咨询与建议

限定检索结果

文献类型

  • 5,187 篇 会议
  • 3,517 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,731 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,852 篇 工学
    • 4,550 篇 计算机科学与技术...
    • 3,684 篇 软件工程
    • 1,045 篇 信息与通信工程
    • 760 篇 控制科学与工程
    • 499 篇 电气工程
    • 474 篇 生物工程
    • 399 篇 机械工程
    • 393 篇 电子科学与技术(可...
    • 275 篇 光学工程
    • 254 篇 生物医学工程(可授...
    • 207 篇 化学工程与技术
    • 191 篇 仪器科学与技术
    • 178 篇 网络空间安全
    • 168 篇 动力工程及工程热...
    • 160 篇 安全科学与工程
    • 151 篇 建筑学
    • 142 篇 交通运输工程
    • 137 篇 土木工程
  • 2,683 篇 理学
    • 1,699 篇 数学
    • 536 篇 生物学
    • 524 篇 物理学
    • 460 篇 统计学(可授理学、...
    • 324 篇 系统科学
    • 216 篇 化学
  • 1,697 篇 管理学
    • 1,010 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 312 篇 工商管理
  • 200 篇 医学
    • 164 篇 临床医学
    • 142 篇 基础医学(可授医学...
  • 198 篇 法学
    • 147 篇 社会学
  • 102 篇 经济学
  • 91 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 26 篇 艺术学
  • 23 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 272 篇 laboratories
  • 208 篇 semantics
  • 172 篇 feature extracti...
  • 151 篇 computational mo...
  • 143 篇 data mining
  • 141 篇 software
  • 138 篇 software enginee...
  • 125 篇 training
  • 123 篇 deep learning
  • 119 篇 algorithm design...
  • 117 篇 optimization
  • 108 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 accuracy
  • 100 篇 cloud computing
  • 92 篇 costs
  • 91 篇 predictive model...
  • 90 篇 application soft...
  • 90 篇 software testing

机构

  • 1,027 篇 state key labora...
  • 209 篇 state key labora...
  • 201 篇 national key lab...
  • 193 篇 department of co...
  • 185 篇 college of compu...
  • 169 篇 department of co...
  • 154 篇 university of ch...
  • 122 篇 tianjin key labo...
  • 111 篇 school of inform...
  • 107 篇 state key labora...
  • 104 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 beijing key labo...
  • 93 篇 school of comput...
  • 91 篇 key laboratory o...
  • 87 篇 school of softwa...
  • 84 篇 state key labora...
  • 84 篇 shandong provinc...
  • 79 篇 national enginee...

作者

  • 65 篇 gao yang
  • 64 篇 junping du
  • 47 篇 yin baocai
  • 42 篇 wang wei
  • 41 篇 shi yinghuan
  • 40 篇 zhang hua
  • 38 篇 zhou zhi-hua
  • 38 篇 baocai yin
  • 38 篇 sanglu lu
  • 37 篇 baowen xu
  • 37 篇 guihai chen
  • 37 篇 shen linlin
  • 34 篇 xu baowen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 zhao jian
  • 31 篇 yu huiqun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 li wu-jun

语言

  • 7,450 篇 英文
  • 1,044 篇 其他
  • 248 篇 中文
  • 2 篇 德文
检索条件"机构=Computer and Software Technology Laboratory"
8731 条 记 录,以下是161-170 订阅
排序:
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论
Dynamic defenses in cyber security:Techniques,methods and challenges Author links open overlay panel
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 422-435页
作者: Yu Zheng Zheng Li Xiaolong Xu Qingzhan Zhao School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044JiangsuChina Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023JiangsuChina College of Information Science and Technology Shihezi University Geospatial Information Engineering Research CenterChina
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human ***,security pr... 详细信息
来源: 评论
SGAN-RL: Fusion classification method for network intrusion detection based on data augmentation
收藏 引用
Journal of Intelligent and Fuzzy Systems 2025年 第4期48卷 569-583页
作者: Li, Lining Liu, Shuai Ren, Rong Wu, Lianhai Wang, Qian Zhang, Bing College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Information Science and Engineering Yanshan University P.R. Qinhuangdao China The Key Laboratory of Software Engineering Yanshan University Qinhuangdao China
Although traditional research methods for intrusion detection can effectively prevent and mitigate issues such as data leaks to avoid severe consequences, existing intrusion detection technologies encounter limitation... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises’ demand for dynamic multidimensional resources, the implementation of effective strategy for time-varying workload scheduling has beco... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of computer Science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
Adversarial Learning Under Hybrid Perturbations for Robust Acute Lymphoblastic Leukemia Classification  39
Adversarial Learning Under Hybrid Perturbations for Robust A...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Chen, Jie Liu, Xinyuan Liu, Xintong Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Acute lymphoblastic leukemia is a childhood cancer prevalent worldwide, which can prove fatal within weeks or months. However, current diagnosis models based on machine learning and deep learning methods fail to consi... 详细信息
来源: 评论
DrugHash: Hashing Based Contrastive Learning for Virtual Screening  39
DrugHash: Hashing Based Contrastive Learning for Virtual Scr...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Han, Jin Hong, Yun Li, Wu-Jun National Key Laboratory for Novel Software Technology School of Computer Science Nanjing University China Kuang Yaming Honors School Nanjing University China
Virtual screening (VS) is a critical step in computer-aided drug discovery, aiming to identify molecules that bind to a specific target protein. Traditional VS methods, such as docking, are often too time-consuming to... 详细信息
来源: 评论
TimeDP: Learning to Generate Multi-Domain Time Series with Domain Prompts  39
TimeDP: Learning to Generate Multi-Domain Time Series with D...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Yu-Hao Xu, Chang Wu, Yueying Li, Wu-Jun Bian, Jiang National Key Laboratory for Novel Software Technology School of Computer Science Nanjing University China Microsoft Research Asia China Peking University China
Time series generation models are crucial for applications like data augmentation and privacy preservation. Most existing time series generation models are typically designed to generate data from one specified domain... 详细信息
来源: 评论
ParLS-PBO: A Parallel Local Search Solver for Pseudo Boolean Optimization  30
ParLS-PBO: A Parallel Local Search Solver for Pseudo Boolean...
收藏 引用
30th International Conference on Principles and Practice of Constraint Programming, CP 2024
作者: Chen, Zhihan Lin, Peng Hu, Hao Cai1, Shaowei State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
As a broadly applied technique in numerous optimization problems, recently, local search has been employed to solve Pseudo-Boolean Optimization (PBO) problem. A representative local search solver for PBO is LS-PBO. In... 详细信息
来源: 评论
TSCMR:Two-Stage Cross-Modal Retrieval  9th
TSCMR:Two-Stage Cross-Modal Retrieval
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Chen, Zhihao Wang, Hongya School of Computer Science and Technology Donghua University Shanghai China State Key Laboratory of Computer Architecture Institute of Computing Technology CAS Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Currently, large-scale vision and language models has significantly improved the performances of cross-modal retrieval tasks. However, large-scale models require a substantial amount of computing resources, so the exe... 详细信息
来源: 评论