咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 972 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,564 篇 工学
    • 1,013 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 436 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 61 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,229 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2415 条 记 录,以下是641-650 订阅
排序:
Simulation of Nuclear Reactor Accident Scenarios using Physics-Informed Neural Networks and Transfer-Learning
Simulation of Nuclear Reactor Accident Scenarios using Physi...
收藏 引用
Electronic Information Engineering and Computer Science (EIECS), 2021 International Conference on
作者: Yang Yu Yufei Xie Wenlin Wang Guohua Wu Haitao Lan Enbo Lin Ping An Zibin Sun Haichuan Zhang Yixian Wu National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha China Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Chengdu China School of Automation Wuhan University of Technology Wuhan China Sino-German College of Intelligent Manufacturing Shenzhen Technology University Shenzhen China Institute of Automotive Engineers Hubei University of Automotive Technology Shiyan China Nuclear Power Institute of China Chengdu China
In a Loss of Coolant Accident (LOCA), reactor core temperatures can rise rapidly, leading to potential fuel damage and radioactive material release. This research presents a groundbreaking method that combines the pow... 详细信息
来源: 评论
Effcient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
Security and Safety
收藏 引用
Security and Safety 2022年 第1期1卷 145-165页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua UniversityShanghai 201620China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer ScienceTongji UniversityShanghai 201804China Shanghai Network Financial Security Collaborative Innovation Center Tongji UniversityShanghai 201804China
Nowadays,large numbers of smart sensors(e.g.,road-side cameras)which com-municate with nearby base stations could launch distributed denial of services(DDoS)attack storms in intelligent transportation *** attacks disa... 详细信息
来源: 评论
A Blockchain Based Automatic Access Scheme Design and Implement for Small Cell Base Station  21
A Blockchain Based Automatic Access Scheme Design and Implem...
收藏 引用
21st IEEE International Conference on Communication technology, ICCT 2021
作者: Liang, Jingchao Wu, Jun Tan, Bin Ren, Haoqi Zhang, Zhifeng School of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Fudan University School of Computer Science Shanghai China Jinggangshan University Electronics and Information Engineering Ji'an China Tongji University Electronics and Information Engineering Shanghai China
5G technology is constrained by its higher frequency band and smaller coverage area, which leads to the need for operators to use technologies such as small cell base stations to increase the density of base station d... 详细信息
来源: 评论
A Hybrid Loss Network for Localization of Image Manipulation  19th
A Hybrid Loss Network for Localization of Image Manipulation
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Yin, Qilin Wang, Jinwei Luo, Xiangyang Nanjing University of Information Science and Technology and Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China
With the development of information security, localization of image manipulations havs become a hot topic. In this paper, a hybrid loss network is proposed for the manipulated image forensics. First, the patch predict... 详细信息
来源: 评论
Synchronization of Multi-Weighted and Directed Network Under Pinning Impulsive Control
Synchronization of Multi-Weighted and Directed Network Under...
收藏 引用
Chinese Automation Congress (CAC)
作者: Xiaohan Hu Xiwei Liu Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
In this paper, multi-weighted and directed complex dynamic networks (MWDCDNs) under the control of hybrid impulses are analyzed. Two cases are considered. In the first case, impulses can be only applied on one fixed n... 详细信息
来源: 评论
An Automatic Tooth Position and Dental Disease Detection Algorithm Based on YOLOv8
An Automatic Tooth Position and Dental Disease Detection Alg...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Hongliang Wang Ke Diao Lin Wu Xuerao Li Xin Zhou Xiaozhou Liu Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Shenyang China School and Hospital of Stomatology China Medical University Liaoning Provincial Key Laboratory of Oral Diseases Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China
With the development of digital dental imaging technology, panoramic tomographic images have become an effective tool for diagnosing dental diseases. However, due to the diversity and complexity of dental lesions, acc... 详细信息
来源: 评论
Provably Convergent Federated Trilevel Learning
arXiv
收藏 引用
arXiv 2023年
作者: Jiao, Yang Yang, Kai Wu, Tiancheng Jian, Chengtao Huang, Jianwei Department of Computer Science and Technology Tongji University China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University China Shanghai Research Institute for Intelligent Autonomous Systems China School of Science and Engineering The Chinese University of Hong Kong Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Trilevel learning, also called trilevel optimization (TLO), has been recognized as a powerful modelling tool for hierarchical decision process and widely applied in many machine learning applications, such as robust n... 详细信息
来源: 评论
An Adversarial Smart Contract Honeypot in Ethereum
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第7期128卷 247-267页
作者: Yu Han Tiantian Ji Zhongru Wang Hao Liu Hai Jiang Wendi Wang Xiang Cui Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing100876China Chinese Academy of Cyberspace Studies Beijing100010China Qianxin Technology Group Co. Ltd.Beijing100088China Beijing DigApis Technology Co. Ltd.Beijing100081China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China
A smart contract honeypot is a special type of smart *** type of contract seems to have obvious vulnerabilities in contract *** a user transfers a certain amount of funds to the contract,then the user can withdraw the... 详细信息
来源: 评论
Wafer bin map inspection based on DenseNet
收藏 引用
Journal of Central South University 2021年 第8期28卷 2436-2450页
作者: YU Nai-gong XU Qiao WANG Hong-lu LIN Jia Faculty of Information Technology Beijing University of TechnologyBeijing 100124China Beijing Key Laboratory of Computing Intelligence and Intelligent System Beijing 100124China Engineering Research Center of Digital Community Ministry of EducationBeijing 100124China
Wafer bin map(WBM)inspection is a critical approach for evaluating the semiconductor manufacturing *** excellent inspection algorithm can improve the production efficiency and *** paper proposes a WBM defect pattern i... 详细信息
来源: 评论
Routing Strategy for SDN Large Flow Based on Deep Reinforcement Learning
Routing Strategy for SDN Large Flow Based on Deep Reinforcem...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yu Ke Junli Wang Chungang Yan Jiamin Yao Key Laboratory of Embedded System and Service Computing Collaborative Innovation Center for Financial Network Security (Tongji University) Ministry of Education National (Province-Ministry Joint) Tongji University Shanghai China
With the expansion of network scale, traditional routing strategies in Software-Defined Networking (SDN) have difficulty adapting to fast traffic variability. The large flow in the network occupies 80% of the network ... 详细信息
来源: 评论