咨询与建议

限定检索结果

文献类型

  • 678 篇 会议
  • 500 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 792 篇 工学
    • 490 篇 计算机科学与技术...
    • 385 篇 软件工程
    • 168 篇 信息与通信工程
    • 115 篇 控制科学与工程
    • 92 篇 电气工程
    • 77 篇 机械工程
    • 73 篇 电子科学与技术(可...
    • 57 篇 生物工程
    • 46 篇 交通运输工程
    • 40 篇 仪器科学与技术
    • 36 篇 光学工程
    • 35 篇 化学工程与技术
    • 33 篇 生物医学工程(可授...
    • 28 篇 材料科学与工程(可...
    • 26 篇 动力工程及工程热...
    • 26 篇 网络空间安全
    • 21 篇 安全科学与工程
  • 414 篇 理学
    • 257 篇 数学
    • 75 篇 物理学
    • 75 篇 统计学(可授理学、...
    • 66 篇 生物学
    • 55 篇 系统科学
    • 30 篇 化学
    • 18 篇 大气科学
  • 226 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 44 篇 医学
    • 34 篇 临床医学
    • 26 篇 基础医学(可授医学...
  • 39 篇 法学
    • 32 篇 社会学
  • 15 篇 经济学
  • 9 篇 农学
  • 8 篇 教育学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 43 篇 feature extracti...
  • 28 篇 training
  • 27 篇 semantics
  • 24 篇 web services
  • 21 篇 petri nets
  • 20 篇 computational mo...
  • 20 篇 accuracy
  • 18 篇 federated learni...
  • 17 篇 conferences
  • 17 篇 laboratories
  • 16 篇 data mining
  • 15 篇 throughput
  • 15 篇 neural networks
  • 15 篇 optimization
  • 15 篇 data models
  • 14 篇 signal processin...
  • 14 篇 educational tech...
  • 14 篇 costs
  • 14 篇 computer vision
  • 13 篇 resource managem...

机构

  • 120 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 90 篇 key laboratory o...
  • 79 篇 department of co...
  • 71 篇 the key laborato...
  • 56 篇 key laboratory o...
  • 44 篇 key laboratory o...
  • 34 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 28 篇 shandong provinc...
  • 24 篇 shandong provinc...
  • 23 篇 key laboratory o...
  • 18 篇 tianjin key labo...
  • 17 篇 college of compu...
  • 17 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 shanghai artific...
  • 14 篇 tianjin key lab ...
  • 13 篇 the key laborato...

作者

  • 31 篇 changjun jiang
  • 30 篇 zhou mengchu
  • 28 篇 jiang changjun
  • 21 篇 cheng wang
  • 20 篇 zhang hua
  • 19 篇 yan chungang
  • 18 篇 ding zhijun
  • 18 篇 wang chundong
  • 16 篇 wang cheng
  • 16 篇 wang hanli
  • 16 篇 xiao yingyuan
  • 14 篇 miao duoqian
  • 13 篇 liu xiwei
  • 13 篇 mengchu zhou
  • 13 篇 chungang yan
  • 12 篇 zhang degan
  • 11 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 11 篇 fu chong
  • 11 篇 xu guangping

