咨询与建议

限定检索结果

文献类型

  • 213 篇 会议
  • 140 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 251 篇 工学
    • 144 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 51 篇 控制科学与工程
    • 49 篇 信息与通信工程
    • 39 篇 机械工程
    • 31 篇 电气工程
    • 29 篇 交通运输工程
    • 26 篇 电子科学与技术(可...
    • 19 篇 仪器科学与技术
    • 19 篇 生物工程
    • 14 篇 化学工程与技术
    • 9 篇 光学工程
    • 9 篇 网络空间安全
    • 7 篇 公安技术
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 4 篇 石油与天然气工程
    • 4 篇 安全科学与工程
  • 108 篇 理学
    • 63 篇 数学
    • 22 篇 系统科学
    • 19 篇 生物学
    • 17 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 13 篇 化学
    • 3 篇 大气科学
  • 65 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 9 篇 法学
    • 7 篇 社会学
  • 4 篇 医学
  • 4 篇 军事学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 16 篇 semantics
  • 13 篇 feature extracti...
  • 13 篇 training
  • 10 篇 data models
  • 9 篇 predictive model...
  • 8 篇 deep learning
  • 8 篇 task analysis
  • 7 篇 computational mo...
  • 6 篇 throughput
  • 6 篇 recommender syst...
  • 6 篇 optimization
  • 6 篇 data mining
  • 5 篇 learning systems
  • 5 篇 random access me...
  • 5 篇 image classifica...
  • 5 篇 estimation
  • 5 篇 measurement
  • 4 篇 reliability
  • 4 篇 scalability
  • 4 篇 support vector m...

机构

  • 71 篇 college of compu...
  • 62 篇 key laboratory o...
  • 53 篇 college of autom...
  • 40 篇 key laboratory o...
  • 30 篇 school of softwa...
  • 28 篇 key laboratory o...
  • 25 篇 school of big da...
  • 23 篇 school of automa...
  • 21 篇 ministry of educ...
  • 17 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 10 篇 key laboratory o...
  • 9 篇 school of automa...
  • 7 篇 college of commu...
  • 7 篇 key laboratory o...
  • 7 篇 college of compu...
  • 7 篇 school of big da...
  • 6 篇 chongqing univer...
  • 5 篇 college of softw...
  • 5 篇 the key laborato...

作者

  • 23 篇 sun dihua
  • 21 篇 zhao min
  • 15 篇 huang sheng
  • 15 篇 dan yang
  • 14 篇 shan liang
  • 13 篇 meng yan
  • 12 篇 xiong qingyu
  • 12 篇 xiaohong zhang
  • 12 篇 zhang xiaohong
  • 11 篇 ling xu
  • 10 篇 gao min
  • 10 篇 zhong jiang
  • 10 篇 min zhao
  • 10 篇 liu weining
  • 10 篇 zheng linjiang
  • 10 篇 qingyu xiong
  • 9 篇 linjiang zheng
  • 9 篇 feng yong
  • 9 篇 qingfeng zhuge
  • 9 篇 xiwang dong

