咨询与建议

限定检索结果

文献类型

  • 419 篇 会议
  • 121 篇 期刊文献

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 414 篇 工学
    • 316 篇 计算机科学与技术...
    • 267 篇 软件工程
    • 108 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 37 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 20 篇 机械工程
    • 20 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
    • 8 篇 安全科学与工程
    • 7 篇 建筑学
  • 197 篇 理学
    • 138 篇 数学
    • 43 篇 统计学(可授理学、...
    • 38 篇 生物学
    • 37 篇 物理学
    • 12 篇 系统科学
    • 11 篇 化学
  • 142 篇 管理学
    • 95 篇 图书情报与档案管...
    • 61 篇 管理科学与工程(可...
    • 29 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 network coding
  • 10 篇 bandwidth
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 computational mo...
  • 8 篇 clustering algor...
  • 8 篇 cloud computing
  • 7 篇 collaborative fi...
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 educational inst...
  • 6 篇 servers
  • 6 篇 mapreduce
  • 6 篇 computational li...
  • 6 篇 real-time system...
  • 6 篇 entropy
  • 6 篇 web services
  • 5 篇 scalability

机构

  • 30 篇 key lab. of inte...
  • 29 篇 university of ch...
  • 20 篇 tianjin key lab....
  • 19 篇 key lab. of inte...
  • 13 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 11 篇 graduate univers...
  • 11 篇 key laboratory o...
  • 11 篇 state key lab. f...
  • 10 篇 shenyang institu...
  • 10 篇 peng cheng labor...
  • 10 篇 hunan provincial...
  • 9 篇 school of comput...
  • 9 篇 graduate univers...
  • 9 篇 liaoning key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 key lab. of inte...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...

作者

  • 25 篇 liu qun
  • 19 篇 yin zhenyu
  • 19 篇 kai lei
  • 19 篇 li hui
  • 18 篇 huang qingming
  • 12 篇 guosheng kang
  • 10 篇 liu jianxun
  • 10 篇 gao wen
  • 9 篇 kang guosheng
  • 9 篇 zhang degan
  • 9 篇 xu qianqian
  • 9 篇 zhuge hai
  • 8 篇 zhang feiqing
  • 8 篇 cao jiannong
  • 8 篇 jianxun liu
  • 7 篇 fan chao
  • 7 篇 jiang shuqiang
  • 7 篇 mi haitao
  • 7 篇 wang tao
  • 7 篇 yang yan

语言

  • 514 篇 英文
  • 21 篇 中文
  • 5 篇 其他
检索条件"机构=Key Lab. of Cloud Computing Technology"
540 条 记 录,以下是511-520 订阅
排序:
Expander Code: A Scalab.e Erasure-Resilient Code to Keep up with Data Growth in Distributed Storage
Expander Code: A Scalable Erasure-Resilient Code to Keep up ...
收藏 引用
IEEE International Performance computing and Communication Conference
作者: Guangping Xu Sheng Lin Hua Zhang Xing Guo Kai Shit Computer and Communication Engineering School Tianjin University of Technology Tianjin China 300384 Tianjin Key Lab. of Intelligence Computing and New Software Technology Tianjin China 300384
To ensure high reliability and storage efficiency, erasure codes are preferred in storage systems. With the prevalent of distributed storage systems such as clouds storage, how to design a scalab.e and efficient erasu... 详细信息
来源: 评论
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jishen Tan, Shunquan Liu, Guangqing Li, Bin Huang, Jiwu Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Peng Cheng Laboratory Shenzhen518052 China
Until recently, deep steganalyzers in spatial domain have been all designed for gray-scale images. In this paper, we propose WISERNet (the wider separate-then-reunion network) for steganalysis of color images. We prov... 详细信息
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论
A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains
A Reinforcement Learning Based Approach for 5G Network Slici...
收藏 引用
International Conference on Network and Service Management
作者: Godfrey Kibalya Joan Serrat Juan-Luis Gorricho Rafael Pasquini Haipeng Yao Peiying Zhang Dept. Network Engineering Universitat Politecnica de Catalunya Barcelona Spain Computing Faculty Federal University of Uberlandia Uberlandia Brazil State key Lab. of Networking and Switching Technology Beinjing University of Posts and Telecommunications Beijing China College of Computer and Communication Engineering China University of Petroleum (East China) Qingdao China
Network Function Virtualization (NFV) and Machine Learning (ML) are envisioned as possible techniques for the realization of a flexible and adaptive 5G network. ML will provide the network with experiential intelligen... 详细信息
来源: 评论
Federated Reinforcement Learning for Electric Vehicles Charging Control on Distribution Networks
arXiv
收藏 引用
arXiv 2023年
作者: Qian, Junkai Jiang, Yuning Liu, Xin Wang, Qiong Wang, Ting Shi, Yuanming Chen, Wei The MoE Engineering Research Center of Software/Hardware Co-design Technology and Application The Shanghai Key Lab. of Trustworthy Computing East China Normal University China The Automatic Control Laboratory EPFL Switzerland The School of Information Science and Technology ShanghaiTech University China The State Grid Beijing Electric Power Company China The Department of Electronic Engineering Tsinghua University China
With the growing popularity of electric vehicles (EVs), maintaining power grid stability has become a significant challenge. To address this issue, EV charging control strategies have been developed to manage the swit... 详细信息
来源: 评论
Research on adaptive strategy for end-hopping system
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 51-57页
作者: Zhao, Chun-Lei Jia, Chun-Fu Weng, Chen Lin, Kai College of Information Technical Science Nankai University Tianjin 300071 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st... 详细信息
来源: 评论
Dynamic-Sensitive centrality of nodes in temporal networks
收藏 引用
Scientific Reports 2017年 第1期7卷 41454-41454页
作者: Huang, Da-Wen Yu, Zu-Guo Key Laboratory of Intelligent Computing Info. Proc. of Min. of Educ. and Hunan Key Lab. for Computation and Simulat. in Sci. and Engineering Xiangtan University Xiangtan Hunan 411105 China School of Mathematical Sciences Queensland University of Technology GPO Box 2434 Brisbane Q4001 Australia
Locating influential nodes in temporal networks has attracted a lot of attention as data driven and diverse applications. Classic works either looked at analysing static networks or placed too much emphasis on the top...
来源: 评论
The Minority Matters: A Diversity-Promoting Collab.rative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
Generalized Face Forgery Detection via Adaptive Learning for Pre-trained Vision Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. The School of Information Technology Jiangxi University of Finance and Economics Nanchang330013 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Lab. School of Electrical and Electronic Engineering Nanyang Technology University Singapore The Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The China-Singapore International Joint Research Institute Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
A Quantum Probability Driven Framework for Joint Multi-Modal Sarcasm, Sentiment and Emotion Analysis
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Yaochen Zhang, Yazhou Song, Dawei School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China School of Computing and Communications The Open University Walton Hall United Kingdom School of Nursing The Hong Kong Polytechnic University Hong Kong Ministry of Education China Artificial Intelligence Laboratory China Mobile Communication Group Tianjin Co. Ltd. China State Key Lab. for Novel Software Technology Nanjing University Nanjing China Zhengzhou University of Light Industry China
Sarcasm, sentiment, and emotion are three typical kinds of spontaneous affective responses of humans to external events and they are tightly intertwined with each other. Such events may be expressed in multiple modali... 详细信息
来源: 评论