咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 971 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,561 篇 工学
    • 1,010 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 168 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 434 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 32 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 35 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,228 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2414 条 记 录,以下是791-800 订阅
排序:
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
A Hybrid Routing Algorithm based on Destruction Resistance Cost and Reliability in Flying Ad-Hoc Networks  7
A Hybrid Routing Algorithm based on Destruction Resistance C...
收藏 引用
7th International Conference on Computer and Communications, ICCC 2021
作者: Guo, Kun Wang, Dongbin Zhi, Hui Gao, Yibo Zhang, Tao Lv, Tiejun Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory For Mobile Network Beijing China TravelSky Technology Limited Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China China Academy of Launch Vehicle Technology Beijing China
Existing routing algorithms in Flying Ad-Hoc Net- works (FANETs) lack the optimization consideration of destruction resistance cost caused by routing recovery when some nodes fail suddenly. In this paper, we propose a... 详细信息
来源: 评论
A Double-Shell Structured Ransomware Defense Method Tailored for the RaaS Model  3rd
A Double-Shell Structured Ransomware Defense Method Tailored...
收藏 引用
3rd International Conference on Cyberspace Simulation and Evaluation, CSE 2024
作者: Chen, Monan Ji, Tiantian Li, Shudong Zhang, Yuntao Wang, Tian Mao, Kai Sun, Yanwei Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Peng Cheng Laboratory Shenzhen China Zhongguancun Laboratory Beijing China
Ransomware attacks have become a significant cybersecurity threat, with the Ransomware as a service (RaaS) paradigm enabling attackers with limited technical expertise to launch sophisticated campaigns. There is curre... 详细信息
来源: 评论
OneForecast: A Universal Framework for Global and Regional Weather Forecasting
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Yuan Wu, Hao Shu, Ruiqi Dong, Huanshuo Xu, Fan Chen, Rui Yan, Yibo Wen, Qingsong Hu, Xuming Wang, Kun Wu, Jiahao Li, Qing Xiong, Hui Huang, Xiaomeng Department of Earth System Science Ministry of Education Key Laboratory for Earth System Modeling Institute for Global Change Studies Tsinghua University China TEG Tencent China Department and Computer and Science University of Science and Technology of China China Institute for Interdisciplinary Information Sciences Tsinghua University China Department of Computer Science and Engineering The HongKong University of Science and Technology Hong Kong AI Thrust The Hong Kong University of Science and Technology Guangzhou China Squirrel Ai Learning China School of Computer Science and Engineering Nanyang Technological University Singapore Department of Computing The Hong Kong Polytechnic University Hong Kong
Accurate weather forecasts are important for disaster prevention, agricultural planning, and water resource management. Traditional numerical weather prediction (NWP) methods offer physically interpretable high-accura... 详细信息
来源: 评论
Rate Control for VVC Intra Coding with Simplified Cubic Rate-Distortion Model
Rate Control for VVC Intra Coding with Simplified Cubic Rate...
收藏 引用
IEEE Workshop on Multimedia Signal Processing
作者: Yizhao Wang Jiaqi Zhang Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing China
In this paper, we propose a simplified cubic polynomial R-D model with corresponding rate control methods for Versatile Video Coding (VVC) intra frame coding. First, we explore the rate-distortion (R-D) characteristic...
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Learning
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Lea...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Weipeng Cao Xuyang Yao Zhiwu Xu Yinghui Pan Yixuan Sun Dachuan Li Bohua Qiu Muheng Wei Guangdong Laboratory of Artificial Intelligence and Digital Economy (Shenzhen) Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Stony Brook University New York United States Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China ZhenDui Industry Artificial Intelligence Co. Ltd Shenzhen China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
Realizing Generalized Zero-Shot Learning (GZSL) based on large models is emerging as a prevailing trend. However, most existing methods merely regard large models as black boxes, solely leveraging the features output ... 详细信息
来源: 评论
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism
From Passive to Active: Near-optimal DNS-based Data Exfiltra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Jiawen Diao Binxing Fang Xiang Cui Zhongru Wang Tian Wang Shouyou Song Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications) Ministry of Education Beijing China Zhongguancun Laboratory Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
DNS-based data exfiltration has become increasingly popular among advanced persistent threat (APT) attackers owing to the ubiquity and penetrability of the DNS protocol. AI-powered methods solve the defect that attack... 详细信息
来源: 评论
RIPPB: A Robust and Improved PBFT Protocol for Blockchain
RIPPB: A Robust and Improved PBFT Protocol for Blockchain
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Meng Ding Heng He Rui Qiao Xiaohu Zhou School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China School of Computing Engineering and Built Environment Birmingham City University Birmingham UK
In this paper, we propose RIPPB, a robust and improved PBFT protocol for Blockchain, to improve the quality of service for blockchain applications. At RIPPB, we introduce reputation for nodes and use reputation as the... 详细信息
来源: 评论
Two-stream Hierarchical Similarity Reasoning for Image-text Matching
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Ran Wang, Hanli Wang, Lei Kwong, Sam The Department of Computer Science & Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China Frontiers Science Center for Intelligent Autonomous Systems Shanghai201210 China DeepBlue Academy of Sciences Shanghai200336 China The Department of Computer Science City University of Hong Kong Hong Kong
Reasoning-based approaches have demonstrated their powerful ability for the task of image-text matching. In this work, two issues are addressed for image-text matching. First, for reasoning processing, conventional ap... 详细信息
来源: 评论