咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是1-10 订阅
排序:
LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1-17页
作者: Xiaorui Zhang Rui Jiang Wei Sun Aiguo Song Xindong Wei Ruohan Meng Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China School of Instrument Science and Engineering Southeast UniversityNanjing211189China School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Science Engineering Nanyang Technological UniversitySingapore
Robust watermarking requires finding invariant features under multiple attacks to ensure correct *** learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attra... 详细信息
来源: 评论
Image Emotion Classification network Based on Multilayer Attentional Interaction,Adaptive Feature Aggregation
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4273-4291页
作者: Xiaorui Zhang Chunlin Yuan Wei Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Adani University AhmedabadGujaratIndia
The image emotion classification task aims to use the model to automatically predict the emotional response of people when they see the *** have shown that certain local regions are more likely to inspire an emotional... 详细信息
来源: 评论
A Derivative Matrix-Based Covert Communication Method in Blockchain
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 225-239页
作者: Xiang Zhang Xiaona Zhang Xiaorui Zhang Wei Sun Ruohan Meng Xingming Sun School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Hydrology and Water Resources Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Key Laboratory of Hydrometeorological Disaster Mechanism andWarning ofMinistry ofWater Resources Nanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) NanjingUniversity of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Science Engineering Nanyang Technological UniversitySingapore
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert ***,the existing methods of covert communication in blockchain suffer from... 详细信息
来源: 评论
Fast Mesh Reconstruction from Single View Based on GCN and Topology Modification
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1695-1709页
作者: Xiaorui Zhang Feng Xu Wei Sun Yan Jiang Yi Cao Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorONN9B 3P4Canada
3D reconstruction based on single view aims to reconstruct the entire 3D shape of an object from one *** existing methods reconstruct the mesh surface of complex objects,the surface details are difficult to predict an... 详细信息
来源: 评论
Multimodal Spatiotemporal Feature Map for Dynamic Gesture Recognition
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 671-686页
作者: Xiaorui Zhang Xianglong Zeng Wei Sun Yongjun Ren Tong Xu Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China University of Southern California Los AngelesCaliforniaUSA
Gesture recognition technology enables machines to read human gestures and has significant application prospects in the fields of human-computer interaction and sign language *** researches usually use convolutional n... 详细信息
来源: 评论
3D Object Detection with Attention:Shell-Based Modeling
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 537-550页
作者: Xiaorui Zhang Ziquan Zhao Wei Sun Qi Cui School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada
LIDAR point cloud-based 3D object detection aims to sense the surrounding environment by anchoring objects with the Bounding Box(BBox).However,under the three-dimensional space of autonomous driving scenes,the previou... 详细信息
来源: 评论
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection
收藏 引用
computer Systems Science & engineering 2022年 第6期41卷 1043-1056页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Xingming Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszowVoivodeship100031Poland
In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the *** order to ensure the safe transmission and s... 详细信息
来源: 评论
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3035-3050页
作者: Xiaorui Zhang Xun Sun Xingming Sun Wei Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
The leakage of medical audio data in telemedicine seriously violates the privacy of *** order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is p... 详细信息
来源: 评论
Resource Allocation for Throughput Maximization in Cognitive Radio network with NOMA
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 195-212页
作者: Xiaoli He Yu Song Yu Xue Muhammad Owais Weijian Yang Xinwen Cheng School of Computer Science Sichuan University of Science and EngineeringZigong643000China Department of Network Information Management Center Sichuan University of Science and EngineeringZigong643000China School of Information Engineering South West University of Science and TechnologyMianyang621010China School of Computer and Software Nanjing University of Information Science and TechnologyJiangsu210044China Alhamd Islamic University Airport Road Quetta BalochistanPakistan
Spectrum resources are the precious and limited natural *** order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cogniti... 详细信息
来源: 评论
Multi-Path Attention Inverse Discrimination network for Offline Signature Verification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3057-3071页
作者: Xiaorui Zhang Yingying Wang Wei Sun Qi Cui Xindong Wei School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China
Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other... 详细信息
来源: 评论