咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 721 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,806 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,147 篇 工学
    • 745 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 126 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,667 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1806 条 记 录,以下是301-310 订阅
排序:
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
Frontiers technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Mengshi Qi Xin Wang Yunpeng He Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data
Ant: An Efficient Lossless Compression Algorithm for IoT Tim...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Junhui Li Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Science and Engineering University of Bristol Bristol U.K
In various applications in Internet of Things like industrial monitoring, large amounts of floating-point time series data are generated at an unprecedented rate. Efficient compression algorithms can effectively reduc...
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
IBFNet: A Dual Auxiliary Branch Network for Multimodal Hidden Emotion Recognition
IBFNet: A Dual Auxiliary Branch Network for Multimodal Hidde...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jianmeng Zhou Xinyu Liu Shiwei He Mengyan Li Huijie Gu Tong Chen College of Electronic and Information Engineering Southwest University Chongqing China Chongqing Key Laboratory of Generic Technology and System of Service Robots Southwest University Chongqing China Institute of Legal Psychology and Intelligent Computing Southwest University Chongqing China
Micro-expression (ME) is a crucial cue to reveal hidden emotions and helps to diagnose mental illnesses such as depression. However, their rapid and subtle characteristics make them difficult to recognize, and relying... 详细信息
来源: 评论
Marine Predators Algorithm with Deep Learning-Based Leukemia Cancer Classification on Medical Images
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 893-916页
作者: Sonali Das Saroja Kumar Rout Sujit Kumar Panda Pradyumna Kumar Mohapatra Abdulaziz S.Almazyad Muhammed Basheer Jasser Guojiang Xiong Ali Wagdy Mohamed Department of Computer Science&Engineering Gandhi Institute for TechnologyBPUTBhubaneswar752054India Department of Information Technology Vardhaman College of Engineering(Autonomous)Hyderabad501218TelanganaIndia Department of Electronic&Communication Engineering Vedang Institute of TechnologyBhubaneswar752010India Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computing and Information Systems School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Research Centre for Human-Machine Collaboration(HUMAC) School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11931Jordan
In blood or bone marrow,leukemia is a form of cancer.A person with leukemia has an expansion of white blood cells(WBCs).It primarily affects children and rarely affects *** depends on the type of leukemia and the exte... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
A Secure keyword Spotting Scheme Based on Complex Residual Network
A Secure Keyword Spotting Scheme Based on Complex Residual N...
收藏 引用
Image Processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Jingyi Chen Xiangyu Gao Peijia Zheng Huiyu Zhou Jian Li Dong Wei Jianbin Zou School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Amazon Web Services Beijing China
To address the privacy risks associated with intelligent voice assistants, this paper proposes a non-interactive, end-to-end keyword spotting scheme in the encrypted domain. The scheme introduces an innovative complex... 详细信息
来源: 评论
Modeling and Analysis of Integrated Air Transportation Cooperative Information SoS Based on Complex Network Theory
Modeling and Analysis of Integrated Air Transportation Coope...
收藏 引用
Chinese Automation Congress (CAC)
作者: Song Li Zhenfeng Wu Hans de Jong State Key Laboratory of Air Traffic Management System and Technology Nanjing China DFS Aviation Services GmbH Beijing China
In this paper, a system of systems (SoS) modeling and evaluation method based on complex network theory is proposed for the Integrated Air Transportation Cooperative Information SoS (IATCI-SoS). In the proposed method... 详细信息
来源: 评论
VCFGAN: A Two-stage Collaborative Filtering Framework based on Variational Autoencoders and Generative Adversarial Networks
VCFGAN: A Two-stage Collaborative Filtering Framework based ...
收藏 引用
Information systems and computing technology (ISCTech), International Conference on
作者: Zhiqiang Huang Jinzhong Li Xueyu Huang Junqi Liu School of Software Engineering Jiangxi University of Science and Technology Nanchang China College of Electronics and Information Engineering Jinggangshan University Ji’an China Ministry of Education Key Laboratory of Embedded System and Service Computing (Tongji University) Shanghai China
Deep generative models, such as Generative Adversarial Networks (GAN) and Variational Autoencoders (VAE), are widely used in collaborative filtering. They usually learn users’ preferences for items directly from a hi... 详细信息
来源: 评论