咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是101-110 订阅
排序:
Coverless steganography based on english texts using binary tags protocol
Coverless steganography based on english texts using binary ...
收藏 引用
作者: Wu, Yulei Chen, Xianyi Sun, Xingming Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
Information hiding is an evolving and challenging research field. Lately, a novel information hiding method that utilizes the original cover without modification to transmit secret messages has raised attention of the... 详细信息
来源: 评论
Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial network
收藏 引用
computers, Materials & Continua 2018年 第8期56卷 313-324页
作者: Chuanlong Li Yumeng Jiang Marta Cheslyar School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China School of Informatics University of EdinburghOld CollegeSouth BridgeEdinburghEH89YLUK
Deep neural network has proven to be very effective in computer vision *** convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditi... 详细信息
来源: 评论
Full-Blind Delegating Private Quantum Computation
收藏 引用
computers, Materials & Continua 2018年 第8期56卷 211-223页
作者: Wenjie Liu Zhenyu Chen Jinsuo Liu Zhaofeng Su Lianhua Chi Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China State Grid Electric Power Research Institute NARI Group CorporationNanjing210003China Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology SydneyNSW2007Australia Department of Computer Science and Information Technology La Trobe UniversityVIC3086Australia
The delegating private quantum computation(DQC)protocol with the universal quantum gate set{X,Z,H,P,R,CNOT}was firstly proposed by Broadbent et al.[Broadbent(2015)],and then Tan et al.[Tan and Zhou(2017)]tried to put ... 详细信息
来源: 评论
Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm
收藏 引用
Journal of Quantum Computing 2019年 第1期1卷 1-8页
作者: Yajie Sun Yanqing Yuan Qi Wang Sai Ji Lihua Wang Shaoen Wu Jie Chen Qin Zhang Jiangsu engineering Centre of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information and Control Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA
A method is proposed based on the transmissibility function and the OnlineSequence Extreme Learning Machine (OS-ELM) algorithm, which is applied to theimpact damage of composite materials. First of all, the transmissi... 详细信息
来源: 评论
Coverless Image Steganography Method Based on Feature Selection
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第2期1卷 49-60页
作者: Anqi Qiu Xianyi Chen Xingming Sun Shuai Wang Guo Wei School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Radiology and BRIC University of North Carolina at Chapel HillNorth Carolina27599USA Mathematics and Computer Science University of North Carolina at PembrokeNorth Carolina28372USA
A new information hiding technology named coverless information hiding is *** uses original natural images as stego images to represent secret *** focus of coverless image steganography method is how to represent imag... 详细信息
来源: 评论
Coverless Information Hiding Based on the Molecular Structure Images of Material
收藏 引用
computers, Materials & Continua 2018年 第2期54卷 197-207页
作者: Yi Cao Zhili Zhou Xingming Sun Chongzhi Gao School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNO.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityWaihuanxi RoadNo.230Guangzhou510006China
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the *** this way,it is hard to resist the detection of steganalysi... 详细信息
来源: 评论
Joint Bayesian guided metric learning for end-to-end face verification
收藏 引用
Neurocomputing 2018年 275卷 560-567页
作者: Di Chen Chunyan Xu Jian Yang Jianjun Qian Yuhui Zheng Linlin Shen School of Computer Science and Engineering Nanjing University of Science and Technology 210094 China Jiangsu Engineering Center of Network Monitoring School of computer and software Nanjing University of Information Science and Technology 210044 China School of Computer Science and Software Engineering Shenzhen University 518060 China
In this work, we address the problem of face verification, namely determining whether a pair of face images belongs to the same or different subjects. Previous works often consider solving the problem of face verifica... 详细信息
来源: 评论
Digital continuity guarantee of electronic record based on data usability in big data environment  4th
Digital continuity guarantee of electronic record based on d...
收藏 引用
4th International Conference on Cloud Computing and Security, ICCCS 2018
作者: Xu, Jiang Zhang, Jian Ren, Yongjun Kim, Hye-Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Business Administration Research Institute Sungshin W. University Seoul Korea Republic of
At present some developed countries have put forward their digital continuity action plans. And the digital continuity has also become a hot spot in the research of electronic records. However, the technology and meas... 详细信息
来源: 评论
Compressive Sensing Sparse Sampling Method for Composite Material Based on Principal Component Analysis
收藏 引用
Transactions of Nanjing University of Aeronautics and Astronautics 2018年 第2期35卷 282-289页
作者: Sun Yajie Gu Feihong Ji Sai Wang Lihua Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 P. R. China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing 210044 P. R. China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 P. R. China School of Information and Control Nanjing University of Information Science and Technology Nanjing 210014 P. R. China
Signals can be sampled by compressive sensing theory with a much less rate than those by traditional Nyquist sampling theorem,and reconstructed with high probability,only when signals are sparse in the time domain or ... 详细信息
来源: 评论
An intelligent agent-based method for task allocation in competitive cloud environments
An intelligent agent-based method for task allocation in com...
收藏 引用
作者: Kong, Yan Zhang, Minjie Ye, Dayong Zhu, Jinxiu Choi, Junho Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and Software Engineering University of Wollongong Wollongong2522 Australia Research Institute of Ocean and offshore engineering Hohai Universtiy Nantong226300 China Division of Undeclared Majors Chosun University Gwangju61452 Korea Republic of
In market-based cloud environments, both resource consumers and providers are self-interested;additionally, they can come and leave the environment freely. Therefore, the environment is competitive and uncertain. Beca... 详细信息
来源: 评论