咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 972 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,564 篇 工学
    • 1,013 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 436 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 61 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,229 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2415 条 记 录,以下是661-670 订阅
排序:
Security Analysis for a VANET Privacy Protection Scheme
收藏 引用
Journal of Cyber Security 2022年 第1期4卷 57-64页
作者: Yuzhen Liu Xiaoliang Wang Zhoulei Cao Frank Jiang School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411201China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201China School of Engineering and IT University of New South WalesNSWAustralia
Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing *** to the openness of wireless channel and the sensitivity of traffic information,data trans... 详细信息
来源: 评论
Neuron Circuit Design and Signal Integrity Analysis of a Large-scale Memristor-based Crossbar Array
收藏 引用
IEEE Transactions on Components, Packaging and Manufacturing technology 2025年
作者: Li, Yan Fang, Lidan Li, Da Zhang, Ling Zhou, Haomiao Wang, Jiawei Liu, En-Xiao Li, Er-Ping China Jiliang University Key Laboratory of Electro-magnetic Wave Information Technology and Metrology of Zhejiang Province College of Information Engineering Hangzhou310018 China China Jiliang University Modern Science and Technology College Yiwu322000 China Zhejiang University Key Laboratory of Advanced Micro/Nano Electronic Devices and Smart System Hangzhou310027 China Urbana–Champaign Institute Zhejiang University Zhejiang University–the University of Illinois Haining314400 China A*STAR Institute of High Performance Computing 1 Fusionpolis Way Singapore Singapore
This paper addresses the limitations of standard chips in processing large-scale datasets by leveraging neuromorphic architectures, particularly spiking neural networks (SNNs), to simulate the pulsed signals of biolog... 详细信息
来源: 评论
A Novel Privacy-Preserving Shared Charging Pile for Online Electric Vehicle Matching system
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Xiaoliang Huang, Zhiyu Xiong, Neal Naixue Zeng, Peng School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China Northeastern State University United States
With the increase of electric vehicles, the demand of electric vehicles for charging piles is increasing, but the number of charging piles is far less than that of electric vehicles, especially in rural areas and unde... 详细信息
来源: 评论
Joint Data Retransmission and Client Selection Optimization for Error-Tolerant Federated Learning in UAV Networks
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2024年
作者: Dong, Chao Wu, Feiyu Qu, Yuben Akerkar, Rajendra Wu, Tao Zhou, Fuhui Wu, Qihui Guo, Song Nanjing University of Aeronautics and Astronautics Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing210023 China Western Norway Research Institute Sogndal6856 Norway Hong Kong Polytechnic University Hong Kong Hong Kong University of Science and Technology 999077 Hong Kong The National University of Defense Technology Department of Computing Anhui Hefei230009 China
The flexibility and mobility of Unmanned Aerial Vehicle (UAV) swarms enable them to integrate with federated learning (FL), an emerging distributed machine learning framework. UAV-FL creates an edge intelligence syste... 详细信息
来源: 评论
Visitors Vis: Interactive Mining of Suspected Medical Insurance Fraud Groups  18th
Visitors Vis: Interactive Mining of Suspected Medical Insura...
收藏 引用
18th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2023
作者: Dong, Rixin Liu, Hanlin Guo, Xu Zhou, Jiantao College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
As medical insurance continues to grow in size, the losses caused by medical insurance fraud cannot be underestimated. Current data mining and predictive techniques have been applied to analyze and explore the health ... 详细信息
来源: 评论
Dual Prototypes Contrastive Learning for Semi-Supervised Medical Image Segmentation
SSRN
收藏 引用
SSRN 2024年
作者: Yue, Tianai Xu, Rongtao Wu, Jingqian Yang, Wenjie Du, Shide Wang, Changwei Johns Hopkins University Baltimore21218 United States State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing100190 China The University of Hong Kong Hong Kong999077 Hong Kong College of Computer and Big Data Fuzhou University Fuzhou350108 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan250014 China
Semi-supervised techniques for medical image segmentation have demonstrated potential, effectively training models using scarce labeled data alongside a wealth of unlabeled data. Therefore, semi-supervised medical ima... 详细信息
来源: 评论
Prototype Guided Personalized Federated Intrusion Detection system
Prototype Guided Personalized Federated Intrusion Detection ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Long Cheng Huiru Yan Hanlin Zhou Ying Wang Haichuan Tang Fang Fang State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering North China Electric Power University Beijing China Chinese Academy of Sciences Institute of Computing Technology Beijing China AI Lab of CRRC Academy Beijing China
Preventing network attacks and protecting user privacy are consistently hot research topics in the Internet of Things (IoT) and edge computing fields. Recent advancements in Federated Learning (FL) have shown promise ... 详细信息
来源: 评论
LOG-LIO2: A LiDAR-Inertial Odometry with Efficient Uncertainty Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Kai Zhao, Junqiao Lin, Jiaye Zhu, Zhongyang Song, Shuangfu Ye, Chen Feng, Tiantian The School of Surveying and Geo-Informatics Tongji University Shanghai China Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai China The MOE Key Lab of Embedded System and Service Computing Tongji University Shanghai China Institute of Intelligent Vehicles Tongji University Shanghai China
Uncertainty in LiDAR measurements, stemming from factors such as range sensing, is crucial for LIO (LiDAR-Inertial Odometry) systems as it affects the accurate weighting in the loss function. While recent LIO systems ... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论