咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 961 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 2,394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,557 篇 工学
    • 1,006 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 30 篇 federated learni...
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,208 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2394 条 记 录,以下是651-660 订阅
排序:
An Electronic Medical Record Access Control Model Based on Intuitionistic Fuzzy Trust
SSRN
收藏 引用
SSRN 2023年
作者: Jiang, Rong Liu, Rui Zhang, Tao Ding, Weiping Tian, Shenghu Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Institute of Intelligence Applications Yunnan University of Finance and Economics Kunming China School of Information Science and Technology Nantong University Nantong China
Electronic Medical Record (EMR), as the core data of medical big data, has improved the efficiency of medical services in the process of sharing and using, but a series of data privacy leakage problems have emerged. A... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional Data Anomaly Detection Method Based on Extended Isolation Forest
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hanlin Liu Jiantao Zhou Hua Li College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i...
来源: 评论
StyleGene: Crossover and Mutation of Region-level Facial Genes for Kinship Face Synthesis
StyleGene: Crossover and Mutation of Region-level Facial Gen...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Hao Li Xianxu Hou Zepeng Huang Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of AI and Advanced Computing Xi'an Jiaotong-Liverpool University Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University
High-fidelity kinship face synthesis has many potential applications, such as kinship verification, missing child identification, and social media analysis. However, it is challenging to synthesize high-quality descen...
来源: 评论
Security Analysis for a VANET Privacy Protection Scheme
收藏 引用
Journal of Cyber Security 2022年 第1期4卷 57-64页
作者: Yuzhen Liu Xiaoliang Wang Zhoulei Cao Frank Jiang School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411201China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201China School of Engineering and IT University of New South WalesNSWAustralia
Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing *** to the openness of wireless channel and the sensitivity of traffic information,data trans... 详细信息
来源: 评论
Neuron Circuit Design and Signal Integrity Analysis of a Large-scale Memristor-based Crossbar Array
收藏 引用
IEEE Transactions on Components, Packaging and Manufacturing technology 2025年
作者: Li, Yan Fang, Lidan Li, Da Zhang, Ling Zhou, Haomiao Wang, Jiawei Liu, En-Xiao Li, Er-Ping China Jiliang University Key Laboratory of Electro-magnetic Wave Information Technology and Metrology of Zhejiang Province College of Information Engineering Hangzhou310018 China China Jiliang University Modern Science and Technology College Yiwu322000 China Zhejiang University Key Laboratory of Advanced Micro/Nano Electronic Devices and Smart System Hangzhou310027 China Urbana–Champaign Institute Zhejiang University Zhejiang University–the University of Illinois Haining314400 China A*STAR Institute of High Performance Computing 1 Fusionpolis Way Singapore Singapore
This paper addresses the limitations of standard chips in processing large-scale datasets by leveraging neuromorphic architectures, particularly spiking neural networks (SNNs), to simulate the pulsed signals of biolog... 详细信息
来源: 评论
A Novel Privacy-Preserving Shared Charging Pile for Online Electric Vehicle Matching system
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Xiaoliang Huang, Zhiyu Xiong, Neal Naixue Zeng, Peng School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China Northeastern State University United States
With the increase of electric vehicles, the demand of electric vehicles for charging piles is increasing, but the number of charging piles is far less than that of electric vehicles, especially in rural areas and unde... 详细信息
来源: 评论
Visitors Vis: Interactive Mining of Suspected Medical Insurance Fraud Groups  18th
Visitors Vis: Interactive Mining of Suspected Medical Insura...
收藏 引用
18th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2023
作者: Dong, Rixin Liu, Hanlin Guo, Xu Zhou, Jiantao College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
As medical insurance continues to grow in size, the losses caused by medical insurance fraud cannot be underestimated. Current data mining and predictive techniques have been applied to analyze and explore the health ... 详细信息
来源: 评论
Joint Data Retransmission and Client Selection Optimization for Error-Tolerant Federated Learning in UAV Networks
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2024年
作者: Dong, Chao Wu, Feiyu Qu, Yuben Akerkar, Rajendra Wu, Tao Zhou, Fuhui Wu, Qihui Guo, Song Nanjing University of Aeronautics and Astronautics Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing210023 China Western Norway Research Institute Sogndal6856 Norway Hong Kong Polytechnic University Hong Kong Hong Kong University of Science and Technology 999077 Hong Kong The National University of Defense Technology Department of Computing Anhui Hefei230009 China
The flexibility and mobility of Unmanned Aerial Vehicle (UAV) swarms enable them to integrate with federated learning (FL), an emerging distributed machine learning framework. UAV-FL creates an edge intelligence syste... 详细信息
来源: 评论
Dual Prototypes Contrastive Learning for Semi-Supervised Medical Image Segmentation
SSRN
收藏 引用
SSRN 2024年
作者: Yue, Tianai Xu, Rongtao Wu, Jingqian Yang, Wenjie Du, Shide Wang, Changwei Johns Hopkins University Baltimore21218 United States State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing100190 China The University of Hong Kong Hong Kong999077 Hong Kong College of Computer and Big Data Fuzhou University Fuzhou350108 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan250014 China
Semi-supervised techniques for medical image segmentation have demonstrated potential, effectively training models using scarce labeled data alongside a wealth of unlabeled data. Therefore, semi-supervised medical ima... 详细信息
来源: 评论
Prototype Guided Personalized Federated Intrusion Detection system
Prototype Guided Personalized Federated Intrusion Detection ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Long Cheng Huiru Yan Hanlin Zhou Ying Wang Haichuan Tang Fang Fang State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering North China Electric Power University Beijing China Chinese Academy of Sciences Institute of Computing Technology Beijing China AI Lab of CRRC Academy Beijing China
Preventing network attacks and protecting user privacy are consistently hot research topics in the Internet of Things (IoT) and edge computing fields. Recent advancements in Federated Learning (FL) have shown promise ... 详细信息
来源: 评论