咨询与建议

限定检索结果

文献类型

  • 374 篇 期刊文献
  • 304 篇 会议

馆藏范围

  • 678 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 487 篇 工学
    • 364 篇 计算机科学与技术...
    • 275 篇 软件工程
    • 98 篇 信息与通信工程
    • 47 篇 控制科学与工程
    • 44 篇 生物工程
    • 39 篇 电子科学与技术(可...
    • 35 篇 机械工程
    • 30 篇 电气工程
    • 22 篇 光学工程
    • 20 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 18 篇 仪器科学与技术
    • 16 篇 生物医学工程(可授...
    • 13 篇 建筑学
    • 12 篇 土木工程
  • 226 篇 理学
    • 124 篇 数学
    • 57 篇 物理学
    • 48 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
    • 10 篇 大气科学
  • 133 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 19 篇 法学
    • 10 篇 社会学
    • 9 篇 法学
  • 17 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 19 篇 semantics
  • 15 篇 computer science
  • 15 篇 data mining
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 12 篇 cloud computing
  • 12 篇 training
  • 11 篇 data privacy
  • 11 篇 software testing
  • 10 篇 steganography
  • 10 篇 federated learni...
  • 9 篇 reinforcement le...
  • 9 篇 optimization
  • 9 篇 computational mo...
  • 9 篇 blockchain
  • 8 篇 internet of thin...
  • 8 篇 servers
  • 8 篇 wireless sensor ...
  • 8 篇 software quality
  • 8 篇 clustering algor...

机构

  • 127 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 53 篇 state key labora...
  • 30 篇 school of comput...
  • 28 篇 jiangsu collabor...
  • 23 篇 jiangsu institut...
  • 21 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 jiangsu engineer...
  • 15 篇 school of comput...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 school of softwa...
  • 11 篇 college of compu...
  • 10 篇 school of inform...
  • 10 篇 collaborative in...
  • 10 篇 school of comput...

作者

  • 35 篇 wang jin
  • 23 篇 sun xingming
  • 19 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xu xiaolong
  • 17 篇 xingming sun
  • 16 篇 baowen xu
  • 16 篇 shen jian
  • 15 篇 xu baowen
  • 12 篇 xiaolong xu
  • 12 篇 liu wenjie
  • 11 篇 yongjun ren
  • 10 篇 xia zhihua
  • 10 篇 wenjie liu
  • 10 篇 sunil kumar jha
  • 9 篇 qi lianyong
  • 9 篇 ma tinghuai
  • 9 篇 wei fang
  • 9 篇 ma li
  • 8 篇 liu qi

