咨询与建议

限定检索结果

文献类型

  • 681 篇 会议
  • 502 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,185 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 797 篇 工学
    • 496 篇 计算机科学与技术...
    • 384 篇 软件工程
    • 169 篇 信息与通信工程
    • 122 篇 控制科学与工程
    • 92 篇 电气工程
    • 77 篇 机械工程
    • 73 篇 电子科学与技术(可...
    • 57 篇 生物工程
    • 47 篇 交通运输工程
    • 40 篇 仪器科学与技术
    • 35 篇 光学工程
    • 35 篇 化学工程与技术
    • 33 篇 生物医学工程(可授...
    • 28 篇 材料科学与工程(可...
    • 27 篇 网络空间安全
    • 26 篇 动力工程及工程热...
    • 21 篇 安全科学与工程
  • 411 篇 理学
    • 256 篇 数学
    • 75 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 66 篇 生物学
    • 55 篇 系统科学
    • 30 篇 化学
    • 18 篇 大气科学
  • 225 篇 管理学
    • 137 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 44 篇 医学
    • 34 篇 临床医学
    • 26 篇 基础医学(可授医学...
  • 39 篇 法学
    • 32 篇 社会学
  • 15 篇 经济学
  • 9 篇 农学
  • 7 篇 教育学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 43 篇 feature extracti...
  • 28 篇 training
  • 27 篇 semantics
  • 24 篇 web services
  • 21 篇 petri nets
  • 20 篇 computational mo...
  • 20 篇 federated learni...
  • 20 篇 accuracy
  • 17 篇 conferences
  • 17 篇 laboratories
  • 16 篇 data mining
  • 15 篇 throughput
  • 15 篇 neural networks
  • 15 篇 optimization
  • 15 篇 data models
  • 14 篇 signal processin...
  • 14 篇 educational tech...
  • 14 篇 costs
  • 14 篇 computer vision
  • 13 篇 resource managem...

机构

  • 120 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 90 篇 key laboratory o...
  • 78 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 34 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 28 篇 shandong provinc...
  • 27 篇 shandong provinc...
  • 23 篇 key laboratory o...
  • 18 篇 tianjin key labo...
  • 17 篇 college of compu...
  • 17 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 shanghai artific...
  • 14 篇 tianjin key lab ...
  • 13 篇 the key laborato...

作者

  • 31 篇 changjun jiang
  • 30 篇 zhou mengchu
  • 28 篇 jiang changjun
  • 21 篇 cheng wang
  • 20 篇 zhang hua
  • 19 篇 yan chungang
  • 18 篇 ding zhijun
  • 18 篇 wang chundong
  • 16 篇 wang cheng
  • 16 篇 wang hanli
  • 16 篇 xiao yingyuan
  • 13 篇 mengchu zhou
  • 13 篇 miao duoqian
  • 13 篇 chungang yan
  • 12 篇 liu xiwei
  • 12 篇 zhang degan
  • 11 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 11 篇 fu chong
  • 11 篇 xu guangping

语言

  • 1,089 篇 英文
  • 55 篇 其他
  • 47 篇 中文
检索条件"机构=Service Computing Technology and System Laboratory of Ministry of Education"
1185 条 记 录,以下是101-110 订阅
排序:
Research and Application of Speech Transmission Index in Acoustic Leakage Detection  17
Research and Application of Speech Transmission Index in Aco...
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Hao, Qiuyun Wang, FuQiang Zhang, Peng Ma, XiaoFeng Zhang, Jianqiang Zhao, Wei Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding  6
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Wang, Yu Wu, Xiaoming Yuan, Qile Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
Implementation Analysis of Reachability Graph and Its Application in Net Learning
Implementation Analysis of Reachability Graph and Its Applic...
收藏 引用
Computer, Control and Robotics (ICCCR), International Conference on
作者: Mingjian Guang Chungang Yan Zihao Lu Rui Duan Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China
Reachability represents the most fundamental dynamic property of Petri nets. The reachability graph serves as a crucial tool for analyzing reachability, and its generation algorithm has garnered widespread attention. ... 详细信息
来源: 评论
Security and privacy with opacity-based state observation for finite state machine
Security and privacy with opacity-based state observation fo...
收藏 引用
作者: Zhang, Zhipeng Xia, Chengyi Chen, Shengyong Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China
Topics on security and privacy are very fundamental and important in the Internet of Things (IoT). In this paper, we explore the impact of state observation on the opacity of IoT, which is modeled by Moore-type finite... 详细信息
来源: 评论
A Novel Hybrid Makeup Transfer Method Based on Latent Vector Manipulation  2
A Novel Hybrid Makeup Transfer Method Based on Latent Vector...
收藏 引用
2nd International Conference on Artificial Intelligence and Computer Information technology, AICIT 2023
作者: Li, Yumiao Li, Peng Shen, Ziqi Li, Wenhui Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourism Xi'an710119 China School of Computer Science Shaanxi Normal University Xi'an710119 China Key Laboratory of Modern Teaching Technology Ministry of Education Xi'an710062 China Engineering Laboratory of Teaching Information Technology of Shaanxi Province Xi'an710119 China Xi'an Key Laboratory of Cultural Tourism Resources Development and Utilization Xi'an710062 China
With the development of image processing technology and the improvement of people's living standards, there is a wide demand for makeup services in society. In this paper, we focus on style transfer and its applic... 详细信息
来源: 评论
OpenDrift: Online Evolving Fraud Detection for Open-Category and Concept-Drift Transactions
OpenDrift: Online Evolving Fraud Detection for Open-Category...
收藏 引用
IEEE International Conference on Web services (ICWS)
作者: Cheng Wang Songyao Chai Hangyu Zhu Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China Shanghai Artificial Intelligence Laboratory Shanghai China
The rapid growth of electronic commerce brings convenience to modern life but comes with security risks by various cybercrimes in online payment services. Most existing security methods for fraud detection depend on t...
来源: 评论
A Sentiment Classification Model Based on Attention TIG-CNN-BiGRU
A Sentiment Classification Model Based on Attention TIG-CNN-...
收藏 引用
2023 International Conference on Culture-Oriented Science and technology, CoST 2023
作者: Li, Peng Liang, Tianmian An, Ning Zhang, Lichen Wu, Xiaojun Wang, Xiaoming Lu, Junling Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourism Xi'an710119 China School of Computer Science Shaanxi Normal University Xi'an710119 China Key Laboratory of Modern Teaching Technology Ministry of Education Xi'an710062 China Engineering Laboratory of Teaching Information Technology of Shaanxi Province Xi'an710119 China Xi'An Key Laboratory of Cultural Tourism Resources Development and Utilization Xi'an710062 China
The uniqueness of folk song expression forms and complex semantic relationships, and the existing models are not good at recognizing the emotion category of folk song lyrics, so an attention TIG-CNN-BiGRU based emotio... 详细信息
来源: 评论
ACDR-CRAFF Net: A Multi-Scale Network Based on Adaptive Channel and Coordinate Relational Attention Network for Remote Sensing Scene Classification
收藏 引用
IET Image Processing 2025年 第1期19卷
作者: Dai, Wei Xu, Haixia Shi, Furong Yuan, Liming Wang, Xinyu Wen, Xianbin School of Computer Science and Engineering Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
Accurate classification of remote sensing scene images is crucial for diverse applications, from environmental monitoring to urban planning. While convolutional neural networks (CNNs) have dramatically improved classi... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论