语言

  • 329 篇 英文
  • 17 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Dependable Service Computing in Cyber"
353 条 记 录,以下是111-120 订阅
排序:
Hybrid attention network based on progressive embedding scale-context for crowd counting
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Fusen Sang, Jun Wu, Zhongyuan Liu, Qi Sang, Nong Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing400044 China School of Big Data and Software Engineering Chongqing University Chongqing401331 China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430000 China
The existing crowd counting methods usually adopted attention mechanism to tackle background noise, or applied multi-level features or multi-scales context fusion to tackle scale variation. However, these ap- proaches... 详细信息
来源: 评论
Plot2API: Recommending graphic API from plot via semantic parsing guided neural network
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Zeyu Huang, Sheng Liu, Zhongxin Yan, Meng Xia, Xin Wang, Bei Yang, Dan Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science and Technology Zhejiang University Hangzhou China Faculty of Information Technology Monash University Australia Pengcheng Laboratory Shenzhen China
Plot-based Graphic API recommendation (Plot2API) is an unstudied but meaningful issue, which has several important applications in the context of software engineering and data visualization, such as the plotting guida... 详细信息
来源: 评论
Sanitizable signature scheme with privacy protection for electronic medical data sharing
Cyber Security and Applications
收藏 引用
cyber Security and Applications 2023年 1卷
作者: Xu, Zhiyan Luo, Min Peng, Cong Feng, Qi The Hubei Education Cloud Service Engineering Technology Research Center College of Computer Hubei University of Education Hubei province Wuhan 430205 China The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei province Wuhan 430072 China
Electronic medicine has received more and more attention because of its ability to provide more efficient and better medical services. However, the characteristics of electronic medical networks make them more vulnera... 详细信息
来源: 评论
Improving Log-Based Anomaly Detection with Component-Aware Analysis
Improving Log-Based Anomaly Detection with Component-Aware A...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Kun Yin Meng Yan Ling Xu Zhou Xu Zhao Li Dan Yang Xiaohong Zhang Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education China School of Big Data & Software Engineering Chongqing University China
Logs are universally available in software systems for troubleshooting. They record system run-time states and messages of system activities. Log analysis is an effective way to diagnosis system exceptions, but it wil... 详细信息
来源: 评论
SCARE of Secret Ciphers under Rough Leakage Model
收藏 引用
Security and Communication Networks 2023年 第1期2023卷
作者: Wang, Mengxing Tang, Ming Zhang, Xige Chen, Qi Ding, Haili Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430000 China Beijing Smartchip Microelectronics Technology Co. Ltd. Beijing100192 China Marketing Service Center State Grid Electric Power Co. Ltd. Ningxia750002 China
Most previousside-channel analysis-based reverse engineering (SCARE) methods were based on collision attack. However, the collision-based methods generally need noise-free traces and can hardly be verified by realisti... 详细信息
来源: 评论
Research on water quality prediction based on SARIMA-LSTM: A case study of beilun estuary  21
Research on water quality prediction based on SARIMA-LSTM: A...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Xu, Rui Xiong, Qingyu Yi, Hualing Wu, Chao Ye, Jianxin Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education School of Big Data AND Software Engineering Chongqing University Chongqing China
As water environment is an important part of mangrove ecosystem, an efficient prediction of water quality is the foundation for judging the health of wetland ecosystem. And it also contributes a lot to the smooth deve... 详细信息
来源: 评论
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
收藏 引用
Wireless Communications and Mobile computing 2021年 第1期2021卷
作者: Liu, Suhui Yu, Jiguo Hu, Chunqiang Li, Mengmeng School of Computer Science Qufu Normal University Rizhao Shandong276826 China Jinan Shandong250353 China Jinan Shandong250014 China Shandong Laboratory of Computer Networks Jinan250014 China School of Big Data and Software Engineering Chongqing University Chongqing400044 China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing University China
Cloud-assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their data for high efficient management. Unfortunately, some unsettled security issues dramatically impact the popularity of I... 详细信息
来源: 评论
Multi-Grained Selection and Fusion for Fine-Grained Image Representation
Multi-Grained Selection and Fusion for Fine-Grained Image Re...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jianrong Jiang Hongxing Wang Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education China School of Big Data & Software Engineering Chongqing University Chongqing China
How to learn a good fine-grained image representation is a key problem for fine-grained tasks. Most previous supervised methods suffer from insufficient training data, which require laborious annotations of fine-grain... 详细信息
来源: 评论
Estimating Origin-Destination Flows Using Radio Frequency Identification Data  13th
Estimating Origin-Destination Flows Using Radio Frequency Id...
收藏 引用
13th International Conference on Green, Pervasive, and Cloud computing, GPC 2018
作者: Chen, Chaoxiong Zheng, Linjiang Cui, Chen Liu, Weining Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education Chongqing400030 China College of Computer Science Chongqing University Chongqing400030 China
The origin-destination (OD) demand is a critical information source used in the traffic strategic planning and management. The Radio Frequency Identification (RFID) is an advanced technique to collect traffic data. In... 详细信息
来源: 评论
CTF-Net: Retinal Vessel Segmentation via Deep Coarse-To-Fine Supervision Network
CTF-Net: Retinal Vessel Segmentation via Deep Coarse-To-Fine...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Kun Wang Xiaohong Zhang Sheng Huang Qiuli Wang Feiyu Chen School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing University Chongqing China
Retinal blood vessels structure plays an important role in the early diagnosis of diabetic retinopathy, which is a cause of blindness globally. However, the precise segmentation of retinal vessels is often extremely c... 详细信息
来源: 评论