语言

  • 1,089 篇 英文
  • 50 篇 其他
  • 47 篇 中文
检索条件"机构=Service Computing Technology and System Laboratory of Ministry of Education"
1180 条 记 录,以下是241-250 订阅
排序:
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model  7
Automated Crash Analysis and Exploit Generation with Extenda...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Liu, Zhehui Wang, Zhongru Zhang, Yuntao Liu, Tong Fang, Binxing Pang, Zhengyuan Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Chinese Academy of Cyberspace Studies Beijing China North China University of Technology School of Information Science and Technology Beijing100144 China Beijing DigApis Technology Co. Ltd Beijing100871 China JiangSu DigApis Technology Co. Ltd Jiangsu Nantong226000 China
Recently, more and more software vulnerabilities are disclosed and researchers tend to study on automatically discover and exploit the vulnerabilities. However, the main challenges of automated exploit generation are:... 详细信息
来源: 评论
Automated Vulnerability Discovery system Based on Hybrid Execution  7
Automated Vulnerability Discovery System Based on Hybrid Exe...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Liu, Tong Wang, Zhongru Zhang, Yuntao Liu, Zhehui Fang, Binxing Pang, Zhengyuan Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Chinese Academy of Cyberspace Studies Beijing China North China University of Technology School of Information Science and Technology Beijing100144 China Beijing DigApis Technology Co. Ltd Beijing100871 China JiangSu DigApis Technology Co. Ltd Jiangsu Nantong226000 China
At present, program vulnerabilities occur frequently, which seriously threatens the security of cyberspace. Automated vulnerability discovery technology has attracted more and more attention because of its efficiency ... 详细信息
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
Network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论
STAD: Joint Spatial-Temporal Dimension and Channel Correlation for Time Series Anomaly Detection
STAD: Joint Spatial-Temporal Dimension and Channel Correlati...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Mingle Zhou Xingli Wang Delong Han Jin Wan Jiachen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd
Accurately identifying real anomalies and pseudo-anomalies in complex multi-dimensional time series data has been a difficult problem in time series anomaly detection. To solve this problem, this paper proposes a new ... 详细信息
来源: 评论
Symbiosis Rather Than Aggregation: Towards Generalized Federated Learning via Model Symbiosis
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Yuange Liu, Yuru Zhang, Weishan Zheng, Chaoqun Jiang, Wei Luo, Daobin Qiao, Qiao Meng, Lingzhao Zhao, Hongwei Yang, Su College of Computer Science and Technology Qingdao266580 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China Information Science Academy of China Electronics Technology Group Corporation Beijing100036 China Fudan University School of Computer Science Shanghai200433 China
Federated Learning (FL) faces significant challenges in scenarios with non-IID (non-independent and identically distributed) data distributions across participating clients. Traditional aggregation-based approaches of... 详细信息
来源: 评论
Emotion Recognition Empowered Human-Computer Interaction with Domain Adaptation Network
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Chen, Junxin Northeastern University School of Computer Science and Engineering Shenyang110004 China Dalian University of Technology China The School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China Dalian University of Technology School of Software Dalian116621 China
Multi-modal emotion recognition plays a vital role in the human-computer interaction (HCI) for consumer electronics. Nowadays, many studies have developed multi-modal fusion algorithms for this ***, two challenging is... 详细信息
来源: 评论
A Time-Efficient Distributed Constant Conditional Functional Dependency Discovery Algorithm for Data Consistency
A Time-Efficient Distributed Constant Conditional Functional...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Junchao Chen Jian-tao Zhou Xinyu Hao Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology College of Computer Science Inner Mongolia University Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China
The accuracy of data analysis depends on data quality, and addressing data consistency issues is a key challenge to improve it. Constant Conditional Functional Dependency (CCFD) is an effective approach that ensures d... 详细信息
来源: 评论
Workflow Scheduling Method in Multi-Cluster Environments Using Tasks' Spatiotemporal Attributes
Workflow Scheduling Method in Multi-Cluster Environments Usi...
收藏 引用
Electronic Information Engineering and Computer Communication (EIECC), International Conference on
作者: Yudong Geng Jing Chen Honghua Yan Qingshui Hao Aimin Zhang Tianxiang Zhang Mingchao Ji Tonglin Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Greenthink Electric Power Technology Co. Ltd Jinan China
Nowadays, computing resources are widely distributed and diverse, and the demand for efficient execution of various workflow tasks on wide-area resources has been raised. multi-objection scheduling method based on spa... 详细信息
来源: 评论
Bag2image: A Multi-Instance Network Traffic Representation for Network Security Event Prediction
SSRN
收藏 引用
SSRN 2024年
作者: Zhang, Jiachen Han, Daoqi Lv, Zhaoxuan Liu, Yang Lu, Yueming Duan, Junke Zhang, Xinyu School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Automation Beijing Institute of Technology Beijing China Beijing Institute of Astronautical Systems Engineering Beijing China
In practical scenarios, security events triggered by abnormal network traffic often result from the collective behavior of multiple data streams, embodying group security events with collective characteristics. Existi... 详细信息
来源: 评论
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events
EventTrojan: Manipulating Non-Intrusive Speech Quality Asses...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Ying Ren Kailai Shen Zhe Ye Diqun Yan Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Juphoon System Software Co. Ltd Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-Intrusive speech quality assessment (NISQA) has gained significant attention for predicting speech’s mean opinion score (MOS) without requiring the reference speech. Researchers have gradually started to apply NI... 详细信息
来源: 评论