咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 972 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,564 篇 工学
    • 1,013 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 436 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 61 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,229 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2415 条 记 录,以下是681-690 订阅
排序:
Circular Formation Control for Networked Dynamic Autonomous Underwater Vehicles: Estimator-Based Approaches
收藏 引用
IEEE Transactions on Control of Network systems 2025年
作者: Xie, Jingjing Lan, Weiyao Tong, Feng Yu, Xiao Xiamen University Department of Automation China Xiamen University College of Ocean and Earth Sciences The National and Local Joint Engineering Research Center for Navigation and Location Service Technology Xiamen361005 China Xiamen University Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China The Institute of Artificial Intelligence Xiamen361005 China
This paper investigates the circular formation control problem of networked dynamic autonomous underwater vehicles (AUVs) in a directed network. The objective is to make dynamic AUVs encircle a given target with speci... 详细信息
来源: 评论
Not All Image Regions Matter: Masked Vector Quantization for Autoregressive Image Generation
Not All Image Regions Matter: Masked Vector Quantization for...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Mengqi Huang Zhendong Mao Quan Wang Yongdong Zhang University of Science and Technology of China Hefei China Institute of Artificial intelligence Hefei Comprehensive National Science Center Hefei China MOE Key Laboratory of Trustworthy Beijing University of Posts and Telecommunications Distributed Computing and Service Beijing China
Existing autoregressive models follow the two-stage generation paradigm that first learns a codebook in the latent space for image reconstruction and then completes the image generation autoregressively based on the l...
来源: 评论
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Yu, Zitong Wang, Tianyi Huang, Xiaobin Shen, Linlin Gao, Zan Ren, Jianfeng Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China Jinan250014 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China School of Computer Science University of Nottingham Ningbo China
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable. Thus, benchmarking and advancing tec... 详细信息
来源: 评论
Construction and Application of the SMART Model for Adaptive Industrial Data Collection Based on Knowledge Graphs
Construction and Application of the SMART Model for Adaptive...
收藏 引用
IEEE International Conference on Big Data
作者: Wendan Cheng Zhen Zhang Heng Qian Qiuyue Wang Guanqun Su Lingge Meng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shu Ju (Shandong) Intelligent Technology Co. Ltd. Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Qingniao IIoT Co. Ltd. Jinan China
Industrial data collection is the foundation for implementing enterprise digitization, which is of great significance to the development of intelligent manufacturing. However, Industrial Data Collection Standards (IDC... 详细信息
来源: 评论
DL-SLOT: Dynamic LiDAR SLAM and object tracking based on collaborative graph optimization
arXiv
收藏 引用
arXiv 2022年
作者: Tian, Xuebo Zhu, Zhongyang Zhao, Junqiao Tian, Gengxuan Ye, Chen Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Institute of Intelligent Vehicles Tongji University Shanghai China
Ego-pose estimation and dynamic object tracking are two critical problems for autonomous driving systems. The solutions to these problems are generally based on their respective assumptions, i.e., the static world ass... 详细信息
来源: 评论
LAMPT: LAbel Mask-Predicted Transformer for Extreme Multi-label Text Classification
LAMPT: LAbel Mask-Predicted Transformer for Extreme Multi-la...
收藏 引用
IEEE International Conference on Big Data
作者: Yifan Xu Minghao Zhu Junli Wang Chungang Yan Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education. National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China
Extreme Multi-label text Classification ( XMC) is a task of recalling the most relevant labels for each given text from an extremely large-scale label set. It is emphasized that XMC is a more complex classification ta... 详细信息
来源: 评论
A permission generation and configuration method based on Rules and FP-Growth algorithm
A permission generation and configuration method based on Ru...
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Zhu, Lei Zhang, Ziheng Hei, Xinhong Wang, Yichuan Yang, Ziliang Hu, Feixiong He, Ping Xi'an University of technology School of Computer Science and Engineering Shaanxi Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi'an710048 China Shenzhen Tencent Computer System Co. Ltd Shenzhen518054 China
With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
PMU-Leaker: Performance Monitor Unit-based Realization of Cache Side-Channel Attacks
PMU-Leaker: Performance Monitor Unit-based Realization of Ca...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chunlu Wang Chang Liu Rihui Sun Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education & Tsinghua University Beijing China Tsinghua University Beijing China Harbin Institute of Technology Harbin Heilongjiang China University of Maryland College Park Maryland USA
Performance Monitor Unit (PMU) is a special hardware module in processors that contains a set of counters to record various architectural and micro-architectural events. In this paper, we propose PMU-Leaker, a novel r... 详细信息
来源: 评论