咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是101-110 订阅
排序:
The Numerical Results of Binary Coherent-State Signal’s Quantum Detection in the Presence of Noise  6th
The Numerical Results of Binary Coherent-State Signal’s Qua...
收藏 引用
6th International Conference on Artificial Intelligence and Security, ICAIS 2020
作者: Yu, Wenbin Xiong, Zijia Dong, Zangqiang Xu, Yinsong Liu, Wenjie Qu, Zhiguo Liu, Alex X. Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China The Department of Computer Science and Application Zhengzhou Institute of Aeronautical Industry Management ZhengzhouHenan450015 China Department of Computer Science and Engineering Michigan State University East LansingMI48824-1226 United States
In the optical frequency level communication, quantum effect becomes the source of significant communication errors. One alternative to classical detection is orthogonal projection measurement. In this paper, based on... 详细信息
来源: 评论
Coverless Information Hiding Based on the Molecular Structure Images of Material
收藏 引用
computers, Materials & Continua 2018年 第2期54卷 197-207页
作者: Yi Cao Zhili Zhou Xingming Sun Chongzhi Gao School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNO.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityWaihuanxi RoadNo.230Guangzhou510006China
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the *** this way,it is hard to resist the detection of steganalysi... 详细信息
来源: 评论
A Real-time Cutting Model Based on Finite Element and Order Reduction
收藏 引用
computer Systems Science & engineering 2022年 第10期43卷 1-15页
作者: Xiaorui Zhang Wenzheng Zhang Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in ***,this paper proposes a realtime cutting mo... 详细信息
来源: 评论
A RFID data-cleaning algorithm based on communication information among RFID readers
收藏 引用
International Journal of u- and e- Service, Science and Technology 2015年 第1期8卷 155-164页
作者: Gu, Yunhua Gao, Bao Wang, Jin Yin, Mingshu Zhang, Junyong Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
For the insufficient of existing algorithms of redundant-reader elimination, the paper proposes a data-cleaning algorithm based on communication information among readers. This algorithm is no longer dependent on the ... 详细信息
来源: 评论
Semantics-based text copy detection method supporting similarity ranking
Semantics-based text copy detection method supporting simila...
收藏 引用
第十二届全国信息隐藏暨多媒体信息安全学术大会
作者: FU Zhangjie SUN Xingming ZHOU Lu HUANG Fengxiao School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044
Text document is the most widely used medium on the ***, there are some emerging problems that cannot be neglected, such as plagiarism, reproduction of information content, illicit redistribution, and copyright disput... 详细信息
来源: 评论
Extracting Regular Behaviors from Social Media networks
Extracting Regular Behaviors from Social Media Networks
收藏 引用
International Conference on Multimedia Information networking and Security (MINES)
作者: Leiming Yan Jinwei Wang School of Computer & Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
Social media network analysis has become very popular in recent years. How do real networks evolve over time? What are the normal evolving behaviors in a social media network? In order to extract behaviors occurring r... 详细信息
来源: 评论
A Similarity Search Method for Encrypted Cloud Document
A Similarity Search Method for Encrypted Cloud Document
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Jiangang Shu Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
The increasing popularity of cloud computing makes the data owner to outsource sensitive data in encrypted form onto the cloud. To tackle the problem of searching over encrypted cloud data, many keyword-based searchab... 详细信息
来源: 评论
Joint Bayesian guided metric learning for end-to-end face verification
收藏 引用
Neurocomputing 2018年 275卷 560-567页
作者: Di Chen Chunyan Xu Jian Yang Jianjun Qian Yuhui Zheng Linlin Shen School of Computer Science and Engineering Nanjing University of Science and Technology 210094 China Jiangsu Engineering Center of Network Monitoring School of computer and software Nanjing University of Information Science and Technology 210044 China School of Computer Science and Software Engineering Shenzhen University 518060 China
In this work, we address the problem of face verification, namely determining whether a pair of face images belongs to the same or different subjects. Previous works often consider solving the problem of face verifica... 详细信息
来源: 评论
Document Attribute-Based Keyword Search over Encrypted Data
Document Attribute-Based Keyword Search over Encrypted Data
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Jie Xi Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
As the cloud computing popularizes, sensitive data need to be encrypted before outsourcing, which makes the traditional data utilization useless. So search over these encrypted documents is a very challenging task. Th... 详细信息
来源: 评论
Secure Storage of Data in Cloud Computing
Secure Storage of Data in Cloud Computing
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Xinyue Cao Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
Cloud storage brings convenient storage of data, at the same time there are also hidden security issues. Data storage security includes legal access to the data stored in the cloud, namely access authorization and aut... 详细信息
来源: 评论