咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 967 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,560 篇 工学
    • 1,009 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,215 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是541-550 订阅
排序:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Hyperbolic Neural Network Based Preselection for Expensive Multi-Objective Optimization
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Li, Bingdong Yang, Yanting Hong, Wenjing Yang, Peng Zhou, Aimin Shanghai Institute of AI for Education the School of Computer Science and Technology and the Shanghai Frontiers Science Center of Molecule Intelligent Syntheses East China Normal University Shanghai China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science and Engineering Guangdong Key Laboratory of Brain-Inspired Intelligent Computation Southern University of Science and Technology Shenzhen China
A series of surrogate-assisted evolutionary algorithms (SAEAs) have been proposed for expensive multi-objective optimization problems (EMOPs), building cheap surrogate models to replace the expensive real function eva... 详细信息
来源: 评论
Fingerprint Presentation Attack Detector Using Global-Local Model
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Haozhe Zhang, Wentian Liu, Feng Wu, Haoqian Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society The National Engineering Laboratory for Big Data System Computing Technology The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by inform... 详细信息
来源: 评论
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by Distributed Ledger technology and Internet of Things  23
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gao, Haoyu Li, Leixiao Lin, Hao Chang, Xiangyang Wan, Jianxiong Li, Jie Zhu, Fangyuan College of Data Science and Application Inner Mongolia University of Technology China Inner Mongolia Autonomous Reg. Eng. and Technol. Research Center of Big Data Based Software Service China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
P2P Botnet is famous for the resilience against termination. However, its dependence on Neighbor List (NL) makes it susceptible to infiltration and poison, also leading to a dearth of adequate protection of Botmaster&... 详细信息
来源: 评论
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model  7
Automated Crash Analysis and Exploit Generation with Extenda...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Liu, Zhehui Wang, Zhongru Zhang, Yuntao Liu, Tong Fang, Binxing Pang, Zhengyuan Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Chinese Academy of Cyberspace Studies Beijing China North China University of Technology School of Information Science and Technology Beijing100144 China Beijing DigApis Technology Co. Ltd Beijing100871 China JiangSu DigApis Technology Co. Ltd Jiangsu Nantong226000 China
Recently, more and more software vulnerabilities are disclosed and researchers tend to study on automatically discover and exploit the vulnerabilities. However, the main challenges of automated exploit generation are:... 详细信息
来源: 评论
PACE: Reputation-Driven Hierarchical Incentive Mechanism for Trusted Healthcare Transactions in Model Marketplace
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Lu, Jianfeng Dou, Xiaochi Rathore, Bharati Jhaveri, Rutvij H. Seid, Abegaz Mohammed Erbad, Aiman Wuhan University of Science and Technology School of Computer Science and Technology Wuhan430065 China Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China Ministry of Education Key Laboratory of Social Computing and Cognitive Intelligence Dalian University of Technology China United Kingdom Pandit Deendayal Energy University Department of Computer Science and Engineering School of Technology India Hamad Bin Khalifa University College of Science and Engineering Doha Qatar Qatar University College of Engineering Doha Qatar
Federated learning-based model marketplaces have the potential to securely leverage healthcare data for efficient healthcare transactions. However, the willingness to participate in this marketplace is severely hinder... 详细信息
来源: 评论
Internet of Digital Twin: Framework, Applications and Enabling Technologies
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Liu, Ruhan Luan, Tom H. Qu, Youyang Xiang, Yong Gao, Longxiang Zhao, Dongmei Deakin University School of Info Technology MelbourneVIC3125 Australia Xi'an Jiaotong University School of Cyber Science and Engineering Shaanxi Xi'an710049 China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China McMaster University Department of Electrical and Computer Engineering HamiltonON Canada
Intelligent physical systems, such as smart vehicles and robotic arms, are increasingly integrated into both industrial and everyday applications. However, the systems typically face hardware limitations that constrai... 详细信息
来源: 评论
Automated Vulnerability Discovery system Based on Hybrid Execution  7
Automated Vulnerability Discovery System Based on Hybrid Exe...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Liu, Tong Wang, Zhongru Zhang, Yuntao Liu, Zhehui Fang, Binxing Pang, Zhengyuan Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Chinese Academy of Cyberspace Studies Beijing China North China University of Technology School of Information Science and Technology Beijing100144 China Beijing DigApis Technology Co. Ltd Beijing100871 China JiangSu DigApis Technology Co. Ltd Jiangsu Nantong226000 China
At present, program vulnerabilities occur frequently, which seriously threatens the security of cyberspace. Automated vulnerability discovery technology has attracted more and more attention because of its efficiency ... 详细信息
来源: 评论
Localized Adaptive Channel and Power Selection With TinyML (LACPSA) in Dense IEEE 802.11 WLANs
Localized Adaptive Channel and Power Selection With TinyML (...
收藏 引用
IEEE International Conference on Smart Internet of Things (SmartIoT)
作者: Khalid Ibrahim Qureshi Cheng Lu Ruoheng Luo Muhammad Ali Lodhi Lei Wang Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University China
In dense IEEE 802.11 WLANs, optimized channel allocation and transmission power control are crucial for miti- gating interference and congestion. Traditional approaches face significant challenges due to limited chann... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论