咨询与建议

限定检索结果

文献类型

  • 2,399 篇 会议
  • 1,989 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,404 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,880 篇 工学
    • 1,964 篇 计算机科学与技术...
    • 1,527 篇 软件工程
    • 601 篇 信息与通信工程
    • 386 篇 电气工程
    • 369 篇 控制科学与工程
    • 327 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 222 篇 机械工程
    • 206 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 155 篇 仪器科学与技术
    • 145 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 103 篇 交通运输工程
    • 101 篇 网络空间安全
    • 90 篇 材料科学与工程(可...
    • 84 篇 土木工程
    • 84 篇 安全科学与工程
    • 80 篇 建筑学
  • 1,447 篇 理学
    • 708 篇 数学
    • 395 篇 物理学
    • 310 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 156 篇 化学
    • 144 篇 系统科学
  • 764 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 179 篇 医学
    • 148 篇 临床医学
    • 115 篇 基础医学(可授医学...
  • 117 篇 法学
  • 73 篇 经济学
  • 53 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 104 篇 feature extracti...
  • 92 篇 semantics
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 72 篇 computer science
  • 67 篇 training
  • 65 篇 computer archite...
  • 59 篇 optimization
  • 59 篇 cloud computing
  • 57 篇 servers
  • 56 篇 laboratories
  • 55 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 48 篇 machine learning
  • 45 篇 data models
  • 43 篇 resource managem...

机构

  • 131 篇 school of comput...
  • 101 篇 national enginee...
  • 95 篇 hubei province k...
  • 90 篇 school of comput...
  • 79 篇 department of co...
  • 53 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 38 篇 university of ch...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 33 篇 key laboratory o...

作者

  • 234 篇 hai jin
  • 188 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,641 篇 英文
  • 629 篇 其他
  • 149 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4404 条 记 录,以下是1221-1230 订阅
排序:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge
FlowMur: A Stealthy and Practical Audio Backdoor Attack with...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Jiahe Lan Jie Wang Baochen Yan Zheng Yan Elisa Bertino The State Key Laboratory on Integrated Services Networks School of Cyber Engineering Xidian University China Hangzhou Institute of Technology Xidian University China Department of Computer Science Purdue University USA
Speech recognition systems driven by Deep Neural Networks (DNNs) have revolutionized human-computer interaction through voice interfaces, which significantly facilitate our daily lives. However, the growing popularity... 详细信息
来源: 评论
Towards improving detection performance for malware with a correntropy-based deep learning method
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 570-579页
作者: Xiong Luo Jianyuan Li Weiping Wang Yang Gao Wenbing Zhao School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing100083China Beijing Intelligent Logistics System Collaborative Innovation Center Beijing101149China China Information Technology Security Evaluation Center Beijing100085China Department of Electrical Engineering and Computer Science Cleveland State UniversityClevelandOH44115USA
With the rapid development of Internet of Things(IoT)technologies,the detection and analysis of malware have become a matter of concern in the industrial application of Cyber-Physical system(CPS)that provides various ... 详细信息
来源: 评论
Research on neutron source accelerators visual-real fusion fault diagnosis with Digital Twin
Research on neutron source accelerators visual-real fusion f...
收藏 引用
Electronic Information Engineering and computer Communication (EIECC), International Conference on
作者: Sheng Yang Xiaodan Zhang Lizhen Liang Shaoqing Liu Xiaolong Wang School of Computer Technology and Applications Qinghai University Xining China Intelligent Computing and Application Laboratory of Qinghai Province Xining China Hefei Comprehensive National Science Center Institute of Energy Hefei China
To address the intelligent upgrading needs of neutron source accelerators, a digital twin visualization system was designed and developed based on digital twin technology. The virtual mapping model was constructed in ... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
WiNet: Wavelet-based Incremental Learning for Efficient Medical Image Registration
arXiv
收藏 引用
arXiv 2024年
作者: Cheng, Xinxing Jia, Xi Lu, Wenqi Li, Qiufu Shen, Linlin Krull, Alexander Duan, Jinming School of Computer Science University of Birmingham BirminghamB15 2TT United Kingdom Department of Computing and Mathematics Manchester Metropolitan University ManchesterM15 6BH United Kingdom National Engineering Laboratory for Big Data System Computing Technology Shenzhen University 518060 China
Deep image registration has demonstrated exceptional accuracy and fast inference. Recent advances have adopted either multiple cascades or pyramid architectures to estimate dense deformation fields in a coarse-to-fine... 详细信息
来源: 评论
Boosting the Restoring Performance of Deduplication Data by Classifying Backup Metadata
收藏 引用
ACM/IMS Transactions on Data science 2021年 第2期2卷 1–16页
作者: Yang, Ru Deng, Yuhui Zhou, Yi Huang, Ping Department of Computer Science Jinan University Guangzhou510632 China Department of Computer Science Jinan University China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China TSYS School of Computer Science Columbus State University Doimukh Georgia College of Engineering Temple University United States
Restoring data is the main purpose of data backup in storage systems. The fragmentation issue, caused by physically scattering logically continuous data across a variety of disk locations, poses a negative impact on t... 详细信息
来源: 评论
SpatioTemporal Learning for Human Pose Estimation in Sparsely-Labeled Videos
arXiv
收藏 引用
arXiv 2025年
作者: Jiao, Yingying Wang, Zhigang Wu, Sifan Fan, Shaojing Liu, Zhenguang Xu, Zhuoyue Wu, Zheqi College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Technology Zhejiang Gongshang University China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Human pose estimation in videos remains a challenge, largely due to the reliance on extensive manual annotation of large datasets, which is expensive and labor-intensive. Furthermore, existing approaches often struggl... 详细信息
来源: 评论
An Adaptive Bionic Sensor: Enhancing Ankle Joint Tracking with High Sensitivity and Superior Cushioning Performance
SSRN
收藏 引用
SSRN 2024年
作者: Jin, Jianqiao Zhang, Chen Zhao, Jianyuan Yu, Minghan Lei, Ming Jin, Chun Yin, Rui Zhao, Weiwei Sauvage Laboratory for Smart Materials The School of Integrated Circuit Harbin Institute of Technology Shenzhen518055 China Shenzhen Key Laboratory of Flexible Printed Electronics Technology Harbin Institute of Technology Shenzhen518055 China State Key Laboratory of Advanced Welding & Joining Harbin Institute of Technology Harbin150001 China Human-Computer Interaction Design Lab School of System Design and Intelligent Manufacturing Southern University of Science and Technology Shenzhen518055 China
Flexible sensors are renowned for their rapid responsiveness, high flexibility, and outstanding mechanical properties, making them ideal for applications in wearable devices, sports and health monitoring, and human-ma... 详细信息
来源: 评论
BuildEnVR: An Immersive Analysis system for Environmental Field
BuildEnVR: An Immersive Analysis System for Environmental Fi...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Zhenghan Zhou Kebin Liu Yantong Xie Hangxu Jin Shi Liu Ruiqing Wang Haitian Zhao Borong Lin Xiaofang Mu Hui Qi Global Innovation Exchange Tsinghua University Fuzhou Fuyao Institute for Advanced Study School of Architecture Carnegie Mellon University School of Architecture Tsinghua University College of Computer Science and Technology Taiyuan Normal University Shanxi Key Laboratory of Intelligent Optimization Computing and Blockchain Technology
Amidst global warming and escalating extreme weather events, indoor environmental quality’s impact on human health and public hygiene gains prominence. Environmental parameters exist essentially as fields, which are ... 详细信息
来源: 评论