咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 223 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 424 篇 工学
    • 267 篇 计算机科学与技术...
    • 200 篇 软件工程
    • 90 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 46 篇 电子科学与技术(可...
    • 42 篇 电气工程
    • 38 篇 机械工程
    • 32 篇 交通运输工程
    • 32 篇 生物工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 14 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 8 篇 冶金工程
  • 210 篇 理学
    • 145 篇 数学
    • 43 篇 系统科学
    • 36 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 13 篇 化学
  • 130 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 12 篇 医学
    • 10 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 20 篇 feature extracti...
  • 15 篇 web services
  • 14 篇 training
  • 12 篇 support vector m...
  • 10 篇 roads
  • 10 篇 data mining
  • 10 篇 graph neural net...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 optimization
  • 9 篇 computational mo...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...
  • 8 篇 system recovery
  • 8 篇 rough set theory
  • 7 篇 information syst...

机构

  • 120 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 52 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 the key laborato...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 37 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 23 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 miao duoqian
  • 17 篇 wang hanli
  • 16 篇 wang cheng
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 liu guanjun
  • 10 篇 yaying zhang

语言

  • 561 篇 英文
  • 26 篇 中文
  • 12 篇 其他
检索条件"机构=Key Laboratory of Embedded System and Service Computing Tongji University"
596 条 记 录,以下是91-100 订阅
排序:
A credible individual behavior profiling method for online payment fraud detection  21
A credible individual behavior profiling method for online p...
收藏 引用
4th International Conference on Data Storage and Data Engineering, DSDE 2021
作者: Cui, Jipeng Yan, Chungang Wang, Cheng Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science and Engineering Tongji University China
Online payment fraud detection relies on a credible characterization of individual behaviors. Existing individual behavior profiling methods have three problems in credibility. Firstly, they solely regard users as ind... 详细信息
来源: 评论
A Biometric-Based User Authentication for Wireless Sensor Networks
收藏 引用
Wuhan university Journal of Natural Sciences 2010年 第3期15卷 272-276页
作者: YUAN Jianjun JIANG Changjun JIANG Zuowen School of Electronics and Information Engineering Tongji University / Key Laboratory of Embedded System and Service Computing of Ministry of Education Shanghai 201804 China
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. Th... 详细信息
来源: 评论
A service selection method based on web service clusters
收藏 引用
Journal of Applied Sciences 2013年 第24期13卷 5734-5738页
作者: Liu, Wei Du, Yu-Yue Yan, Chun College of Information Science and Engineering Shandong University of Science and Technology 266590 Qingdao China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University 200092 Shanghai China
service selection is an essential issue in service discovery based on Web service clusters. The ratio of trust value to price is introduced to select the most suitable service in a cluster. The method of computing the... 详细信息
来源: 评论
Non-intrusive load disaggregation using semi-supervised learning method
Non-intrusive load disaggregation using semi-supervised lear...
收藏 引用
2019 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2019
作者: Miao, Nan Zhao, Shengjie Shi, Qingjiang Zhang, Rongqing Tongji University Key Laboratory of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University Sch. of Software Eng. the Key Lab. of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University School of Software Engineering Shanghai China
With the emerging of smart metering around the world, there is a growing demand to analyse the residential energy usage. In this paper, we propose a Deep Neural Network (DNN)-based approach for non-intrusive load moni... 详细信息
来源: 评论
Spatial-Temporal Dynamic Graph Diffusion Convolutional Network for Traffic Flow Forecasting
Spatial-Temporal Dynamic Graph Diffusion Convolutional Netwo...
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Li, Yang Zhang, Yaying Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education China Shanghai Artificial Intelligence Laboratory Shanghai China
Traffic forecasting plays a crucial role in intelligent transportation systems and finds application in various domains. Accurate traffic forecasting remains challenging due to the time-varying correlations within the...
来源: 评论
Low-rate non-intrusive appliance load monitoring based on graph signal processing
Low-rate non-intrusive appliance load monitoring based on gr...
收藏 引用
2019 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2019
作者: Zhang, Bing Zhao, Shengjie Shi, Qingjiang Zhang, Rongqing Tongji University Key Laboratory of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University Sch. of Software Eng. the Key Lab. of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University School of Software Engineering Shanghai China
Thanks to the large-scale smart meters deployments around the world, non-intrusive appliance load monitoring (NILM) is receiving popularity. It aims to disaggregate the total electricity load of a home into individual... 详细信息
来源: 评论
A Novel Mutual Information based Ant Colony Classifier  5
A Novel Mutual Information based Ant Colony Classifier
收藏 引用
2017 International Conference on Progress in Informatics and computing(PIC)
作者: Hang Yu Xiaoxiao Qian Yang Yu Jiujun Cheng Ying Yu Shangce Gao College of Computer Science and Technology Taizhou University Faculty of Engineering University of Toyama Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University
By constructing a list of IF-THEN rules, the traditional ant colony optimization(ACO) has been successfully applied on data classification with not only a promising accuracy but also a user comprehensibility. However,... 详细信息
来源: 评论
Learning how to avoiding obstacles for end-to-end driving with conditional imitation learning  2
Learning how to avoiding obstacles for end-to-end driving wi...
收藏 引用
2nd International Conference on Signal Processing and Machine Learning, SPML 2019
作者: Zhang, Enwei Zhou, Hongtu Ding, Yongchao Zhao, Junqiao Ye, Chen Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University School of Electronics and Information Engineering Shanghai China
Obstacle avoiding is one of the most complex tasks for autonomous driving systems, which was also ignored by many cutting-edge end-to-end learning-based methods. The difficulties stem from the integrated process of de... 详细信息
来源: 评论
On complementary effect of blended behavioral analysis for identity theft detection in mobile social networks  1
收藏 引用
13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017
作者: Wang, Cheng Luo, Jing Yang, Bo Jiang, Changjun Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science and Technology Tongji University Shanghai China
User behavioral analysis is expected to act as a promising technique for identity theft detection in the Internet. The performance of this paradigm extremely depends on a good individual-level user behavioral model. S... 详细信息
来源: 评论
An Effective Principal Curves Extraction Algorithm for Complex Distribution Dataset  1
收藏 引用
5th International Conference on Rough Set and Knowledge Technology (RSKT)
作者: Zhang, Hongyun Miao, Duoqian Sun, Lijun Ye, Ying The Key Laboratory of Embedded System and Service Computing Ministry of Education China Tongji University Shanghai 201804 China School of Electronic and Information Engineering Tongji University Shanghai 201804 China
This paper proposes a new method for finding principal curves from complex distribution dataset. Motivated by solving the problem, which is that existing methods did not perform well on finding principal curve in comp... 详细信息
来源: 评论