咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 202 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 501 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 366 篇 工学
    • 225 篇 计算机科学与技术...
    • 170 篇 软件工程
    • 74 篇 信息与通信工程
    • 70 篇 控制科学与工程
    • 36 篇 机械工程
    • 35 篇 电气工程
    • 35 篇 电子科学与技术(可...
    • 31 篇 交通运输工程
    • 28 篇 生物工程
    • 14 篇 仪器科学与技术
    • 14 篇 安全科学与工程
    • 11 篇 动力工程及工程热...
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 10 篇 光学工程
    • 7 篇 材料科学与工程(可...
  • 172 篇 理学
    • 125 篇 数学
    • 34 篇 系统科学
    • 31 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 20 篇 物理学
    • 9 篇 化学
  • 108 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 22 篇 法学
    • 20 篇 社会学
  • 11 篇 医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 21 篇 petri nets
  • 14 篇 web services
  • 12 篇 feature extracti...
  • 11 篇 training
  • 10 篇 data mining
  • 9 篇 graph neural net...
  • 8 篇 conferences
  • 8 篇 throughput
  • 8 篇 rough set theory
  • 7 篇 information syst...
  • 7 篇 support vector m...
  • 7 篇 lattices
  • 7 篇 laboratories
  • 7 篇 mapreduce
  • 7 篇 computational mo...
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 6 篇 roads
  • 6 篇 vectors
  • 6 篇 schedules

机构

  • 121 篇 key laboratory o...
  • 78 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 department of co...
  • 11 篇 key laboratory o...
  • 10 篇 school of engine...
  • 10 篇 school of softwa...
  • 9 篇 department of co...
  • 9 篇 ieee
  • 9 篇 key laboratory o...
  • 8 篇 school of electr...
  • 8 篇 college of compu...
  • 7 篇 college of infor...
  • 7 篇 department of co...

作者

  • 31 篇 changjun jiang
  • 30 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 20 篇 cheng wang
  • 19 篇 yan chungang
  • 18 篇 ding zhijun
  • 16 篇 wang cheng
  • 16 篇 wang hanli
  • 13 篇 li maozhen
  • 13 篇 mengchu zhou
  • 13 篇 miao duoqian
  • 13 篇 chungang yan
  • 12 篇 liu xiwei
  • 11 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 10 篇 liu guanjun
  • 10 篇 shengjie zhao
  • 10 篇 zhao junqiao
  • 9 篇 xiwei liu
  • 9 篇 liu yang

语言

  • 473 篇 英文
  • 21 篇 中文
  • 10 篇 其他
检索条件"机构=Key Laboratory of Embedded System and Service Computing of Ministry of Education"
501 条 记 录,以下是21-30 订阅
OpenDrift: Online Evolving Fraud Detection for Open-Category and Concept-Drift Transactions
OpenDrift: Online Evolving Fraud Detection for Open-Category...
收藏 引用
2023 IEEE International Conference on Web services, ICWS 2023
作者: Wang, Cheng Chai, Songyao Zhu, Hangyu Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China Shanghai Artificial Intelligence Laboratory Shanghai China
The rapid growth of electronic commerce brings convenience to modern life but comes with security risks by various cybercrimes in online payment services. Most existing security methods for fraud detection depend on t... 详细信息
来源: 评论
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
ST-ReP: Learning Predictive Representations Efficiently for Spatial-Temporal Forecasting
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Qi Yao, Zihao Zhang, Yaying The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China
Spatial-temporal forecasting is crucial and widely applicable in various domains such as traffic, energy, and climate. Benefiting from the abundance of unlabeled spatial-temporal data, self-supervised methods are incr... 详细信息
来源: 评论
A Better Cardinality Estimator with Fewer Bits, Constant Update Time, and Mergeability  42
A Better Cardinality Estimator with Fewer Bits, Constant Upd...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Du, Yang Huang, He Sun, Yu-E Li, Kejian Zhang, Boyu Gao, Guoju Soochow University School of Computer Science and Technology Suzhou China Soochow University School of Rail Transportation Suzhou China Ministry of Education Key Laboratory of Embedded System and Service Computing Shanghai China
Cardinality estimation is a fundamental problem with diverse practical applications. HyperLogLog (HLL) has become a standard in practice because it offers good memory efficiency, constant update time, and mergeability... 详细信息
来源: 评论
Meta-Heuristic Based Multipath Joint Routing and Scheduling of Time-Triggered Traffic for Time-Sensitive Networking in IIoT  2
Meta-Heuristic Based Multipath Joint Routing and Scheduling ...
收藏 引用
2nd International Conference on Green Communication, Network, and Internet of Things, CNIoT 2022
作者: Chen, Chen Li, Zhong The College of Information Science and Technology Donghua University Shanghai201620 China The Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Time-Sensitive networking (TSN) meets the needs of industrial internet of things (IIoT). It solves the challenges of deterministic transmission and reliable communication of time sensitive data streams. Traffic schedu... 详细信息
来源: 评论
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Attack Detection Method in Vehicular Networks  3
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Atta...
收藏 引用
3rd International Seminar on Artificial Intelligence, Networking, and Information Technology, AINIT 2022
作者: Luo, Jie Li, Zhong College of Information Science and Technology Donghua University Shanghai201620 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Vehicular networks improve traffic safety and efficiency by wireless communications among vehicles and infrastructures. However, security has always been a challenge to vehicular networks, which may cause severe harm ... 详细信息
来源: 评论
Information Security Evaluation by Information Flow Analysis Based on Stochastic Petri Nets
Information Security Evaluation by Information Flow Analysis...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Tu, Hanqian Xiang, Dongming Lin, Wang Liu, Guanjun Zhejiang Sci-Tech University Department of Computer Science and Technology Hangzhou310018 China Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Shanghai201804 China
The Petri-net-based information flow analysis offers an effective approach for detecting information leakage by the concept of non-interference. Although the related studies propose efficient solutions, they lack quan... 详细信息
来源: 评论
Discretized Gaussian Mixture Hyperprior for Learned Image Compression with Mask Module
Discretized Gaussian Mixture Hyperprior for Learned Image Co...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Wang, Shengkai Wang, Hanli Tongji University Department of Computer Science and Technology Shanghai China Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China
Learned image compression approaches have shown great potential with promising results. However, according to the commonly used measurement methods, there still lies a performance gap between learned compression metho... 详细信息
来源: 评论
UAV-Mounted Intelligent Reflecting Surface in Maritime Wireless Powered Communication Network
收藏 引用
China Communications 2025年 第3期22卷 254-269页
作者: Liu Yuan Han Fengxia Zhao Shengjie School of Information Science and Electrical Engineering Shandong Jiaotong UniversityJinan 250357China College of Electronic and Information Engineering Tongji UniversityShanghai 201804China School of Software Engineering Tongji UniversityShanghai 201804China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of EducationShanghai 200003China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 201804China
Intelligent reflecting surface(IRS)assisted with the wireless powered communication network(WPCN)can enhance the desired signal energy and carry out the power-sustaining problem in ocean monitoring *** this paper,we i... 详细信息
来源: 评论
Attack by Yourself: Effective and Unnoticeable Multi-Category Graph Backdoor Attacks with Subgraph Triggers Pool
arXiv
收藏 引用
arXiv 2024年
作者: Li, Jiangtong Liu, Dongyi Cheng, Dawei Jiang, Changjun School of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China
Graph Neural Networks (GNNs) have achieved significant success in various real-world applications, including social networks, finance systems, and traffic management. Recent researches highlight their vulnerability to... 详细信息
来源: 评论