咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是1-10 订阅
排序:
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA
收藏 引用
China Communications 2016年 第7期13卷 60-65页
作者: Chengsheng Yuan Xingming Sun Rui Lv School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick ... 详细信息
来源: 评论
Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences
收藏 引用
China Communications 2016年 第7期13卷 66-73页
作者: Xianyi Chen Guangyong Gao Dandan Liu Zhihua Xia Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science & Technology School of Information Science & Technology Jiujiang University
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public *** paper concentrates on steganalysis against spatial least significant bit(LSB) matching,whi... 详细信息
来源: 评论
Attacks and Improvement of Quantum Sealed-Bid Auction with EPR Pairs
收藏 引用
Communications in Theoretical Physics 2014年 第6期61卷 686-690页
作者: 刘文杰 王芳 季赛 瞿治国 王小军 Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c... 详细信息
来源: 评论
Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States
收藏 引用
Communications in Theoretical Physics 2014年 第8期61卷 210-214页
作者: 刘文杰 刘超 陈汉武 李志强 刘志昊 Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology School of Computer Science and Engineering Southeast University College of Information Engineering Yangzhou University
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants... 详细信息
来源: 评论
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme
收藏 引用
Frontiers of physics 2015年 第2期10卷 73-78页
作者: 季赛 王芳 刘文杰 袁晓敏 Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is... 详细信息
来源: 评论
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
收藏 引用
China Communications 2016年 第7期13卷 92-99页
作者: Zhihua Xia Liangao Zhang Dandan Liu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribu... 详细信息
来源: 评论
A Novel Steganography Algorithm Based on Instance Segmentation
收藏 引用
computers, Materials & Continua 2020年 第4期63卷 183-196页
作者: Ruohan Meng Qi Cui Zhili Zhou Chengsheng Yuan Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorCanada
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... 详细信息
来源: 评论
Long short term memory model for analysis and forecast of PM2.5  4th
Long short term memory model for analysis and forecast of PM...
收藏 引用
4th International Conference on Cloud Computing and Security, ICCCS 2018
作者: Yan, Leiming Zhou, Min Wu, Yaowen Yan, Luqi Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
Atmospheric PM2.5 is a pollutant that has a major impact on the atmospheric environment and human health. Based on LSTM, we construct two prediction models, Stack LSTM and Encoder-Decoder, and evaluate the prediction ... 详细信息
来源: 评论
Extracting regular behaviors from social media networks
Extracting regular behaviors from social media networks
收藏 引用
3rd International Conference on Multimedia Information networking and Security, MINES 2011
作者: Yan, Leiming Wang, Jinwei School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
Social media network analysis has become very popular in recent years. How do real networks evolve over time? What are the normal evolving behaviors in a social media network? In order to extract behaviors occurring r... 详细信息
来源: 评论
Illumination invariant and face recognition based on homomorphic filtering and LoG operator1
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第21期4卷 17-24页
作者: Fan, Chun-Nian Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on homomorphic filtering and LoG operator is proposed. The method first performs homomorphic fi... 详细信息
来源: 评论