咨询与建议

限定检索结果

文献类型

  • 360 篇 会议
  • 168 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 331 篇 工学
    • 232 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 58 篇 电子科学与技术(可...
    • 57 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 34 篇 电气工程
    • 32 篇 机械工程
    • 19 篇 生物工程
    • 16 篇 材料科学与工程(可...
    • 15 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 12 篇 网络空间安全
    • 10 篇 交通运输工程
    • 9 篇 仪器科学与技术
    • 9 篇 生物医学工程(可授...
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 6 篇 冶金工程
  • 136 篇 理学
    • 68 篇 数学
    • 28 篇 物理学
    • 26 篇 系统科学
    • 22 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 13 篇 化学
  • 69 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 14 篇 医学
    • 12 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 3 篇 法学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 57 篇 computer archite...
  • 34 篇 laboratories
  • 29 篇 delay
  • 24 篇 circuit faults
  • 22 篇 hardware
  • 20 篇 circuit testing
  • 20 篇 costs
  • 19 篇 bandwidth
  • 18 篇 clocks
  • 16 篇 protocols
  • 16 篇 system testing
  • 16 篇 microprocessors
  • 14 篇 throughput
  • 14 篇 computational mo...
  • 13 篇 routing
  • 13 篇 wireless sensor ...
  • 13 篇 automatic test p...
  • 13 篇 computer network...
  • 12 篇 fault tolerance
  • 12 篇 petri nets

机构

  • 88 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 34 篇 institute of com...
  • 31 篇 key laboratory o...
  • 31 篇 graduate univers...
  • 30 篇 national enginee...
  • 30 篇 chinese academy ...
  • 22 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 17 篇 department of el...
  • 16 篇 chinese academy ...
  • 16 篇 guangdong provin...
  • 14 篇 graduate univers...
  • 13 篇 university of ch...
  • 13 篇 department of el...
  • 12 篇 shenzhen institu...
  • 11 篇 department of co...
  • 11 篇 key laboratory o...
  • 10 篇 chinese academy ...
  • 10 篇 loongson technol...

作者

  • 51 篇 xiaowei li
  • 31 篇 huawei li
  • 30 篇 zhou mengchu
  • 24 篇 li xiaowei
  • 23 篇 shen linlin
  • 21 篇 yu hu
  • 18 篇 yinhe han
  • 16 篇 mengchu zhou
  • 15 篇 dongrui fan
  • 14 篇 weiwu hu
  • 14 篇 changjun jiang
  • 12 篇 cheng wang
  • 12 篇 xiang-yang li
  • 12 篇 li huawei
  • 12 篇 hu yu
  • 11 篇 sun ninghui
  • 11 篇 han yinhe
  • 10 篇 jiang changjun
  • 9 篇 yuzhong sun
  • 9 篇 ninghui sun

语言

  • 457 篇 英文
  • 51 篇 其他
  • 21 篇 中文
检索条件"机构=Key Laboratory of Computer System and Architeture Institute of Computing Technology"
529 条 记 录,以下是11-20 订阅
排序:
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching  39
DAMPER: A Dual-Stage Medical Report Generation Framework wit...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Faizan Ayub, Muhammad Li, Xiong Mahmood, Khalid Shamshad, Salman Kumar Das, Ashok Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart grids (SGs) rely on home area networks (HANs) and neighborhood area networks (NANs) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these a... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Evolutionary Reinforcement Learning via Cooperative Coevolution  27
Evolutionary Reinforcement Learning via Cooperative Coevolut...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Hu, Chengpeng Liu, Jialin Yao, Xin Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Research Institute of Trustworthy Autonomous System Southern University of Science and Technology Shenzhen China Department of Computing and Decision Sciences Lingnan University Hong Kong
Recently, evolutionary reinforcement learning has obtained much attention in various *** a population of actors, evolutionary reinforcement learning utilises the collected experiences to improve the behaviour policy t... 详细信息
来源: 评论
Prototype Guided Personalized Federated Intrusion Detection system  10
Prototype Guided Personalized Federated Intrusion Detection ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Cheng, Long Yan, Huiru Zhou, Hanlin Wang, Ying Tang, Haichuan Fang, Fang North China Electric Power University State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Ai Lab of Crrc Academy Beijing China
Preventing network attacks and protecting user privacy are consistently hot research topics in the Internet of Things (IoT) and edge computing fields. Recent advancements in Federated Learning (FL) have shown promise ... 详细信息
来源: 评论
Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第2期4卷 268-281页
作者: Tian, Ye Pan, Jingwen Yang, Shangshang Zhang, Xingyi He, Shuping Jin, Yaochu Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230088 China Anhui University School of Computer Science and Technology Hefei230601 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection  39
Look Inside for More: Internal Spatial Modality Perception f...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Domain knowledge discovery from abstracts of scientific literature on Nickel-based single crystal superalloys
收藏 引用
Science China(Technological Sciences) 2023年 第6期66卷 1815-1830页
作者: LIU Yue DING Lin YANG ZhengWei GE XianYuan LIU DaHui LIU Wei YU Tao AVDEEV Maxim SHI SiQi School of Computer Engineering and Science Shanghai UniversityShanghai 200444China Shanghai Engineering Research Center of Intelligent Computing System Shanghai 200444China State Key Laboratory of Advanced Special Steel&Shanghai Key Laboratory of Advanced Ferrometallurgy&School of Materials Science and Engineering Shanghai UniversityShanghai 200444China Materials Genome Institute Shanghai UniversityShanghai 200444China Institute of Functional Materials Central Iron&Steel Research InstituteBeijing 100081China Australian Nuclear Science and Technology Organisation Locked Bag 2001Kirrawee DC NSW 2232Australia School of Chemistry The University of SydneySydney 2006Australia Zhejiang Laboratory Hangzhou 311100China
Despite the huge accumulation of scientific literature,it is inefficient and laborious to manually search it for useful information to investigate structure-activity ***,we propose an efficient text-mining framework f... 详细信息
来源: 评论
HairDiffusion: vivid multi-colored hair editing via latent diffusion  24
HairDiffusion: vivid multi-colored hair editing via latent d...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Yu Zeng Yang Zhang Jiachen Liu Linlin Shen Kaijun Deng Weizhao He Jinbao Wang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University and Shenzhen Institute of Artificial Intelligence and Robotics for Society and National Engineering Laboratory for Big Data System Computing Technology Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University and Guangdong Provincial Key Laboratory of Intelligent Information Processing
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论