咨询与建议

限定检索结果

文献类型

  • 1,424 篇 会议
  • 975 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,562 篇 工学
    • 1,008 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 319 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 171 篇 电气工程
    • 170 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 79 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 64 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 51 篇 网络空间安全
    • 47 篇 安全科学与工程
  • 783 篇 理学
    • 433 篇 数学
    • 152 篇 生物学
    • 146 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 64 篇 化学
    • 33 篇 大气科学
  • 421 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 62 篇 医学
    • 48 篇 临床医学
    • 41 篇 基础医学(可授医学...
  • 56 篇 法学
    • 48 篇 社会学
  • 32 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 67 篇 computer archite...
  • 62 篇 training
  • 56 篇 laboratories
  • 48 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 38 篇 optimization
  • 37 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 32 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 26 篇 protocols

机构

  • 115 篇 key laboratory o...
  • 100 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 88 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 53 篇 key laboratory o...
  • 40 篇 national enginee...
  • 40 篇 key laboratory o...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 school of cyber ...
  • 34 篇 university of ch...
  • 32 篇 shandong provinc...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,218 篇 英文
  • 100 篇 中文
  • 89 篇 其他
  • 2 篇 法文
  • 1 篇 德文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是31-40 订阅
排序:
Pixel+ and Pixel++: compact and efficient forward-secure multi-signatures for PoS blockchain consensus  24
Pixel+ and Pixel++: compact and efficient forward-secure mul...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Jianghong Wei Guohua Tian Ding Wang Fuchun Guo Willy Susilo Xiaofeng Chen State Key Laboratory of Integrated Service Networks (ISN) Xidian University and State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Integrated Service Networks (ISN) Xidian University College of Cyber Science Nankai University School of Computing and Information Technology University of Wollongong
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se...
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Personalized Medical Federated Learning Based on Mutual Knowledge Distillation in Object Heterogeneous Environment  1st
Personalized Medical Federated Learning Based on Mutual Kno...
收藏 引用
1st Conference on Blockchain and Web3.0 technology Innovation and Application, BWTAC 2024
作者: Ni, Lina Song, Chenglin Zhao, Hanmo Tang, Yuncan Ma, Yunshen Zhang, Jinquan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Tongji University Shanghai201804 China
Federated Learning (FL), hailed as a potent approach in merging medical expertise, promises to elevate collaborative efforts among healthcare institutions while safeguarding the privacy and security of sensitive medic... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Adaptive Federated Learning Based on Device Performance in a Heterogeneous Environment of Medical computing Devices  1st
Adaptive Federated Learning Based on Device Performance in...
收藏 引用
1st Conference on Blockchain and Web3.0 technology Innovation and Application, BWTAC 2024
作者: Zhang, Jinquan Wang, Chongbo Yang, Rendong Tang, Yuncan Ma, Yunshen Ni, Lina College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Tongji University Shanghai201804 China
Federated Learning (FL), as one of the effective methods to solve the problem of medical data silos, can promote mutual cooperation among medical institutions under the premise of safeguarding the privacy and security... 详细信息
来源: 评论
Federated Meta Continual Learning for Efficient and Autonomous Edge Inference  24th
Federated Meta Continual Learning for Efficient and Autono...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Bingze Ho, Stella Qu, Youyang Xu, Chenhao Luan, Tom H. Gao, Longxiang Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Department of Biomedical Engineering The University of Melbourne VIC Melbourne Australia School of Information Technology Deakin University VIC Geelong Australia School of Cyber Engineering Xidian University Xi’an China
With an increasing volume of data being collected and processed on edge, Federated Learning (FL) has become a dominant approach to train shared global models on distributed data held by diverse edge clients without ex... 详细信息
来源: 评论
Graph-Based Cooperation Multi-Agent Reinforcement Learning for Intelligent Traffic Signal Control
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14362-14374页
作者: Shang, Jing Meng, Shunmei Hou, Jun Zhao, Xiaoran Zhou, Xiaokang Jiang, Rong Qi, Lianyong Li, Qianmu Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210049 China Nanjing Vocational University of Industry Technology School of Social Science Nanjing210046 China Qufu Normal University School of Computer Science Qufu273165 China Kansai University Faculty of Business and Data Science Osaka Prefecture 564-8680 Japan Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Kunming650399 China College of Computer Science and Technology Qingdao266580 China
In the trend of continuously advancing urban intelligent transport construction, traditional traffic signal control (TSC) struggles to make effective decisions with complex traffic conditions. Although multi-agent dee... 详细信息
来源: 评论
A Model-Agnostic Hierarchical Framework Towards Trajectory Prediction
收藏 引用
Journal of Computer Science and technology 2025年 第2期40卷 322-339页
作者: Qian, Tang-Wen Wang, Yuan Xu, Yong-Jun Zhang, Zhao Wu, Lin Qiu, Qiang Wang, Fei Domain-Oriented Intelligent System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100190 China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
Predicting the future trajectories of multiple agents is essential for various applications in real life, such as surveillance systems, autonomous driving, and social robots. The trajectory prediction task is influenc... 详细信息
来源: 评论
Towards Robust Video Anomaly Detection in 6G Networks: A Scene-Adaptive Framework
收藏 引用
IEEE Network 2025年
作者: Zhang, Sijia Yu, Yong Tao, Xiaoling Wang, Lianhai Shaanxi Normal University School of Computer Science China Guilin University of Electronic Technology Guangxi Cooperative Innovation Center of Cloud Computing and Big Data China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing China
With the rapid advancement of 5th Generation (5G) networks, their low latency and high bandwidth facilitate the development of smart city systems. Among the smart city systems, anomaly detection in surveillance videos... 详细信息
来源: 评论