咨询与建议

限定检索结果

文献类型

  • 3,023 篇 会议
  • 2,109 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,137 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,264 篇 工学
    • 2,042 篇 计算机科学与技术...
    • 1,572 篇 软件工程
    • 575 篇 信息与通信工程
    • 495 篇 控制科学与工程
    • 443 篇 电子科学与技术(可...
    • 418 篇 电气工程
    • 328 篇 机械工程
    • 284 篇 生物工程
    • 257 篇 光学工程
    • 202 篇 仪器科学与技术
    • 176 篇 化学工程与技术
    • 167 篇 生物医学工程(可授...
    • 157 篇 动力工程及工程热...
    • 131 篇 材料科学与工程(可...
    • 117 篇 交通运输工程
    • 109 篇 土木工程
    • 87 篇 建筑学
    • 85 篇 安全科学与工程
  • 1,753 篇 理学
    • 929 篇 数学
    • 467 篇 物理学
    • 329 篇 生物学
    • 258 篇 统计学(可授理学、...
    • 197 篇 系统科学
    • 175 篇 化学
  • 843 篇 管理学
    • 532 篇 管理科学与工程(可...
    • 331 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 145 篇 医学
    • 121 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 107 篇 法学
    • 83 篇 社会学
  • 59 篇 经济学
  • 54 篇 农学
  • 26 篇 教育学
  • 14 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 167 篇 laboratories
  • 139 篇 feature extracti...
  • 125 篇 computer archite...
  • 107 篇 computer science
  • 102 篇 computational mo...
  • 90 篇 semantics
  • 81 篇 training
  • 77 篇 optimization
  • 75 篇 accuracy
  • 72 篇 deep learning
  • 72 篇 data mining
  • 67 篇 bandwidth
  • 65 篇 protocols
  • 65 篇 hardware
  • 54 篇 clustering algor...
  • 54 篇 delay
  • 53 篇 neural networks
  • 53 篇 predictive model...
  • 51 篇 object detection
  • 47 篇 image segmentati...

机构

  • 183 篇 hubei province k...
  • 135 篇 school of comput...
  • 126 篇 department of co...
  • 117 篇 key laboratory o...
  • 117 篇 national enginee...
  • 103 篇 college of compu...
  • 98 篇 tianjin key labo...
  • 87 篇 key laboratory o...
  • 85 篇 college of compu...
  • 74 篇 department of co...
  • 73 篇 key laboratory o...
  • 67 篇 school of comput...
  • 63 篇 university of ch...
  • 61 篇 hubei province k...
  • 60 篇 shandong provinc...
  • 59 篇 key laboratory o...
  • 57 篇 college of infor...
  • 54 篇 school of softwa...
  • 49 篇 services computi...
  • 48 篇 key laboratory o...

作者

  • 108 篇 hai jin
  • 45 篇 xiaowei li
  • 40 篇 shen linlin
  • 36 篇 dan feng
  • 35 篇 zhang hua
  • 32 篇 jin hai
  • 28 篇 zhou mengchu
  • 28 篇 huawei li
  • 25 篇 ren jiadong
  • 24 篇 wang chundong
  • 22 篇 liu jun
  • 21 篇 li peng
  • 20 篇 yu hu
  • 19 篇 wang lei
  • 19 篇 zhang xiaolong
  • 19 篇 cui zhihua
  • 19 篇 hu shengshan
  • 19 篇 wang wei
  • 19 篇 changjun jiang
  • 19 篇 jiang changjun

