咨询与建议

限定检索结果

文献类型

  • 1,424 篇 会议
  • 979 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,565 篇 工学
    • 1,015 篇 计算机科学与技术...
    • 775 篇 软件工程
    • 323 篇 信息与通信工程
    • 217 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 173 篇 电气工程
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 78 篇 交通运输工程
    • 77 篇 仪器科学与技术
    • 68 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 生物医学工程(可授...
    • 65 篇 材料科学与工程(可...
    • 62 篇 动力工程及工程热...
    • 53 篇 网络空间安全
    • 47 篇 安全科学与工程
  • 784 篇 理学
    • 434 篇 数学
    • 152 篇 生物学
    • 144 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 65 篇 化学
    • 33 篇 大气科学
  • 423 篇 管理学
    • 269 篇 管理科学与工程(可...
    • 174 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 62 篇 医学
    • 47 篇 临床医学
    • 41 篇 基础医学(可授医学...
  • 56 篇 法学
    • 48 篇 社会学
  • 32 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 67 篇 computer archite...
  • 62 篇 training
  • 56 篇 laboratories
  • 48 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 38 篇 optimization
  • 37 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 32 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 26 篇 protocols

机构

  • 115 篇 key laboratory o...
  • 100 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 88 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 53 篇 key laboratory o...
  • 40 篇 national enginee...
  • 40 篇 key laboratory o...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,225 篇 英文
  • 100 篇 中文
  • 86 篇 其他
  • 2 篇 法文
  • 1 篇 德文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2405 条 记 录,以下是91-100 订阅
排序:
Blockchain-Assisted Privacy-Preserving and Synchronized key Agreement for VDTNs
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wang, Chenhao Ming, Yang Liu, Hang Feng, Jie Yang, Mengmeng Xiang, Yang Chang'an University School of Information Engineering Xi'an710064 China Xidian University State Key Laboratory of Integrated Service Networks Xi'an710071 China Commonwealth Scientific and Industrial Research Organization Australia Swinburne University of Technology Department of Computing Technologies VIC3122 Australia
With the continuous development of digitization evolutions, vehicular digital twin networks (VDTNs) facilitate traffic data and optimization results to be exchanged between the vehicle and digital twin as well as shar... 详细信息
来源: 评论
MRLATO: An Adaptive Task Offloading Mechanism Based on Meta Reinforcement Learning in Edge computing Environment
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Zhang, Peiying Liu, Jiamin Guizani, Maher Wang, Jian Kumar, Neeraj Tan, Lizhuang Qingdao Institute of Software College of Computer Science and Technology Qingdao266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao266580 China Ministry of Education Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China University of Texas Arlington Computer Science and Engineering Department TX United States College of Science Qingdao266580 China Thapar University Department of Computer Science and Engineering Patiala147004 India Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Traditional cloud computing models struggle to meet the requirements of latency-sensitive applications when processing large amounts of data. As a solution, Multi-access Edge computing (MEC) extends computing resource... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Convex Hull-based Algebraic Constraint for Visual Quadric SLAM
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Xiaolong Zhao, Junqiao Song, Shuangfu Zhu, Zhongyang Yuan, Zihan Ye, Chen Feng, Tiantian School of Computer Science and Technology Tongji University Shanghai China The MOE Key Lab of Embedded System and Service Computing Tongji University Shanghai China Institute of Intelligent Vehicles Tongji University Shanghai China School of Surveying and Geo-Informatics Tongji University Shanghai China
Using Quadrics as the object representation has the benefits of both generality and closed-form projection derivation between image and world spaces. Although numerous constraints have been proposed for dual quadric r... 详细信息
来源: 评论
Compact-yet-Separate: Proto-centric Multi-modal Hashing with Pronounced Category Differences for Multi-modal Retrieval
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zuo, Ruifan Zheng, Chaoqun Zhu, Lei Lu, Wenpeng Si, Jiasheng Zhang, Weiyu Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China Tongji University School of Electronic and Information Engineering Shanghai China
Multi-modal hashing achieves low storage costs and high retrieval speeds by using compact hash codes to represent complex and heterogeneous multi-modal data, effectively addressing the inefficiency and resource intens... 详细信息
来源: 评论
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
arXiv
收藏 引用
arXiv 2025年
作者: You, Zhichao Dong, Xuewen Li, Shujun Liu, Ximeng Ma, Siqi Shen, Yulong School of Computer Science & Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an China University of Kent Canterbury United Kingdom College of Computer and Data Science Fuzhou University Fuzhou China School of System and Computing University of New South Wales CanberraACT2612 Australia
Reconstruction attacks against federated learning (FL) aim to reconstruct users’ samples through users’ uploaded gradients. Local differential privacy (LDP) is regarded as an effective defense against various attack... 详细信息
来源: 评论
Multi-Relational Variational Contrastive Learning for Next POI Recommendation
Multi-Relational Variational Contrastive Learning for Next P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lin Chen Peipei Wang Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
Next point-of-interest (POI) recommendation aims to predict the next interested POI to the user based on their historical check-in data in location-based social services. Most existing studies have attempted to model ... 详细信息
来源: 评论
DCCT-Net: A Network Combined Dynamic CNN and Transformer for Image Compressive Sensing
DCCT-Net: A Network Combined Dynamic CNN and Transformer for...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lijuan Xu Haixiao Mei Fenghua Tong Dawei Zhao Fuqiang Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recent end-to-end image compressive sensing networks primarily use Convolutional Neural Networks (CNNs) and Transformers, each with distinct limitations: CNNs struggle with global feature capture, while Transformers l... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle Networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论