咨询与建议

限定检索结果

文献类型

  • 292 篇 会议
  • 128 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 422 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 276 篇 工学
    • 223 篇 计算机科学与技术...
    • 162 篇 软件工程
    • 68 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 24 篇 生物工程
    • 20 篇 机械工程
    • 13 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 力学(可授工学、理...
    • 4 篇 冶金工程
    • 4 篇 建筑学
  • 118 篇 理学
    • 76 篇 数学
    • 26 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 11 篇 化学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 16 篇 computational mo...
  • 13 篇 feature extracti...
  • 12 篇 deep learning
  • 12 篇 distributed proc...
  • 10 篇 computer archite...
  • 10 篇 semantics
  • 9 篇 laboratories
  • 8 篇 computer science
  • 8 篇 conferences
  • 8 篇 scalability
  • 8 篇 concurrent compu...
  • 8 篇 fault tolerance
  • 8 篇 kernel
  • 7 篇 application soft...
  • 7 篇 anomaly detectio...
  • 7 篇 neural networks
  • 7 篇 predictive model...
  • 7 篇 benchmark testin...
  • 7 篇 costs
  • 7 篇 machine learning

机构

  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 26 篇 college of compu...
  • 22 篇 national key lab...
  • 21 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 national laborat...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 national laborat...
  • 6 篇 national key lab...
  • 6 篇 college of compu...
  • 6 篇 school of softwa...
  • 6 篇 laboratory of di...

作者

  • 18 篇 wang yijie
  • 16 篇 yijie wang
  • 15 篇 peng yuxing
  • 14 篇 wang huaimin
  • 12 篇 jie liu
  • 10 篇 liu jie
  • 10 篇 huaimin wang
  • 9 篇 yuxing peng
  • 8 篇 peichang shi
  • 8 篇 hangjun zhou
  • 8 篇 ding bo
  • 8 篇 fu yongquan
  • 7 篇 dongsheng li
  • 7 篇 qinglin wang
  • 7 篇 yin gang
  • 6 篇 zhou hangjun
  • 6 篇 shi peichang
  • 6 篇 wang huai-min
  • 6 篇 wang yi-jie
  • 6 篇 sikun li

语言

  • 391 篇 英文
  • 26 篇 中文
  • 5 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing School of Computer Science"
422 条 记 录,以下是71-80 订阅
排序:
Effective Anomaly Detection Based on Reinforcement Learning in Network Traffic Data
Effective Anomaly Detection Based on Reinforcement Learning ...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Zhongyang Wang Yijie Wang Hongzuo Xu Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Mixed-type data with both categorical and numerical features are ubiquitous in network security, but the existing methods are minimal to deal with them. Existing methods usually process mixed-type data through feature... 详细信息
来源: 评论
Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic Data
Entropy and Autoencoder-Based Outlier Detection in Mixed-Typ...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhongyang Wang Yijie Wang Zhenyu Huang Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Mixed-type data containing categorical and numerical features are pervasive in real life, but very limited outlier detection methods are available for these data. Some existing methods handle mixed-type data by featur... 详细信息
来源: 评论
FCloudless: A Performance-Aware Collaborative Mechanism for JointCloud Serverless
FCloudless: A Performance-Aware Collaborative Mechanism for ...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Jianfei Liu Huaimin Wang Peichang Shi Yaojie Li Penghui Ma Guodong Yi National Key Laboratory of Parallel and Distributed Computing College of Computer Science National University of Defense Technology Changsha 410073 China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha 410073 China Xiangjiang Lab Changsha 410073 China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha 410073 China
As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to c...
来源: 评论
Attention-based Encoder-Decoder Recurrent Neural Networks for HTTP Payload Anomaly Detection
Attention-based Encoder-Decoder Recurrent Neural Networks fo...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Shang Wu Yijie Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Attack payloads are often short segments hidden in HTTP requests; thus they can be found by HTTP payload anomaly detection. Deep learning models learn data features during training without manual feature extraction, a... 详细信息
来源: 评论
Deep Isolation Forest for Anomaly Detection
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Hongzuo Pang, Guansong Wang, Yijie Wang, Yongjun The College of Computer National University of Defense Technology Changsha410073 China The Science and Technology on Parallel and Distributed Processing Laboratory China The School of Computing and Information Systems Singapore Management University 178902 Singapore
Isolation forest (iForest) has been emerging as arguably the most popular anomaly detector in recent years due to its general effectiveness across different benchmarks and strong scalability. Nevertheless, its linear ... 详细信息
来源: 评论
PPSS: A Privacy-Preserving Supervision Scheme Based on Blockchain
PPSS: A Privacy-Preserving Supervision Scheme Based on Block...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Ming Chen Peichang Shi Xiang Fu Feng Jiang Fei Gao Penghui Ma Jinzhu Kong National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Kylin Software Co.LTD Changsha China Zhejiang Lab Hangzhou China
In JointCloud Computing, multi-party participation introduces complexity and uncertainty. For all participants in JointCloud Computing, both continuous supervision and necessary privacy protection are required. Tradit... 详细信息
来源: 评论
MBAPIS: Multi-Level Behavior Analysis Guided Program Interval Selection for Microarchitecture Studies
MBAPIS: Multi-Level Behavior Analysis Guided Program Interva...
收藏 引用
International Conference on parallel Architecture and Compilation Techniques (PACT)
作者: Hongwei Cui Yujie Cui Honglan Zhan Shuhao Liang Xianhua Liu Chun Yang Xu Cheng Engineering Reserach Center of Microprocessor & System Ministry of Education School of Computer Science Peking University Beijing National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University Beijing
Understanding program behavior is crucial in computer architecture research, but the growing size of benchmarks makes analyzing and simulating entire programs increasingly challenging. In practice, researchers often s...
来源: 评论
A Complexity-Reduced Block-Selective Algebraic Multigrid Method for Implicitly Coupled Velocity-Pressure System on High Performance computers
SSRN
收藏 引用
SSRN 2023年
作者: Liang, Yuechao Guo, Xiao-Wei Li, Chao Yuan, Fan Song, Min Zhang, Qingyang Chen, Xinhai Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China School of Mathematics and Computational Sciences Xiangtan University Xiangtan411105 China College of Computer Science and Technology National University of Defense Technology Changsha410073 China
The implicitly coupled pressure-based algorithm is widely acknowledged for its superior convergence and robustness in solving incompressible flow problems. However, the increased expansion scale of equations and diffi... 详细信息
来源: 评论
A Retina-LGN-V1 Structure-like Spiking Neuron Network for Image Feature Extraction  21
A Retina-LGN-V1 Structure-like Spiking Neuron Network for Im...
收藏 引用
Proceedings of the 2021 5th International Conference on Video and Image processing
作者: Sheng Ji Qijun Gu Ye Yuan Peng Zhao Tao Fang Hong Huo Xin Niu Department of Automation_School of Electronic Information and Electrical Engineering_Key Laboratory of System Control and Information Processing Ministry of Education Shanghai Jiao Tong University China College of Computer Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology China
SNNs have achieved great attention in recent years as they contain neurons more like those in the brain and use spikes to encode and transmit information efficiently among neurons with lower energy consumption. A Reti... 详细信息
来源: 评论
Surrogate Supervision-based Deep Weakly-supervised Anomaly Detection
Surrogate Supervision-based Deep Weakly-supervised Anomaly D...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Zhiyue Wu Hongzuo Xu Yijie Wang Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Many anomaly detection applications can provide partially observed anomalies, but only limited work is for this setting. Additionally, a number of anomaly detectors focus on learning a particular model of normal/abnor... 详细信息
来源: 评论