语言

  • 641 篇 英文
  • 24 篇 其他
  • 13 篇 中文
检索条件"机构=School of Computer and Software and Jiangsu Engineering"
678 条 记 录,以下是61-70 订阅
排序:
FedVC: Virtual Clients for Federated Learning with Imbalanced Label Distribution  24
FedVC: Virtual Clients for Federated Learning with Imbalance...
收藏 引用
3rd International Conference on Algorithms, Data Mining, and Information Technology, ADMIT 2024
作者: Chen, Zhouguo Chen, Hongda Liu, Shuai Liu, Yongdong Schoolof Computer Science and Engineering Southeast University Jiangsu Nanjing China The 30th Research Institute of China Electronics Technology Group Corporation Sichuan Chengdu China School of Software Engineering Xian Jiaotong University Shaanxi Xian China China Industrial Control Systems Cyber Emergency Response Team Beijing China
Federated Learning (FL) has gained considerable attention for collaborative training in big data analysis, particularly in terms of privacy and communication constraints. Despite its promising advantages, FL faces the... 详细信息
来源: 评论
A Method for Extracting Small Water Areas Based on an Improved FPN Network
A Method for Extracting Small Water Areas Based on an Improv...
收藏 引用
International Conference on Ubiquitous Information Management and Communication (IMCOM)
作者: Yufeng Yu Meixiang Wang Qun Zhao Yong Wang Qingqing Chen Department of Computer and Software Hohai University Nanjing Jiangsu China School of Computer Engineering Nanjing Institute of Technology Nanjing Jiangsu China Bank of Nanjing Co. Jiangsu Nanjing China Aerosun Corporation Information Center Nanjing Jiangsu China
Small water areas such as river branches, lakes, and ponds are vital components of aquatic ecosystems closely linked to human activities. Extracting small water areas from remote sensing images holds significant impor... 详细信息
来源: 评论
Machine Learning and Deep Learning Methods on Breast Cancer Metastases Detection  4
Machine Learning and Deep Learning Methods on Breast Cancer ...
收藏 引用
4th International Conference on Computing and Data Science, CONF-CDS 2022
作者: Zheng, Wentao Liu, Kan Che, Fuqi Zheng, Yichen School of Computer Science and Engineering Central South University Hunan Changsha410083 China School of Optics and Photonics Beijing Institute of Technology Beijing100089 China School of Software Dalian University of Technology Liaoning Dalian116620 China Dulwich International High School Jiangsu Suzhou215021 China
There is a lot of room for research in how to detect breast cancer metastases in whole slide images more quickly and precisely. This work contrasts several machine learning and deep learning models on the breast cance... 详细信息
来源: 评论
Martingale Theory Based Definition and Analysis of Energy Self-Sustainability in Batteryless Internet of Things
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2024年
作者: Fan, Xinyu Hu, Jie Yang, Kun University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Nanjing University School of Intelligent Software and Engineering Jiangsu Suzhou China University of Essex School of Computer Science and Electronic Engineering United Kingdom
Radio-frequency (RF) based Wireless Energy Transfer (WET) enables devices to avoid wired power-supply and battery replacements. The ubiquitous availability of RF energy elevates 'energy self-sustainability' as... 详细信息
来源: 评论
Fast Mesh Reconstruction from Single View Based on GCN and Topology Modification
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1695-1709页
作者: Xiaorui Zhang Feng Xu Wei Sun Yan Jiang Yi Cao Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorONN9B 3P4Canada
3D reconstruction based on single view aims to reconstruct the entire 3D shape of an object from one *** existing methods reconstruct the mesh surface of complex objects,the surface details are difficult to predict an... 详细信息
来源: 评论
Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids
Private Data Aggregation Enabling Verifiable Multisubset Dyn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Qian Yang Chen Wang Jian Shen Yi Li Dengzhi Liu School of Computer Science and Technology Zhejiang Sci-Tech University HangZhou China School of Software and Electrical Engineering Swinburne University of Technology Hawthorn VIC Australia School of Computer Engineering Jiangsu Ocean University Lianyungang China
Efficient power management in smart grids relies on regularly obtaining the electricity usage of each user. However, the aggregation of the electricity usage data may expose user privacy. At present, most existing sol... 详细信息
来源: 评论
Ensemble Deep Learning Based Single Finger-Vein Recognition  6th
Ensemble Deep Learning Based Single Finger-Vein Recognition
收藏 引用
6th International Conference on Cognitive Systems and Signal Processing, ICCSIP 2021
作者: Liu, Chongwen Qin, Huafeng Yang, Gongping Shen, Zhengwen Wang, Jun School of Computer Science and Information Engineering Chongqing Technology and Business University Chongqing400067 China School of Software Engineering Shandong University Jinan250101 China China University of Mining and Technology Jiangsu Xuzhou221116 China
Finger-vein biometrics has been extensively investigated for personal verification. Single sample per person (SSPP) finger-vein recognition is one of the open issues in finger-vein recognition. In this paper, a deep e... 详细信息
来源: 评论
A New Similarity-Based Relational Knowledge Distillation Method
A New Similarity-Based Relational Knowledge Distillation Met...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaomeng Xin Heping Song Jianping Gou School of Computer Science and Communication Engineering Jiangsu University Zhenjiang PR China College of Computer and Information Science College of Software Southwest University Chongqing PR China
The previous relation-based knowledge distillation methods tend to construct global similarity relationship matrix in a mini-batch while ignoring the knowledge of neighbourhood relationship. In this paper, we propose ...
来源: 评论
Optimizing Federated Learning with Local Differential Privacy: A Game-Theoretic Approach for Privacy-Utility Tradeoff
SSRN
收藏 引用
SSRN 2024年
作者: Zeng, Qingkui Yin, Chunyong School of Electronics and Information Engineering Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China
The Industrial Internet has brought about privacy concerns alongside productivity improvements. While the emergence of federated learning mitigates the risk of end-device data leakage, it still needs integration with ... 详细信息
来源: 评论
Corporate Fraud Detection in Rich-yet-Noisy Financial Graph
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Shiqi Zhang, Zhibo Fang, Libing Nguyen, Cam-Tu Li, Wenzhon School of Artificial Intelligence Nanjing University Jiangsu Nanjing China School of Computer Science and Technology Nanjing University Jiangsu Nanjing China School of Management and Engineering Nanjing University Jiangsu Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China
Corporate fraud detection aims to automatically recognize companies that conduct wrongful activities such as fraudulent financial statements or illegal insider trading. Previous learning-based methods fail to effectiv... 详细信息
来源: 评论