咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是231-240 订阅
排序:
UAV-Assisted Dynamic Avatar Task Migration for Vehicular Metaverse services: A Multi-Agent Deep Reinforcement Learning Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第2期11卷 430-445页
作者: Jiawen Kang Junlong Chen Minrui Xu Zehui Xiong Yutao Jiao Luchao Han Dusit Niyato Yongju Tong Shengli Xie IEEE School of Automation Guangdong University of TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing based on IoT Technology Guangzhou 510006China Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of EducationGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Pillar of Information Systems Technology and Design Singapore University of Technology and DesignSingaporeSingapore College of Communication Engineering Army Engineering University of PLANanjing 210007China National Natural Science Foundation of China Beijing 100085China Key Laboratory of Intelligent Detection and IoT in Manufacturing Ministry of EducationGuangzhou 510006China Guangdong Key Laboratory of IoT Information Technology Guangzhou 510006China
Avatars, as promising digital representations and service assistants of users in Metaverses, can enable drivers and passengers to immerse themselves in 3D virtual services and spaces of UAV-assisted vehicular Metavers... 详细信息
来源: 评论
Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第2期4卷 268-281页
作者: Tian, Ye Pan, Jingwen Yang, Shangshang Zhang, Xingyi He, Shuping Jin, Yaochu Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230088 China Anhui University School of Computer Science and Technology Hefei230601 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s... 详细信息
来源: 评论
Combined Representation Learning for Uncertain Knowledge Graphs  2
Combined Representation Learning for Uncertain Knowledge Gra...
收藏 引用
2nd International Conference on Mechatronics, IoT and Industrial Informatics, ICMIII 2024
作者: Qiao, Rui Zhong, Xiaolei Fu, Yang Wuhan University of Science and Technology School of Computer Science and Technology Wuhan China Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China Dianchi College Kunming China Huazhong University of Science and Technology Wuhan China
Uncertain knowledge graphs store the relations between entities in the real world in the form of weighted triples, where the weights indicate the confidence scores of the triples to be true. However, there is limited ... 详细信息
来源: 评论
Design and implementation of cooperative multi-agent based on MAPPO  5
Design and implementation of cooperative multi-agent based o...
收藏 引用
5th International Conference on Telecommunications, Optics, and computer science, TOCS 2024
作者: Wang, Haolong Fei, Rong Chen, Ruizhu School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
In the past few years, with the continuous development of deep reinforcement learning, the application of deep reinforcement has been set off within the realms of self-driving vehicle technology, game games, and natur... 详细信息
来源: 评论
TERMS: Task management policies to achieve high performance for mixed workloads using surplus resources
收藏 引用
Journal of Parallel and Distributed computing 2022年 第0期170卷 74-85页
作者: Yu, Jinyu Tong, Wei Lv, Pengze Feng, Dan Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology School of Computer Science and Technology Huazhong University of Science and Technology Ministry of Education of China Hubei Wuhan China
Resource contentions and performance interferences can lead to workload performance degradation in mixed-workload deployment clusters. Previous work guarantees the resource requirements of latency-sensitive tasks and ... 详细信息
来源: 评论
HYPERBOLIC HYPERGRAPH NEURAL NETWORKS FOR MULTI-RELATIONAL KNOWLEDGE HYPERGRAPH REPRESENTATION
arXiv
收藏 引用
arXiv 2024年
作者: Li, Mengfan Shi, Xuanhua Qiao, Chenqi Zhang, Teng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Knowledge hypergraphs generalize knowledge graphs using hyperedges to connect multiple entities and depict complicated relations. Existing methods either transform hyperedges into an easier-to-handle set of binary rel... 详细信息
来源: 评论
A Better Cardinality Estimator with Fewer Bits, Constant Update Time, and Mergeability  42
A Better Cardinality Estimator with Fewer Bits, Constant Upd...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Du, Yang Huang, He Sun, Yu-E Li, Kejian Zhang, Boyu Gao, Guoju Soochow University School of Computer Science and Technology Suzhou China Soochow University School of Rail Transportation Suzhou China Ministry of Education Key Laboratory of Embedded System and Service Computing Shanghai China
Cardinality estimation is a fundamental problem with diverse practical applications. HyperLogLog (HLL) has become a standard in practice because it offers good memory efficiency, constant update time, and mergeability... 详细信息
来源: 评论
A Survey on Event Tracking in Social Media Data Streams
收藏 引用
Big Data Mining and Analytics 2024年 第1期7卷 217-243页
作者: Zixuan Han Leilei Shi Lu Liu Liang Jiang Jiawei Fang Fanyuan Lin Jinjuan Zhang John Panneerselvam Nick Antonopoulos School of Computer Science and Communication Engineering and Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu UniversityZhenjiang 212013China School of Computing and Mathematical Sciences University of LeicesterLeicesterLE17RHUK Ocean College Jiangsu University of Science and TechnologyZhenjiang 212100China University Executive Office Edinburgh Napier UniversityEdinburghEH114BNUK
Social networks are inevitable parts of our daily life,where an unprecedented amount of complex data corresponding to a diverse range of applications are *** such,it is imperative to conduct research on social events ... 详细信息
来源: 评论
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论