咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是11-20 订阅
排序:
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment
收藏 引用
computers, Materials & Continua 2019年 第1期58卷 27-43页
作者: Zhihua Xia Lihua Lu Tong Qiu H.J.Shim Xianyi Chen Byeungwoo Jeon Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China College of Information&Communication Engineering Sungkyunkwan UniversityKorea
Content based image retrieval(CBIR)techniques have been widely deployed in many applications for seeking the abundant information existed in *** to large amounts of storage and computational requirements of CBIR,outso... 详细信息
来源: 评论
A Survey of Image Super Resolution Based on CNN  9th
A Survey of Image Super Resolution Based on CNN
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Xu, Qianxiong Zheng, Yu School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NanjingJiangsu210044 China
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m... 详细信息
来源: 评论
An enhanced grouping proof for multiple rfid readers and tag groups
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第12期7卷 239-246页
作者: Shen, Jian Tan, Haowen Wang, Yang Ji, Sai Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
RFID authentication on large numbers of tags or tag groups has attracted many researchers' attention as an extension of initial one-or-two-tags scenarios. Due to demands of RFID application in supply chain, variou... 详细信息
来源: 评论
A GLCM-Feature-Based Approach for Reversible Image Transformation
收藏 引用
computers, Materials & Continua 2019年 第4期59卷 239-255页
作者: Xianyi Chen Haidong Zhong Zhifeng Bao School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China School of Computer Science and Information Technology RMIT UniversityMelbourneAustralia
Recently,a reversible image transformation(RIT)technology that transforms a secret image to a freely-selected target image is *** not only can generate a stego-image that looks similar to the target image,but also can... 详细信息
来源: 评论
Quantum Algorithms and Experiment Implementations Based on IBM Q
收藏 引用
computers, Materials & Continua 2020年 第11期65卷 1671-1689页
作者: Wenjie Liu Junxiu Chen Yinsong Xu Jiahao Tang Lian Tong Xiaoyu Song Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Engineering Jiangsu Maritime InstituteNanjing211100China Department of Electrical and Computer Engineering Portland State UniversityOregon97207USA
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio... 详细信息
来源: 评论
A significance-driven framework for characterizing and finding evolving patterns of news networks
A significance-driven framework for characterizing and findi...
收藏 引用
4th International Conference on Artificial Intelligence and Computational Intelligence, AICI 2012
作者: Yan, Leiming Wang, Jinwei Han, Jin Wang, Yuxiang School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
Social network analysis has become extremely popular in recent years. What are the most significant evolving behaviors in a social network? It is very difficult to find significant evolving behaviors from a large netw... 详细信息
来源: 评论
Partial-duplicate image retrieval using spatial and visual contextual clues
Partial-duplicate image retrieval using spatial and visual c...
收藏 引用
作者: Sun, Wendi Wang, Tao Zhou, Zhili School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China
The traditional bag-of-visual-words (BOW) model quantifies the local features to the visual words to achieve efficient content-based image retrieval. However, since it causes considerable quantisation error and ignore... 详细信息
来源: 评论
Secure storage of data in cloud computing  10
Secure storage of data in cloud computing
收藏 引用
10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
作者: Fu, Zhangjie Cao, Xinyue Wang, Jin Sun, Xingming School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China
Cloud storage brings convenient storage of data, at the same time there are also hidden security issues. Data storage security includes legal access to the data stored in the cloud, namely access authorization and aut... 详细信息
来源: 评论
Data access control for multi-authority cloud storage systems
Data access control for multi-authority cloud storage system...
收藏 引用
10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
作者: Fu, Zhangjie Xin, Lin Wang, Jin Sun, Xingming School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is one of the most suitable technologies for data access control in cloud storage systems. This paper firstly presents the Attribute-based Encryption (ABE), secure... 详细信息
来源: 评论
Improved locality-sensitive hashing method for the approximate nearest neighbor problem
收藏 引用
Chinese Physics B 2014年 第8期23卷 217-225页
作者: 陆颖华 马廷淮 钟水明 曹杰 王新 Abdullah Al-Dhelaane Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer & Software Nanjing University of Information Science & Technology School of Economic & Management Nanjing University of Information Science & Technology Huafeng Meteorological Media Group Computer Science Department College of Computer and Information Science King Saud University
In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor probl... 详细信息
来源: 评论