咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 971 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,561 篇 工学
    • 1,010 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 168 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 434 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 32 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 35 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,228 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2414 条 记 录,以下是871-880 订阅
排序:
PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph
PDG2Vec: Identify the Binary Function Similarity with Progra...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Yuntao Zhang Yanhao Wang Yuwei Liu Zhengyuan Pang Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China QI-ANXIN Technology Group Inc. Beijing China Chinese Academy of Sciences Institute of Software Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Binary code similarity identification is an important technique applied to many security applications (e.g., plagiarism detection, bug search). The primary challenge of this research topic is how to extract sufficient... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
Algebraic analysis and control of networked opacity with bounded communication delays
Algebraic analysis and control of networked opacity with bou...
收藏 引用
第40届中国控制会议
作者: Qian Xu Zhipeng Zhang Chengyi Xia Zengqiang Chen Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education College of Artificial Intelligence Nankai University
Networked finite state machine takes the delay factor into consideration, and its security has become an significant research topic. In this paper, we explore the impact of bounded communication delays on networked op... 详细信息
来源: 评论
Adaptive finite time stability of delayed systems via aperiodically intermittent control and quantized control
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Xiwei Ma, Hailian Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
In this brief, we set up the finite time stability (FnTSta) theory for dynamical systems with bounded timevarying delays via aperiodically intermittent control (AIC) and quantized control (QC). A more general QC is de... 详细信息
来源: 评论
Adaptive finite time stability of delayed systems with applications to network synchronization
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Xiwei Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
The finite time stability (FnTSta) theory of delayed systems has not been set up until now. In this paper, we propose a two-phases-method (2PM), to achieve this object. In the first phase, we prove that the time for n... 详细信息
来源: 评论
Global µ-stability and finite-time control of octonion-valued neural networks with unbounded delays✡
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Jingzhu Liu, Xiwei Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
Octonion-valued neural networks (OVNNs) are a type of neural networks for which the states and weights are octonions. In this paper, the global µ-stability and finite-time stability problems for octonion-valued n... 详细信息
来源: 评论
Neuromodulated Meta-Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Jingyao Guo, Huijie Qiang, Wenwen Li, Jiangmeng Zheng, Changwen Xiong, Hui Hua, Gang University of Chinese Academy of Sciences Beijing China National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China Thrust of Artificial Intelligence Hong Kong University of Science and Technology Guangzhou China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Wormpex AI Research LLC BellevueWA98004 United States
Humans excel at adapting perceptions and actions to diverse environments, enabling efficient interaction with the external world. This adaptive capability relies on the biological nervous system (BNS), which activates... 详细信息
来源: 评论
Single node injection attack against graph neural networks
arXiv
收藏 引用
arXiv 2021年
作者: Tao, Shuchang Cao, Qi Shen, Huawei Huang, Junjie Wu, Yunfan Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Node injection attack on Graph Neural Networks (GNNs) is an emerging and practical attack scenario that the attacker injects malicious nodes rather than modifying original nodes or edges to affect the performance of G... 详细信息
来源: 评论
Signed bipartite graph neural networks
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Junjie Shen, Huawei Cao, Qi Tao, Shuchang Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Signed networks are such social networks having both positive and negative links. A lot of theories and algorithms have been developed to model such networks (e.g., balance theory). However, previous work mainly focus... 详细信息
来源: 评论
SCARE of Secret Ciphers under Rough Leakage Model
收藏 引用
Security and Communication Networks 2023年 第1期2023卷
作者: Wang, Mengxing Tang, Ming Zhang, Xige Chen, Qi Ding, Haili Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430000 China Beijing Smartchip Microelectronics Technology Co. Ltd. Beijing100192 China Marketing Service Center State Grid Electric Power Co. Ltd. Ningxia750002 China
Most previousside-channel analysis-based reverse engineering (SCARE) methods were based on collision attack. However, the collision-based methods generally need noise-free traces and can hardly be verified by realisti... 详细信息
来源: 评论