咨询与建议

限定检索结果

文献类型

  • 184 篇 会议
  • 90 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 139 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 31 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 生物工程
    • 13 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 8 篇 电气工程
    • 6 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
  • 67 篇 理学
    • 34 篇 数学
    • 21 篇 生物学
    • 9 篇 物理学
    • 9 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
  • 46 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 3 篇 临床医学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 9 篇 deep neural netw...
  • 9 篇 feature extracti...
  • 9 篇 training
  • 7 篇 semantics
  • 6 篇 deep learning
  • 6 篇 computational mo...
  • 6 篇 accuracy
  • 6 篇 data models
  • 5 篇 conferences
  • 5 篇 scalability
  • 5 篇 anomaly detectio...
  • 5 篇 neural networks
  • 5 篇 costs
  • 5 篇 distributed proc...
  • 5 篇 machine learning
  • 4 篇 object detection
  • 4 篇 self-supervised ...
  • 4 篇 performance eval...
  • 4 篇 cyberspace
  • 4 篇 robustness

机构

  • 37 篇 school of cyber ...
  • 34 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 22 篇 national key lab...
  • 17 篇 school of softwa...
  • 15 篇 college of compu...
  • 15 篇 school of inform...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 9 篇 school of comput...
  • 9 篇 national key lab...
  • 8 篇 jinyinhu laborat...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 key laboratory o...

作者

  • 26 篇 jin hai
  • 21 篇 hai jin
  • 17 篇 hu shengshan
  • 14 篇 wang yijie
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 wan wei
  • 9 篇 li dongsheng
  • 8 篇 huaimin wang
  • 7 篇 dongsheng li
  • 7 篇 xu wu
  • 7 篇 deqing zou
  • 7 篇 shengshan hu
  • 6 篇 peichang shi
  • 6 篇 dou yong
  • 6 篇 wang wei
  • 6 篇 minghui li
  • 6 篇 lai zhiquan

语言

  • 241 篇 英文
  • 19 篇 其他
  • 16 篇 中文
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing School of Computer"
276 条 记 录,以下是81-90 订阅
排序:
A Deep Belief Networks Intrusion Detection Method Based on Generative Adversarial Networks
A Deep Belief Networks Intrusion Detection Method Based on G...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Zezhang Zheng Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing School of Computer Electronics and Information Guangxi University (Guangxi University) Nanning China
In response to the substantial threat that Internet attacks pose to data center network security, researchers have proposed several deep learning-based methods for detecting network intrusions. However, while algorith... 详细信息
来源: 评论
Toward Wisdom-Evolutionary and Primitive-Concise 6G:A New Paradigm of Semantic Communication Networks
收藏 引用
Engineering 2022年 第1期8卷 60-73页
作者: Ping Zhang Wenjun Xu Hui Gao Kai Niu Xiaodong Xu Xiaoqi Qin Caixia Yuan Zhijin Qin Haitao Zhao Jibo Wei Fangwei Zhang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Peng Cheng Laboratory Shenzhen 518066China Key Laboratory of Universal Wireless Communications Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China School of Artificial Intelligence Beijing University of Posts and TelecommunicationsBeijing 100876China The School of Electronic Engineering and Computer Science Queen Mary University of LondonLondon E14NSUK College of Electronic Science and Technology National University of Defense TechnologyChangsha 410073China School of Humanities Beijing University of Posts and TelecommunicationsBeijing 100876China
The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G *** hyper-massive and global con... 详细信息
来源: 评论
Overview of blockchain consensus mechanism  2020
Overview of blockchain consensus mechanism
收藏 引用
2nd International Conference on Big Data Engineering, BDE 2020
作者: Zhang, Changqiang Wu, Cangshuai Wang, Xinyi Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology China College of Computer National University of Defense Technology China
The advent of the Bitcoin system has brought another boom in the Internet era. In a very short time, many Blockchain systems come into being successively, whose decentration, consensus mechanisms, intelligent contract... 详细信息
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of computer Science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms
Feature and Performance Comparison of FaaS Platforms
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Penghui Ma Peichang Shi Guodong Yi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Xiangjiang Lab Changsha China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove...
来源: 评论
A SPECTRAL LEVENBERG-MARQUARDT-DEFLATION METHOD FOR MULTIPLE SOLUTIONS OF SEMILINEAR ELLIPTIC SYSTEMS
arXiv
收藏 引用
arXiv 2025年
作者: Li, Lin Zhou, Yuheng Xie, Pengcheng Li, Huiyuan School of Mathematics and Physics University of South China Hengyang China Applied Mathematics and Computational Research Division Lawrence Berkeley National Laboratory 1 Cyclotron Road BerkeleyCA94720 United States State Key Laboratory of Computer Science Laboratory of Parallel Computing Institute of Software Chinese Academy of Sciences Beijing100190 China
Many nonlinear differential equations arising from practical problems may permit nontrivial multiple solutions relevant to applications, and these multiple solutions are helpful to deeply understand these practical pr... 详细信息
来源: 评论
Named Entity Recognition of Chinese Diabetic Literature by Integrating General Domain Knowledge  4
Named Entity Recognition of Chinese Diabetic Literature by I...
收藏 引用
4th IEEE International Conference on computer and Communication Engineering Technology, CCET 2021
作者: Zhang, Duochuan Beijing University of Posts and Telecommunications School of Computer National Demonstrative Software School Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China
In the field of named entity recognition of diabetes literature, due to the lack of large-scale and high-quality annotation data sets, the traditional named entity recognition technology has the drawback of insufficie... 详细信息
来源: 评论
Calibrated One-class Classification for Unsupervised Time Series Anomaly Detection
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Hongzuo Wang, Yijie Jian, Songlei Liao, Qing Wang, Yongjun Pang, Guansong Beijing100091 China The National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Hunan410073 China The College of Computer National University of Defense Technology Hunan410073 China Guangdong518055 China The School of Computing and Information Systems Singapore Management University Singapore178902 Singapore
Time series anomaly detection is instrumental in maintaining system availability in various domains. Current work in this research line mainly focuses on learning data normality deeply and comprehensively by devising ... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
IWRN:A Robust Blind Watermarking Method for Artwork Image Copyright Protection Against Noise Attack  39
IWRN:A Robust Blind Watermarking Method for Artwork Image Co...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Kou, Feifei Yao, Yuhan Yao, Siyuan Wang, Jiahao Shi, Lei Li, Yawen Kang, Xuejing School of Computer Science National Pilot School of Software Engineering BUPT Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing 100876 China School of Economics and Management BUPT Beijing 100876 China State Key Laboratory of Media Convergence and Communication CUC Beijing 100024 China State Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPU Taicang 215400 China
Adding imperceptible watermarks to artwork images, such as paintings and photographs, can effectively safeguard the copyright of these images without compromising their usability. However, existing blind watermarking ... 详细信息
来源: 评论