咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是31-40 订阅
A two-way dynamic adaptive pricing resource allocation model based on combinatorial double auctions in computational network
收藏 引用
Computer Communications 2025年 238卷
作者: Xu, Yanjun Tian, Chunqi Wang, Wei Bai, Lizhi Xia, Xuhui School of Computer Science and Technology Tongji University Shanghai China School of Data Science and Engineering East China Normal University Shanghai China Embedded System and Service Computing Key Laboratory of Ministry of Education China
Efficient resource allocation in computing networks is essential for managing fluctuating demands and optimizing system performance. Traditional auction and pricing models often fail to adapt to diverse demands and su... 详细信息
来源: 评论
OUTLIER SYNTHESIS VIA HAMILTONIAN MONTE CARLO FOR OUT-OF-DISTRIBUTION DETECTION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hengzhuang Zhang, Teng National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili... 详细信息
来源: 评论
Against Mobile Collusive Eavesdroppers: Cooperative Secure Transmission and Computation in UAV-Assisted MEC Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5280-5297页
作者: Zhao, Mingxiong Wang, Zirui Guo, Kun Zhang, Rongqian Quek, Tony Q. S. Yunnan University National Pilot School of Software Kunming650500 China Ministry of Education Engineering Research Center of Integration and Application of Digital Learning Technology Beijing100039 China Ministry of Education Engineering Research Center of Cyberspace Kunming650504 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Kunming650221 China Yunnan University Yunnan Key Laboratory of Software Engineering Kunming650091 China East China Normal University Shanghai Key Laboratory of Multidimensional Information Processing School of Communications and Electronics Engineering Shanghai200241 China Yunnan University School of Information Science and Engineering Kunming650500 China Singapore University of Technology and Design Information Systems Technology and Design 487372 Singapore
In Uncrewed Aerial Vehicle (UAV)-assisted Mobile Edge computing (MEC) networks, the security of transmission faces significant challenges due to the vulnerabilities of line-of-sight links and potential eavesdropping o... 详细信息
来源: 评论
Mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation  24th
Mitigating Over-Unlearning in Machine Unlearning with Synt...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Baohai Qu, Youyang Gao, Longxiang Li, Conggai Li, Lin Smith, David Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Data61 Commonwealth Science and Industry Research Organization CanberraVIC Australia College of Business and Law Royal Melbourne Institute of Technology MelbourneVIC Australia
In machine learning, data privacy and security has become an increasingly growing concern. The introduction of machine unlearning offers the ability to address this issue through the removal of personal and sensitive ... 详细信息
来源: 评论
Pixel+ and Pixel++: compact and efficient forward-secure multi-signatures for PoS blockchain consensus  24
Pixel+ and Pixel++: compact and efficient forward-secure mul...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Jianghong Wei Guohua Tian Ding Wang Fuchun Guo Willy Susilo Xiaofeng Chen State Key Laboratory of Integrated Service Networks (ISN) Xidian University and State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Integrated Service Networks (ISN) Xidian University College of Cyber Science Nankai University School of Computing and Information Technology University of Wollongong
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se...
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
A Double-Shell Structured Ransomware Defense Method Tailored for the RaaS Model  3rd
A Double-Shell Structured Ransomware Defense Method Tailored...
收藏 引用
3rd International Conference on Cyberspace Simulation and Evaluation, CSE 2024
作者: Chen, Monan Ji, Tiantian Li, Shudong Zhang, Yuntao Wang, Tian Mao, Kai Sun, Yanwei Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Peng Cheng Laboratory Shenzhen China Zhongguancun Laboratory Beijing China
Ransomware attacks have become a significant cybersecurity threat, with the Ransomware as a service (RaaS) paradigm enabling attackers with limited technical expertise to launch sophisticated campaigns. There is curre... 详细信息
来源: 评论
Personalized Medical Federated Learning Based on Mutual Knowledge Distillation in Object Heterogeneous Environment  1st
Personalized Medical Federated Learning Based on Mutual Kno...
收藏 引用
1st Conference on Blockchain and Web3.0 technology Innovation and Application, BWTAC 2024
作者: Ni, Lina Song, Chenglin Zhao, Hanmo Tang, Yuncan Ma, Yunshen Zhang, Jinquan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Tongji University Shanghai201804 China
Federated Learning (FL), hailed as a potent approach in merging medical expertise, promises to elevate collaborative efforts among healthcare institutions while safeguarding the privacy and security of sensitive medic... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论