咨询与建议

限定检索结果

文献类型

  • 678 篇 会议
  • 500 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 792 篇 工学
    • 490 篇 计算机科学与技术...
    • 385 篇 软件工程
    • 168 篇 信息与通信工程
    • 115 篇 控制科学与工程
    • 92 篇 电气工程
    • 77 篇 机械工程
    • 73 篇 电子科学与技术(可...
    • 57 篇 生物工程
    • 46 篇 交通运输工程
    • 40 篇 仪器科学与技术
    • 36 篇 光学工程
    • 35 篇 化学工程与技术
    • 33 篇 生物医学工程(可授...
    • 28 篇 材料科学与工程(可...
    • 26 篇 动力工程及工程热...
    • 26 篇 网络空间安全
    • 21 篇 安全科学与工程
  • 414 篇 理学
    • 257 篇 数学
    • 75 篇 物理学
    • 75 篇 统计学(可授理学、...
    • 66 篇 生物学
    • 55 篇 系统科学
    • 30 篇 化学
    • 18 篇 大气科学
  • 226 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 44 篇 医学
    • 34 篇 临床医学
    • 26 篇 基础医学(可授医学...
  • 39 篇 法学
    • 32 篇 社会学
  • 15 篇 经济学
  • 9 篇 农学
  • 8 篇 教育学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 43 篇 feature extracti...
  • 28 篇 training
  • 27 篇 semantics
  • 24 篇 web services
  • 21 篇 petri nets
  • 20 篇 computational mo...
  • 20 篇 accuracy
  • 18 篇 federated learni...
  • 17 篇 conferences
  • 17 篇 laboratories
  • 16 篇 data mining
  • 15 篇 throughput
  • 15 篇 neural networks
  • 15 篇 optimization
  • 15 篇 data models
  • 14 篇 signal processin...
  • 14 篇 educational tech...
  • 14 篇 costs
  • 14 篇 computer vision
  • 13 篇 resource managem...

机构

  • 120 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 90 篇 key laboratory o...
  • 79 篇 department of co...
  • 71 篇 the key laborato...
  • 56 篇 key laboratory o...
  • 44 篇 key laboratory o...
  • 34 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 28 篇 shandong provinc...
  • 24 篇 shandong provinc...
  • 23 篇 key laboratory o...
  • 18 篇 tianjin key labo...
  • 17 篇 college of compu...
  • 17 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 shanghai artific...
  • 14 篇 tianjin key lab ...
  • 13 篇 the key laborato...

作者

  • 31 篇 changjun jiang
  • 30 篇 zhou mengchu
  • 28 篇 jiang changjun
  • 21 篇 cheng wang
  • 20 篇 zhang hua
  • 19 篇 yan chungang
  • 18 篇 ding zhijun
  • 18 篇 wang chundong
  • 16 篇 wang cheng
  • 16 篇 wang hanli
  • 16 篇 xiao yingyuan
  • 14 篇 miao duoqian
  • 13 篇 liu xiwei
  • 13 篇 mengchu zhou
  • 13 篇 chungang yan
  • 12 篇 zhang degan
  • 11 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 11 篇 fu chong
  • 11 篇 xu guangping

语言

  • 1,089 篇 英文
  • 50 篇 其他
  • 47 篇 中文
检索条件"机构=Service Computing Technology and System Laboratory of Ministry of Education"
1180 条 记 录,以下是171-180 订阅
排序:
Hybrid Variational Autoencoder for Collaborative Filtering  25
Hybrid Variational Autoencoder for Collaborative Filtering
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Liu, Jinxin Xiao, Yingyuan Zhu, Ke Zheng, Wenguang Hsu, Ching-Hsien Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Asia University Department of Computer Science and Information Engineering Taichung Taiwan
In recent years, Variational AutoEncoder (VAE) based methods have made many important achievements in the field of collaborative filtering recommendation system. VAE is a kind of Bayesian model which combines latent v... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Structure-Aware Generative Adversarial Network for Text-to-Image Generation
Structure-Aware Generative Adversarial Network for Text-to-I...
收藏 引用
IEEE International Conference on Image Processing
作者: Wenjie Chen Zhangkai Ni Hanli Wang Department of Computer Science and Technology Tongji University Shanghai P. R. China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai P. R. China
Text-to-image generation aims at synthesizing photo-realistic images from textual descriptions. Existing methods typically align images with the corresponding texts in a joint semantic space. However, the presence of ...
来源: 评论
Long and Recent Preference Learning with Recent-k Items Distribution for Recommender system
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Gao, Yongbiao Niu, Sijie Lv, Guohua Ling, Miaogen Geng, Xin Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China Southeast University Ministry of Education Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing School of Information Science and Engineering China Nanjing University of Information Science and Technology School of Computer Science China Southeast University School of Computer Science and Engineering China
Reinforcement learning (RL) aims to formulate the recommendation task as a Markov decision process (MDP) and trains an agent to automatically learn the optimal recommendation policy from interaction trajectories throu... 详细信息
来源: 评论
A Grouping Strategy-Based Progressive Fusion Network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论
A Novel Home Safety IoT Monitoring Method Based on ZigBee Networking
A Novel Home Safety IoT Monitoring Method Based on ZigBee Ne...
收藏 引用
International Conference on Wireless Communications, Networking and Applications, WCNA 2021
作者: An, Ning Li, Peng Wang, Xiaoming Wu, Xiaojun Dang, Yuntong School of Computer Science Shaanxi Normal University Xi’an710119 China Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourism Xi’an710119 China Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an710062 China Engineering Laboratory of Teaching Information Technology of Shaanxi Province Xi’an710119 China School of Music Shaanxi Normal University Xi’an710119 China
This paper realizes the design of home safety early warning system by studying the wireless communication networking technology of ZigBee and WiFi, as well as sensor communication technology, which is based on taking ... 详细信息
来源: 评论
A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples  7
A DNS-based Data Exfiltration Traffic Detection Method for U...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Ruiling, Gan Jiawen, Diao Xiang, Cui Shouyou, Song QI-ANXIN Technology Group Beijing China Beijing University of Posts and Telecommunications Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Guangzhou University Cyberspace Institute Advanced Technology Guangzhou China Beijing DigApis Technology Co. Ltd Beijing China
The advanced persistent threat (APT) is one of the most serious threats to cyberspace security. Posting back of exfiltrated data by way of DNS covert channels has become increasingly popular among APT attackers. Early... 详细信息
来源: 评论
Optimizing Batched Small Matrix Multiplication on Multi-core DSP Architecture
Optimizing Batched Small Matrix Multiplication on Multi-core...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Xiaohan Zuo Chunhua Xiao Qinglin Wang Chen Shi College of Computer Science Chongqing University China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha China
General Matrix Multiplication (GEMM) is a critical computational operation in scientific computing and machine learning domains. While traditional GEMM performs well on large matrices, it is inefficient in terms of da... 详细信息
来源: 评论
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive Learning Framework for Drug-Target Binding Affinity Prediction
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive L...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Huiting Li Weiyu Zhang Yong Shang Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Drug-target binding affinity prediction is critical to drug design. Some existing computational methods rely on single-scale data and cannot fully integrate the rich information of multi-scale data, such as molecular ... 详细信息
来源: 评论