咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是31-40 订阅
排序:
Deep Learning for Object Detection:A Survey
收藏 引用
computer Systems Science & engineering 2021年 第8期38卷 165-182页
作者: Jun Wang Tingjuan Zhang Yong Cheng Najla Al-Nabhan Science and Technology Industry Department Nanjing University of Information Science&Technology210044China School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&Technology210044China Department Computer Science King Saud UniversityRiyadhKSA
Object detection is one of the most important and challenging branches of computer vision,which has been widely applied in people s life,such as monitoring security,autonomous driving and so on,with the purpose of loc... 详细信息
来源: 评论
Coverless image steganography based on SIFT and BOF
Coverless image steganography based on SIFT and BOF
收藏 引用
作者: Yuan, Chengsheng Xia, Zhihua Sun, Xingming School of Computer and Software Nanjing University of Information Science and Technology China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniq... 详细信息
来源: 评论
Short text classification technology based on KNN+hierarchy SVM  12th
Short text classification technology based on KNN+hierarchy ...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Shi, Lingfeng Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
A short text classification method based on combination of KNN and hierarchical SVM is proposed. First, the KNN algorithm is improved to get the K nearest neighbor class labels quickly, so as to effectively filter the... 详细信息
来源: 评论
Improved data stream clustering algorithm for anomaly detection  12th
Improved data stream clustering algorithm for anomaly detect...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Zhang, Sun Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
Intrusion detection provides important protection for network security and anomaly detection as a type of intrusion detection, can recognize the pattern of normal behaviors and label the behaviors which departure from... 详细信息
来源: 评论
Application of an improved data stream clustering algorithm in intrusion detection system  12th
Application of an improved data stream clustering algorithm ...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Xia, Lian Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
With the continuous development of computer network technology, traditional intrusion detection system is short of good adaptability. Aiming at the traditional intrusion detection system is difficult to adapt to the i... 详细信息
来源: 评论
A New Sequential Image Prediction Method Based on LSTM and DCGAN
收藏 引用
computers, Materials & Continua 2020年 第7期64卷 217-231页
作者: Wei Fang Feihong Zhang Yewen Ding Jack Sheng School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023China Department of Economics FinanceInsurance and Risk Management University of Central ArkansasConway72035USA
Image recognition technology is an important field of artificial *** with the development of machine learning technology in recent years,it has great researches value and commercial *** a matter of fact,a single recog... 详细信息
来源: 评论
Non-Exchangeable Error Compensation for Strapdown Inertial Navigation System in High Dynamic Environment
收藏 引用
computers, Materials & Continua 2020年 第8期64卷 973-986页
作者: Qi Wang Changsong Yang Shao’en Wu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Automation Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncie47306USA
Strapdown non-exchangeable error compensation technology in high dynamic environment is one of the key technologies of strapdown inertial navigation *** platform is used in strapdown inertial navigation system instead... 详细信息
来源: 评论
Combining active learning and semi-supervised for improving learning performance  11
Combining active learning and semi-supervised for improving ...
收藏 引用
4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL'11
作者: Ma, Tinghuai Ge, Jian Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing Jiangsu Province China School of Computer and Software Nanjing University of Information Science and Technology Nanjing Jiangsu Province China
In many learning tasks, there are abundant unlabeled samples but the number of labeled training samples is limited, because labeling the samples requires the efforts of human annotators and expertise. There are three ... 详细信息
来源: 评论
Vehicle Re-Identication Model Based on Optimized DenseNet121 with Joint Loss
收藏 引用
computers, Materials & Continua 2021年 第6期67卷 3933-3948页
作者: Xiaorui Zhang Xuan Chen Wei Sun Xiaozheng He Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China Department of Civil and Environmental Engineering Rensselaer Polytechnic InstituteTroyNY12180USA
With the increasing application of surveillance cameras,vehicle re-identication(Re-ID)has attracted more attention in the eld of public *** Re-ID meets challenge attributable to the large intra-class differences cause... 详细信息
来源: 评论
A novel convolution neural network for background segmentation recognition  4th
A novel convolution neural network for background segmentati...
收藏 引用
4th International Conference on Cloud Computing and Security, ICCCS 2018
作者: Fang, Wei Ding, Yewen Zhang, Feihong School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
The convolution neural network for image classification is an application of deep learning on image processing. Convolutional neural networks have the advantage of being able to convolve directly with image pixels and... 详细信息
来源: 评论