咨询与建议

限定检索结果

文献类型

  • 379 篇 会议
  • 234 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 614 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 431 篇 工学
    • 268 篇 计算机科学与技术...
    • 194 篇 软件工程
    • 85 篇 信息与通信工程
    • 83 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 44 篇 电气工程
    • 39 篇 机械工程
    • 35 篇 生物工程
    • 31 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 17 篇 化学工程与技术
    • 16 篇 仪器科学与技术
    • 15 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 10 篇 材料科学与工程(可...
  • 209 篇 理学
    • 141 篇 数学
    • 46 篇 系统科学
    • 39 篇 生物学
    • 37 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 14 篇 化学
  • 129 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 22 篇 法学
    • 20 篇 社会学
  • 14 篇 医学
    • 11 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 4 篇 农学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 26 篇 petri nets
  • 22 篇 feature extracti...
  • 16 篇 training
  • 14 篇 web services
  • 12 篇 support vector m...
  • 10 篇 roads
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 throughput
  • 9 篇 graph neural net...
  • 9 篇 semantics
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 conferences
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 121 篇 key laboratory o...
  • 78 篇 department of co...
  • 71 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 17 篇 department of el...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 department of el...
  • 12 篇 key laboratory o...
  • 11 篇 ieee
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 department of co...
  • 9 篇 department of co...
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 8 篇 college of infor...

作者

  • 35 篇 changjun jiang
  • 34 篇 zhou mengchu
  • 29 篇 jiang changjun
  • 22 篇 mengchu zhou
  • 21 篇 cheng wang
  • 17 篇 li maozhen
  • 17 篇 ding zhijun
  • 16 篇 wang cheng
  • 16 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 yan chungang
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 12 篇 liu yang
  • 11 篇 zhijun ding
  • 11 篇 liu guanjun
  • 10 篇 yaying zhang

语言

  • 579 篇 英文
  • 26 篇 中文
  • 12 篇 其他
检索条件"机构=Key Laboratory of Embedded Systems and Service Computing"
614 条 记 录,以下是141-150 订阅
排序:
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chang Liu Xiaoyong Li Chunlu Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Tsinghua University Beijing China Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland Maryland USA
The processor's Performance Monitor Unit (PMU) allows the recording of architectural and microarchitectural events for profiling purposes. In this study, we reveal a security issue caused by the fact that current ... 详细信息
来源: 评论
Efficient Routing Protection Algorithm Based on Optimized Network Topology
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4525-4540页
作者: Haijun Geng Zikun Jin Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan School of Computer and Information Technology Shanxi UniversityShanxi030006China School of Automation and Software Engineering Shanxi UniversityShanxi030006China School of Computer Science and Technology Hainan UniversityHaikou570228China Department of Computer Science&Technology Tsinghua UniversityBeijing100084China Department of Urban&Regional Planning San JoséState University San JoséCA95192USA Key Laboratory of Embedded System and Service Computing(Tongji University) Ministry of EducationShanghai201804China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu610054China Beijinng University of Technology Beijing-Dublin International CollegeBeijing University of TechnologyBeijing100124China
Network failures are unavoidable and occur *** the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence *** this period,a large number of messages are discarded,whi... 详细信息
来源: 评论
The behavioral sign of account theft: Realizing online payment fraud alert  29
The behavioral sign of account theft: Realizing online payme...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Wang, Cheng Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Shanghai Institute of Intelligent Science and Technology Tongji University China
As a matter of fact, it is usually taken for granted that the occurrence of unauthorized behaviors is necessary for the fraud detection in online payment services. However, we seek to break this stereotype in this wor... 详细信息
来源: 评论
DSP Assembler Auto-Generation Technique and ToolChain Integration
DSP Assembler Auto-Generation Technique and ToolChain Integr...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Wanli Wang Jun Wu Haoqi Ren Zhifeng Zhang Electronics and Information Engineering College Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Computer Science Fudan University Shanghai China
To promote the application of DSP, a fast and accurate toolchain generation method must be realized. Unlike the traditional manual method, in this paper, we propose a toolchain generation algorithm based on the archit... 详细信息
来源: 评论
Behavioral authentication for security and safety
收藏 引用
Security and Safety 2024年 第3期3卷 50-85页
作者: Cheng Wang Hao Tang Hangyu Zhu Junhan Zheng Changjun Jiang Department of Computer Science and Technology Tongji UniversityShanghai 201804China Key Laboratory of Embedded System and Service Computing Ministry of EducationShanghai 201804China Shanghai Artificial Intelligence Laboratory Shanghai 200232China
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain a... 详细信息
来源: 评论
Coordinate Attention Based 3D-CNN Using Ghost Multi-Scale for Diagnosing Alzheimer’s Disease
Coordinate Attention Based 3D-CNN Using Ghost Multi-Scale fo...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xiaolu Lin Pinya Lu Jie Pan Hongqin Yang Xuemei Ding Fujian Provincial Engineering Research Center for Public Service Big Data Mining and Application Fujian Provincial University Engineering Research Center for Big Data Analysis and Application Fujian Normal University Fuzhou China Xiamen Jingyi Zhikang Technology Co. Ltd Xiamen China Fujian Provincial Key Laboratory for Photonics Technology Key Laboratory of OptoElectronic Science and Technology for Medicine of Ministry of Education Fujian Normal University Fuzhou China School of Computing Engineering and Intelligent Systems Ulster University Derry-Londonderry NI UK
Alzheimer's disease (AD) is a neurodegenerative disease and mild cognitive impairment (MCI) is the early stage of AD. Previous studies have predominantly focused on binary classification using 3 dimensional - conv... 详细信息
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
A Cloudedge-Combined Data Placement Strategy Based on User Access Regions  6
A Cloudedge-Combined Data Placement Strategy Based on User A...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Cao, Eryang Wang, Pengwei Yan, Chungang Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai200092 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China School of Computer Science and Technology Donghua University Shanghai201620 China
To improve the availability of data in the cloud and avoid vendor lock-in risk, multi-cloud storage is attracting more and more attentions. However, accessing data from the cloud usually has some disadvantages such as... 详细信息
来源: 评论
Finite time convergence of pinning synchronization with a single nonlinear controller
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Tianping Lu, Wenlian Liu, Xiwei The School of Computer Sciences/Mathematics Fudan University Shanghai200433 China The Centre for Computational Systems Biology School of Mathematical Sciences Fudan University China Department of Computer Science and Technology Tongji University The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai200092 China
来源: 评论
Dynamic frequency selection and spatial interaction fusion for robust person search
收藏 引用
Information Fusion 2025年 124卷
作者: Qixian Zhang Duoqian Miao Qi Zhang Cairong Zhao Hongyun Zhang Ye Sun Ruizhi Wang School of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China School of Computer Science Fudan University Shanghai 200438 China
Person search aims to locate target individuals in large image databases captured by multiple non-overlapping cameras. Existing models primarily rely on spatial feature extraction to capture fine-grained local details...
来源: 评论