咨询与建议

限定检索结果

文献类型

  • 1,080 篇 会议
  • 723 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,806 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,147 篇 工学
    • 747 篇 计算机科学与技术...
    • 556 篇 软件工程
    • 211 篇 信息与通信工程
    • 152 篇 控制科学与工程
    • 136 篇 电子科学与技术(可...
    • 123 篇 电气工程
    • 107 篇 机械工程
    • 87 篇 生物工程
    • 52 篇 光学工程
    • 50 篇 材料科学与工程(可...
    • 46 篇 仪器科学与技术
    • 46 篇 化学工程与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 37 篇 动力工程及工程热...
    • 37 篇 网络空间安全
    • 26 篇 安全科学与工程
  • 569 篇 理学
    • 317 篇 数学
    • 122 篇 物理学
    • 108 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 38 篇 化学
  • 311 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 52 篇 医学
    • 45 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 69 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 training
  • 35 篇 bandwidth
  • 35 篇 costs
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 algorithm design...

机构

  • 96 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 70 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 40 篇 school of comput...
  • 40 篇 national enginee...
  • 40 篇 institute of com...
  • 39 篇 key laboratory o...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 29 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...

作者

  • 130 篇 hai jin
  • 46 篇 xiaowei li
  • 45 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 22 篇 deqing zou
  • 22 篇 li xiaowei
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 yu hu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,666 篇 英文
  • 82 篇 中文
  • 63 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1806 条 记 录,以下是41-50 订阅
排序:
Dual Encoders for Diffusion-based Image Inpainting
Dual Encoders for Diffusion-based Image Inpainting
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dezhi Zheng Kaijun Deng Jinbao Wang Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
Current diffusion-based inpainting models struggle to preserve unmasked regions or generate highly coherent content. Additionally, it is hard for them to generate meaningful content for 3D inpainting. To tackle these ... 详细信息
来源: 评论
Behavioral Unicity: On the Limits of Anonymized Social Behavior Metadata  1st
Behavioral Unicity: On the Limits of Anonymized Social Beh...
收藏 引用
1st Conference on Blockchain and Web3.0 technology Innovation and Application, BWTAC 2024
作者: Tang, Hao Wang, Cheng Tongji University Shanghai201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Shanghai Artificial Intelligence Laboratory Shanghai200030 China Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Social behavior metadata has altered business models and human lifestyles. However, the inclusion of personal information in social behavior metadata poses risks of identity exposure for users. Under the requirements ... 详细信息
来源: 评论
Hybrid followee recommendation in microblogging systems
收藏 引用
Science China(Information Sciences) 2017年 第1期60卷 21-34页
作者: Hanhua CHEN Hai JIN Xiaolong CUI Services Computing Technology and System Laboratory Big Data Technology and System LaboratoryCluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and Technology
Followee recommendation plays an important role in information sharing over microblogging platforms. Existing followee recommendation schemes adopt either content relevance or social information for followee ranking, ... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge computing
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Joint UAV Deployment and Edge Association for Energy-Efficient Federated Learning
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Wu, Tao Li, Maomao Qu, Yuben Wang, Hongjun Wei, Zhenhua Cao, Jiannong National University of Defense Technology Hefei230009 China Nanjing University of Aeronautics and Astronautics Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing211106 China Xi'an Research Institute of High Technology Xi'an710025 China The HongKong Polytechnic University Department of Computing Hong Kong Hong Kong
Recently, federated learning (FL) has become a promising distributed learning paradigm that caters to the recent trend of pushing intelligence from the cloud to the edge. Nevertheless, communication bottlenecks and de... 详细信息
来源: 评论
TDiffSal: Text-Guided Diffusion Saliency Prediction Model for Images  27th
TDiffSal: Text-Guided Diffusion Saliency Prediction Model fo...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhang, Nana Xiong, Min Zhu, Dandan Zhu, Kun Zhai, Guangtao School of Computer Science and Technology Donghua University No. 2999 Renmin North Road Songjiang District Shanghai201620 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China Institute of AI Education Shanghai East China Normal University No. 3663 Zhongshan North Road Putuo District Shanghai200333 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University No. 4800 Cao’an Highway Jiading District Shanghai201804 China Institute of Image Communication and Network Engineering Shanghai Jiao Tong University No. 800 Dongchuan Road Minhang District Shanghai200240 China
Existing visual saliency prediction methods mainly focus on single-modal visual saliency prediction, while ignoring the significant impact of text on visual saliency. To more comprehensively explore the influence of t... 详细信息
来源: 评论
Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Peng, Xiong Liu, Feng Wang, Nannan Lan, Long Liu, Tongliang Cheung, Yiu-Ming Han, Bo Hong Kong Baptist University Department of Computer Science Hong Kong The University of Melbourne School of Computing and Information Systems Australia Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Shaanxi Xi'an710071 China National University of Defense Technology State Key Laboratory of High Performance Computing School of Computer Hunan Changsha410000 China The University of Sydney Sydney AI Centre School of Computer Science Faculty of Engineering Australia
By abusing access to a well-trained classifier, model inversion (MI) attacks pose a significant threat as they can recover the original training data, leading to privacy leakage. Previous studies mitigated MI attacks ... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
arXiv
收藏 引用
arXiv 2025年
作者: You, Zhichao Dong, Xuewen Li, Shujun Liu, Ximeng Ma, Siqi Shen, Yulong School of Computer Science & Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an China University of Kent Canterbury United Kingdom College of Computer and Data Science Fuzhou University Fuzhou China School of System and Computing University of New South Wales CanberraACT2612 Australia
Reconstruction attacks against federated learning (FL) aim to reconstruct users’ samples through users’ uploaded gradients. Local differential privacy (LDP) is regarded as an effective defense against various attack... 详细信息
来源: 评论