咨询与建议

限定检索结果

文献类型

  • 213 篇 会议
  • 140 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 251 篇 工学
    • 144 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 51 篇 控制科学与工程
    • 49 篇 信息与通信工程
    • 39 篇 机械工程
    • 31 篇 电气工程
    • 29 篇 交通运输工程
    • 26 篇 电子科学与技术(可...
    • 19 篇 仪器科学与技术
    • 19 篇 生物工程
    • 14 篇 化学工程与技术
    • 9 篇 光学工程
    • 9 篇 网络空间安全
    • 7 篇 公安技术
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 4 篇 石油与天然气工程
    • 4 篇 安全科学与工程
  • 108 篇 理学
    • 63 篇 数学
    • 22 篇 系统科学
    • 19 篇 生物学
    • 17 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 13 篇 化学
    • 3 篇 大气科学
  • 65 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 9 篇 法学
    • 7 篇 社会学
  • 4 篇 医学
  • 4 篇 军事学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 16 篇 semantics
  • 13 篇 feature extracti...
  • 13 篇 training
  • 10 篇 data models
  • 9 篇 predictive model...
  • 8 篇 deep learning
  • 8 篇 task analysis
  • 7 篇 computational mo...
  • 6 篇 throughput
  • 6 篇 recommender syst...
  • 6 篇 optimization
  • 6 篇 data mining
  • 5 篇 learning systems
  • 5 篇 random access me...
  • 5 篇 image classifica...
  • 5 篇 estimation
  • 5 篇 measurement
  • 4 篇 reliability
  • 4 篇 scalability
  • 4 篇 support vector m...

机构

  • 71 篇 college of compu...
  • 62 篇 key laboratory o...
  • 53 篇 college of autom...
  • 40 篇 key laboratory o...
  • 30 篇 school of softwa...
  • 28 篇 key laboratory o...
  • 25 篇 school of big da...
  • 23 篇 school of automa...
  • 21 篇 ministry of educ...
  • 17 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 10 篇 key laboratory o...
  • 9 篇 school of automa...
  • 7 篇 college of commu...
  • 7 篇 key laboratory o...
  • 7 篇 college of compu...
  • 7 篇 school of big da...
  • 6 篇 chongqing univer...
  • 5 篇 college of softw...
  • 5 篇 the key laborato...

作者

  • 23 篇 sun dihua
  • 21 篇 zhao min
  • 15 篇 huang sheng
  • 15 篇 dan yang
  • 14 篇 shan liang
  • 13 篇 meng yan
  • 12 篇 xiong qingyu
  • 12 篇 xiaohong zhang
  • 12 篇 zhang xiaohong
  • 11 篇 ling xu
  • 10 篇 gao min
  • 10 篇 zhong jiang
  • 10 篇 min zhao
  • 10 篇 liu weining
  • 10 篇 zheng linjiang
  • 10 篇 qingyu xiong
  • 9 篇 linjiang zheng
  • 9 篇 feng yong
  • 9 篇 qingfeng zhuge
  • 9 篇 xiwang dong