语言

  • 4,373 篇 英文
  • 543 篇 其他
  • 235 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Technology Laboratory"
5137 条 记 录,以下是311-320 订阅
排序:
Large Model Collaborative Optimization Enhanced by Mobile Consumer Electronics Constructed Federated ML
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Bu, Chao Li, Jianlong Wang, Jinsong Tianjin University of Technology Key Laboratory of Computer Vision and System of Ministry of Education School of Computer Science and Engineering Tianjin300384 China Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology School of Computer Science and Engineering Tianjin300384 China
With the rapid development of internet of everything, current Mobile Consumer Electronics (MCEs) can support complex computing due to their specialized data-handling capacity. Thus, federated Machine Learning (ML) and... 详细信息
来源: 评论
NR-Isomap: An Incremental Approach with Gaussian Process Kernels for Denoising  6
NR-Isomap: An Incremental Approach with Gaussian Process Ker...
收藏 引用
6th International Conference on Big Data and Artificial Intelligence, BDAI 2023
作者: Yousaf, Mahwish Khan, Muhammad Saaadat Shakoor Ullah, Shamsher Wang, Shou Jing, Li University of Science and Technology of China School of Computer Science and Technology Hefei China Chinese Academy of Sciences Institute of Solid-State Physics Key Laboratory of Materials Physics Hefei China Unit of System and Technology University of Management and Technology Department Knowledge Sialkot Pakistan
The Isomap is a popular nonlinear dimensionality reduction method often used for low-dimensional embedding space. When the big data is noisy, Isomap often fails because of the graph structure' Short-Circuit Edges ... 详细信息
来源: 评论
Pricing Policy for a Dynamic Spectrum Allocation Scheme with Batch Requests and Impatient Packets in Cognitive Radio Networks
收藏 引用
Journal of systems Science and systems Engineering 2022年 第2期31卷 133-149页
作者: Haixing Wu Shunfu Jin Wuyi Yue School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan UniversityQinhuangdao 066004China Department of Intelligence and Informatics Konan UniversityKobe 658-8501Japan
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate ***,a s... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Structure design and analysis of a rigid-soft robotic hand with large load capacity  3
Structure design and analysis of a rigid-soft robotic hand w...
收藏 引用
3rd International Conference on Electrical, Electronics, and Information Engineering, EEIE 2024
作者: Wu, Peichen Lan, Fuming Hong, Wen Chen, Xiaoping Shuai, Wei Cui, Guowei Gao, Yang Institute of Intelligent Manufacturing Guangdong Academy of Sciences Guangdong Key Laboratory of Modern Control Technology Guangzhou510070 China Shanghai Institute of Aerospace System Engineering Shanghai201100 China Intelligent Manufacturing Institute of HFUT HeFei230041 China School of Computer Science and Technology University of Science and Technology of China Hefei230026 China
In recent years, soft grippers have gained significant attention due to their adaptability and safety. However, when performing horizontal object grasping, their limited structural stiffness prevents them from withsta... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat  7
AISLE: Self-supervised Representation Learning for the Inves...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Jia, Zian Wang, Xiaosu Xiong, Yun Zhang, Yao Zhao, JinJing Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China National Key Laboratory of Science and Technology on Information System Security China
Advanced Persistent Threats (APT) are difficult to detect and defend due to their high variability and concealment. Current APT detection and investigation approaches suffer from two major problems. First, most recent... 详细信息
来源: 评论
Detecting and Corrupting Convolution-based Unlearnable Examples  39
Detecting and Corrupting Convolution-based Unlearnable Examp...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Minghui Wang, Xianlong Yu, Zhifei Hu, Shengshan Zhou, Ziqi Zhang, Longling Zhang, Leo Yu School of Software Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all...
来源: 评论
On Privacy-Preserving Task Assignment for Heterogeneous Users in Mobile Crowdsensing  26
On Privacy-Preserving Task Assignment for Heterogeneous User...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Zhang, Ji Li, Peng Huang, Weiyi Nie, Lei Bao, Haizhou Liu, Qin Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China Wuhan University School of Cyber Science and Engineering China
Task assignment is a key challenge in mobile crowd-sensing because of the varying capabilities of crowd users. Location-based task assignment schemes require users to upload their location to an untrusted platform, wh... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis  9
An automated construction method for symmetric encryption ro...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Du, Gaolei Sun, Yunge Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论