咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 202 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 546 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 382 篇 工学
    • 236 篇 计算机科学与技术...
    • 172 篇 软件工程
    • 80 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 42 篇 电子科学与技术(可...
    • 37 篇 电气工程
    • 34 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 生物工程
    • 16 篇 安全科学与工程
    • 15 篇 仪器科学与技术
    • 15 篇 化学工程与技术
    • 14 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 178 篇 理学
    • 122 篇 数学
    • 38 篇 系统科学
    • 31 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 23 篇 物理学
    • 12 篇 化学
  • 108 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 21 篇 法学
    • 19 篇 社会学
  • 10 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 24 篇 petri nets
  • 20 篇 feature extracti...
  • 14 篇 web services
  • 14 篇 training
  • 10 篇 roads
  • 10 篇 data mining
  • 9 篇 support vector m...
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 algorithm design...
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 conferences
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 wireless sensor ...
  • 8 篇 computational mo...
  • 8 篇 rough set theory
  • 7 篇 semantics

机构

  • 121 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 18 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 moe key laborato...
  • 8 篇 institute of int...
  • 8 篇 college of infor...

作者

  • 35 篇 changjun jiang
  • 34 篇 zhou mengchu
  • 31 篇 jiang changjun
  • 23 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 18 篇 ye chen
  • 17 篇 ding zhijun
  • 16 篇 wang hanli
  • 15 篇 yan chungang
  • 15 篇 wang cheng
  • 15 篇 miao duoqian
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 11 篇 liu guanjun
  • 10 篇 yaying zhang

语言

  • 514 篇 英文
  • 23 篇 中文
  • 12 篇 其他
检索条件"机构=MOE Key Laboratory of Embedded System and Service Computing"
546 条 记 录,以下是131-140 订阅
排序:
Prescribed-time synchronization for multiweighted complex networks: A switching control scheme
收藏 引用
systems & Control Letters 2025年 203卷
作者: Linlong Xu Xiwei Liu Department of Computer Science and Technology Tongji University Shanghai 201804 PR China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai 201804 PR China
This letter deals with an interesting intersection phenomenon of prescribed-time stability (PTSta) for dynamical systems, and develops a novel switching control scheme to investigate prescribed-time synchronization (P...
来源: 评论
Efficient Routing Protection Algorithm Based on Optimized Network Topology
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4525-4540页
作者: Haijun Geng Zikun Jin Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan School of Computer and Information Technology Shanxi UniversityShanxi030006China School of Automation and Software Engineering Shanxi UniversityShanxi030006China School of Computer Science and Technology Hainan UniversityHaikou570228China Department of Computer Science&Technology Tsinghua UniversityBeijing100084China Department of Urban&Regional Planning San JoséState University San JoséCA95192USA Key Laboratory of Embedded System and Service Computing(Tongji University) Ministry of EducationShanghai201804China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu610054China Beijinng University of Technology Beijing-Dublin International CollegeBeijing University of TechnologyBeijing100124China
Network failures are unavoidable and occur *** the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence *** this period,a large number of messages are discarded,whi... 详细信息
来源: 评论
The behavioral sign of account theft: Realizing online payment fraud alert  29
The behavioral sign of account theft: Realizing online payme...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Wang, Cheng Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Shanghai Institute of Intelligent Science and Technology Tongji University China
As a matter of fact, it is usually taken for granted that the occurrence of unauthorized behaviors is necessary for the fraud detection in online payment services. However, we seek to break this stereotype in this wor... 详细信息
来源: 评论
DSP Assembler Auto-Generation Technique and ToolChain Integration
DSP Assembler Auto-Generation Technique and ToolChain Integr...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Wanli Wang Jun Wu Haoqi Ren Zhifeng Zhang Electronics and Information Engineering College Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Computer Science Fudan University Shanghai China
To promote the application of DSP, a fast and accurate toolchain generation method must be realized. Unlike the traditional manual method, in this paper, we propose a toolchain generation algorithm based on the archit... 详细信息
来源: 评论
Behavioral authentication for security and safety
收藏 引用
Security and Safety 2024年 第3期3卷 50-85页
作者: Cheng Wang Hao Tang Hangyu Zhu Junhan Zheng Changjun Jiang Department of Computer Science and Technology Tongji UniversityShanghai 201804China Key Laboratory of Embedded System and Service Computing Ministry of EducationShanghai 201804China Shanghai Artificial Intelligence Laboratory Shanghai 200232China
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain a... 详细信息
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
Two-stream Hierarchical Similarity Reasoning for Image-text Matching
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Ran Wang, Hanli Wang, Lei Kwong, Sam The Department of Computer Science & Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China Frontiers Science Center for Intelligent Autonomous Systems Shanghai201210 China DeepBlue Academy of Sciences Shanghai200336 China The Department of Computer Science City University of Hong Kong Hong Kong
Reasoning-based approaches have demonstrated their powerful ability for the task of image-text matching. In this work, two issues are addressed for image-text matching. First, for reasoning processing, conventional ap... 详细信息
来源: 评论
A Cloudedge-Combined Data Placement Strategy Based on User Access Regions  6
A Cloudedge-Combined Data Placement Strategy Based on User A...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Cao, Eryang Wang, Pengwei Yan, Chungang Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai200092 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China School of Computer Science and Technology Donghua University Shanghai201620 China
To improve the availability of data in the cloud and avoid vendor lock-in risk, multi-cloud storage is attracting more and more attentions. However, accessing data from the cloud usually has some disadvantages such as... 详细信息
来源: 评论
Dynamic frequency selection and spatial interaction fusion for robust person search
收藏 引用
Information Fusion 2025年 124卷
作者: Qixian Zhang Duoqian Miao Qi Zhang Cairong Zhao Hongyun Zhang Ye Sun Ruizhi Wang School of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China School of Computer Science Fudan University Shanghai 200438 China
Person search aims to locate target individuals in large image databases captured by multiple non-overlapping cameras. Existing models primarily rely on spatial feature extraction to capture fine-grained local details...
来源: 评论
Learning how to avoiding obstacles for end-to-end driving with conditional imitation learning  2
Learning how to avoiding obstacles for end-to-end driving wi...
收藏 引用
2nd International Conference on Signal Processing and Machine Learning, SPML 2019
作者: Zhang, Enwei Zhou, Hongtu Ding, Yongchao Zhao, Junqiao Ye, Chen Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University School of Electronics and Information Engineering Shanghai China
Obstacle avoiding is one of the most complex tasks for autonomous driving systems, which was also ignored by many cutting-edge end-to-end learning-based methods. The difficulties stem from the integrated process of de... 详细信息
来源: 评论