语言

  • 329 篇 英文
  • 17 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Dependable Service Computing in Cyber"
353 条 记 录,以下是41-50 订阅
排序:
Optimal Linear Crossover for Mitigating Negative Transfer in Evolutionary Multitasking
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Liu, Zhaobo Yuan, Jianhua Zhang, Haili Zeng, Tao Zhu, Zexuan Shenzhen University Institute for Advanced Study Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Shenzhen Polytechnic University School of Undergraduate Education Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University Shenzhen City Key Laboratory of Embedded System Design Shenzhen518060 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of China Chongqing400044 China
Evolutionary multitasking algorithms use information exchange among individuals in a population to solve multiple optimization problems simultaneously. Negative transfer is a critical factor that affects the performan... 详细信息
来源: 评论
Learning Robust Travel Preferences Via Check-In Masking for Next Poi Recommendation
SSRN
收藏 引用
SSRN 2023年
作者: Duan, Chenghua Zhou, Wei Zeng, Jun Zhang, Yihao Wen, Junhao School of Bigdata and Software Engineering Chongqing University Daxuecheng South Rd. 55 Chognqing400044 China Key Laboratory of Dependable Service Computing in Cyber Physical Society Moe Chognqing400044 China School of Artificial Intelligence Chongqing University of Technology Chognqing401135 China
Next point-of-interest (POI) recommendation is a crucial part of many location-based service applications. It predicts users’ next visit based on their historical trajectories and current *** solutions primarily focu... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle Networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
QDL: Quantitative Dynamic Latency Model in Permissioned Blockchain System  22
QDL: Quantitative Dynamic Latency Model in Permissioned Bloc...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Wei, Jiacheng Wang, Qingmei Wang, Zheng Beihang University School of Artificial Intelligence Beijing China Beihang University Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing China University of Science and Technology Beijing National Center for Materials Service Safety Beijing China Shanghai Jiao Tong University Institute of Cyber Science and Technology China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security China
Latency, as a critical attribute influencing scalability and consistency in blockchain systems, has attracted significant research attention. This paper addresses the issue of latency evaluation by presenting a novel ... 详细信息
来源: 评论
Anchor-Based Discriminative Dual Distribution Calibration for Transductive Zero-Shot Learning
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Yi Huang, Sheng Yang, Wanli Tang, Wenhao Zhang, Xiaohong Yang, Dan School of Big Data and Software Engineering Chongqing University No.55 Daxuecheng South Rd. Chongqing Shapingba401331 China Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University No.174 Shazhengjie Chongqing Shapingba400044 China
Zero-shot learning (ZSL) is machine learning task to recognize samples from classes that are not observed during training. Transductive ZSL (TZSL) is a more realistic and effective paradigm that leverages unlabeled un... 详细信息
来源: 评论
Privacy-Preserving Push-Pull Method for Decentralized Optimization via State Decomposition
arXiv
收藏 引用
arXiv 2023年
作者: Cheng, Huqiang Liao, Xiaofeng Li, Huaqing Zhao, You Key Laboratory of Dependable Services Computing in Cyber Physical Society Ministry of Education College of Computer Science Chongqing University Chongqing400044 China Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing College of Electronic and Information Engineering Southwest University Chongqing400715 China
Distributed optimization is manifesting great potential in multiple fields, e.g., machine learning, control, and resource allocation. Existing decentralized optimization algorithms require sharing explicit state infor... 详细信息
来源: 评论
TKCA:a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
收藏 引用
cybersecurity 2021年 第1期4卷 177-192页
作者: Lulu Yang Chen Li Ruibang You Bibo Tu Linghui Li Institute of Information Engineering Chinese Academy of Sciences100093 BeijingChina School of Cyber Security University of Chinese Academy of Sciences100049 BeijingChina Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications100876 BeijingChina
keystroke-based behavioral biometrics have been proven effective for continuous user *** state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some *** remains a c... 详细信息
来源: 评论
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection
TGCN-DA: A Temporal Graph Convolutional Network with Data Au...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Ximing Li Linghui Li Xiaoyong Li Binsi Cai Bingyu Li Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Cyber Science and Technology Beihang University Beijing China
Insider threats present a formidable challenge to cybersecurity, as insiders possess the privileges and information necessary to execute diverse attacks. A comprehensive analysis of user behavior, including behavioral... 详细信息
来源: 评论
A Joint Framework for Knowledge Extraction from Flight Training Comments  17th
A Joint Framework for Knowledge Extraction from Flight Tra...
收藏 引用
17th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2022
作者: Zhang, Yuxuan Shang, Jiaxing Zheng, Linjiang Wu, Quanwang Cao, Weiwei Sun, Hong College of Computer Science Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing University Chongqing China Key Laboratory of Flight Techniques and Flight Safety Civil Aviation Flight University of China Guanghan China Flight Technology and Flight Safety Research Base Civil Aviation Flight University of China Guanghan China
The flight training comments are textual evaluation from the instructor to the flight training students. Extracting the assessment experience and knowledge from the flight training comments can help improve the flight... 详细信息
来源: 评论
Modeling Method for Sampling Zeros of Sampled-data System with Time Delay in Generalized Sample Hold
收藏 引用
IFAC-PapersOnLine 2023年 第2期56卷 9799-9805页
作者: Minghui Ou Shan Liang Zhiyong Yang Zhenjie Yan Zhiyong Li School of Big Data and Internet of Things Chongqing Vocational Institute of Engineering Chongqing 402260 PR China College of Automation Chongqing University Chongqing 400044 PR China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing 400044 PR China. School of Electrical Engineering Southwest Jiaotong University Chengdu 611756 PR China
Unstable zeros are widely known to dramatically curb the performance of controllers and the direct applications of several control algorithms. Time delay is a crucial research topic due to the prevalence of communicat... 详细信息
来源: 评论