咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是131-140 订阅
排序:
A practical RFID grouping authentication protocol in multiple-tag arrangement with adequate security assurance  18
A practical RFID grouping authentication protocol in multipl...
收藏 引用
18th International Conference on Advanced Communications Technology, ICACT 2016
作者: Shen, Jian Tan, Haowen Ren, Yongjun Liu, Qi Wang, Baowei Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
Radio Frequency Identification (RFID) is considered to be an authentication technology of great potential. Due to the bright future of low-cost RFID tags in practical situations, the authentication towards multiple ta... 详细信息
来源: 评论
Learning from crowdsourced labeled data: a survey
收藏 引用
Artificial Intelligence Review 2016年 第4期46卷 543-576页
作者: Zhang, Jing Wu, Xindong Sheng, Victor S. School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China School of Computer Science and Information Engineering Hefei University of Technology Hefei 230009 China Department of Computer Science University of Central Arkansas Conway 72035 AR United States Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
With the rapid growing of crowdsourcing systems, quite a few applications based on a supervised learning paradigm can easily obtain massive labeled data at a relatively low cost. However, due to the variable uncertain... 详细信息
来源: 评论
Splicing Detection for Color Images based on QDCT Markov
Splicing Detection for Color Images based on QDCT Markov
收藏 引用
第十三届全国信息隐藏暨多媒体信息安全学术大会
作者: WANG Jinwei LIU Renfeng Jiangsu Network Monitoring Engineering Center Department of Computer and SoftwareNanjing University of Information Science and Technology Nanjing
With the increasing amount of splicing images, many detecting methods of splicing images are *** this paper, we propose a splicing detection scheme based on quaternion discrete cosine transform (QDCT).Compared to most... 详细信息
来源: 评论
Towards Efficient Content-aware Search over Encrypted Outsourced Data in Cloud
Towards Efficient Content-aware Search over Encrypted Outsou...
收藏 引用
Annual IEEE International Conference on computer Communications
作者: Zhangjie Fu Xingming Sun Sai Ji Guowu Xie College of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Department of Computer Science and Engineering University of California Riverside
With the increasing adoption of cloud computing, a growing number of users outsource their datasets into cloud. The datasets usually are encrypted before outsourcing to preserve the privacy. However, the common practi... 详细信息
来源: 评论
Combiningwavelet transform and LBP related features for fingerprint liveness detection
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2016年 第3期43卷 290-298页
作者: Xia, Zhihua Yuan, Chengsheng Sun, Xingming Sun, Decai Rui, L. Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and SoftwareNanjing University of Information Science and Technology Nanjing China College of Information Science and Technology Bohai University China
Fingerprint authentication system may verify the identity of the user according to the features of fingerprint. It has been widely used in government departments and national security departments. However, there are s... 详细信息
来源: 评论
Multi-keyword ranked search over encrypted cloud data supporting semantic extension
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2016年 第8期11卷 107-120页
作者: Xia, Zhihua Chen, Li Sun, Xingming Liu, Jianxiao Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science & Technology Nanjing210044 China College of informatics Huazhong Agricultural University Hubei China
With the emergence of cloud computing, many data owners outsource their local data to cloud server so as to enjoy high-quality data storage services. For the protection of data privacy, sensitive data has to be encryp... 详细信息
来源: 评论
A new energy landscape paving heuristic for satellite module layouts
收藏 引用
Frontiers of Information Technology & Electronic engineering 2016年 第10期17卷 1031-1043页
作者: Jing-fa LIU Juan HUANG Gang LI Wen-jie LIU Ting-zhao GUAN Liang HAO Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China School of Computer & Software Nanjing University of Information Science & Technology Nanjing 210044 China School of Mathematics and Statistics Nanfing University of Information Science & Technology Nanjing 210044 China Office of lnformationization Construction and Management Nanjing University of lnformation Science & Technology Nanjing 210044 China
This article describes a study of the satellite module layout problem (SMLP), which is a three-dimensional (3D) layout optimization problem with performance constraints that has proved to be non-deterministic poly... 详细信息
来源: 评论
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme
收藏 引用
Frontiers of physics 2015年 第2期10卷 73-78页
作者: 季赛 王芳 刘文杰 袁晓敏 Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is... 详细信息
来源: 评论
Consensus algorithms for biased labeling in crowdsourcing
收藏 引用
Information Sciences 2017年 382-383卷 254-273页
作者: Jing Zhang Victor S. Sheng Qianmu Li Jian Wu Xindong Wu School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 P. R. China Key Laboratory of Image and Video Understanding for Social Safety Nanjing University of Science and Technology Nanjing 210094 P. R. China Department of Computer Science University of Central Arkansas Conway AR 72035 USA Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 P. R. China Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 P. R. China School of Computing and Informatics University of Louisiana at Lafayette LA 70504 USA
Although it has become an accepted lay view that when labeling objects through crowdsourcing systems, non-expert annotators often exhibit biases, this argument lacks sufficient evidential observation and systematic em...
来源: 评论
An enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection
收藏 引用
Journal of computers (Taiwan) 2016年 第4期27卷 121-129页
作者: Shen, Jian Chang, Shaohua Tan, Haowen Ji, Sai Wang, Jin Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID syst... 详细信息
来源: 评论