, Guozi Bell Honor School Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
With the prevalence of Internet, sentiment analysis gets popularity among the world. Researchers have made use of kinds of online documents like commodities reivews and movie reviews as training samples to train their... 详细信息
来源: 评论
Visco-acoustic Wave-equation Traveltime Inversion with Correct and Incorrect Attenuation Profiles  87
Visco-acoustic Wave-equation Traveltime Inversion with Corre...
收藏 引用
Society of Exploration Geophysicists International Exposition and 87th Annual Meeting, SEG 2017
作者: Yu, Han Chen, Yuqing Guo, Bowen Schuster, Gerard T. Division of Physical Sciences and Engineering King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210003 China
A visco-acoustic wave-equation traveltime inversion method is presented that inverts for a shallow subsurface velocity distribution with correct and incorrect attenuation profiles. Similar to the classical wave equati... 详细信息
来源: 评论