咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是271-280 订阅
排序:
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Infrared Small Target Detection with Feature Refinement and Context Enhancement  31st
Infrared Small Target Detection with Feature Refinement and...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Li, Xiuhong Zhu, Xinyue Li, Boyuan Li, Songlin Wang, Luyao Jia, Zhenhong School of Computer Science and Technology Xinjiang University Urumgi China Key Laboratory of Signal Detection and Processing Xinjiang University Urumqi China College of Mathematics and System Science Xinjiang University Urumqi China
Infrared small target detection has received widespread application and attention in both civilian and military fields. However, due to the very small size and lack of unique features of these targets, existing method... 详细信息
来源: 评论
Efficient distributed algorithms for holistic aggregation functions on random regular graphs
收藏 引用
science China(Information sciences) 2022年 第5期65卷 32-50页
作者: Lin JIA Qiang-Sheng HUA Haoqiang FAN Qiuping WANG Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology Institute for Interdisciplinary Information Science Tsinghua University
In this paper, we propose efficient distributed algorithms for three holistic aggregation functions on random regular graphs that are good candidates for network topology in next-generation data *** three holistic agg... 详细信息
来源: 评论
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
收藏 引用
International Journal of Intelligent Networks 2023年 第1期4卷 301-309页
作者: Mageshkumar, Nagappan Swapna, J. Pandiaraj, A. Rajakumar, R. Krichen, Moez Ravi, Vinayakumar Department of Computer Science and Technology Madanapalle Institute of Technology and Science Madanapalle India Department of Computer Science & Engineering Veltech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai India Department of Computing Technology SRM Institute of Science and Technology Kattankulathur chennai India Al-Baha University Alaqiq 65779-7738 Saudi Arabia ReDCAD Laboratory University of Sfax Sfax3038 Tunisia Center for Artificial Intelligence Prince Mohammad Bin Fahd University Khobar34754 Saudi Arabia Centre for Automation School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Chennai India
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due ... 详细信息
来源: 评论
OUTLIER SYNTHESIS VIA HAMILTONIAN MONTE CARLO FOR OUT-OF-DISTRIBUTION DETECTION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hengzhuang Zhang, Teng National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili... 详细信息
来源: 评论
Research on Fault Diagnosis Method Based on Structural Causal Model in Tennessee Eastman Process  7th
Research on Fault Diagnosis Method Based on Structural Causa...
收藏 引用
7th International Conference on computing, Control and Industrial Engineering, CCIE 2023
作者: Pu, Haoyuan Liu, Jie Chen, Zhi Yang, Xiaohua Ren, Changan Xu, Zhuoran Jian, Yifan School of Computer Science University of South China Hengyang China Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Chengdu China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hengyang China School of Nuclear Science and Technology University of South China Hengyang China
In the practical application of fault diagnosis in large-scale chemical systems, due to the danger of faults, the machine learning diagnosis methods used in current research often face the problem of scarcity of fault... 详细信息
来源: 评论
HighlightRemover: Spatially Valid Pixel Learning for Image Specular Highlight Removal  24
HighlightRemover: Spatially Valid Pixel Learning for Image S...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhang, Ling Ma, Yidong Jiang, Zhi He, Weilei Bao, Zhongyun Fu, Gang Xu, Wenju Xiao, Chunxia School of Computer Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Realtime Industrial Systems Wuhan University of Science and Technology Wuhan China School of Computer Science Wuhan University Wuhan China Department of Computing Hong Kong Polytechnic University Hong Kong Amazon Palo Alto United States
Recently, learning-based methods have made significant progress for image specular highlight removal. However, many of these approaches treat all the image pixels uniformly, overlooking the negative impact of invalid ... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion  38
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent D...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
NfvInsight:A Framework for Automatically Deploying and Benchmarking VNF Chains
收藏 引用
Journal of computer science & technology 2022年 第3期37卷 680-698页
作者: Tian-Ni Xu Hai-Feng Sun Di Zhang Xiao-Ming Zhou Xiu-Feng Sui Sa Wang Qun Huang Yun-Gang Bao State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China Peng Cheng Laboratory Shenzhen 518055China Department of Computer Science and Technology Peking UniversityBeijing 100871China
With the advent of virtualization techniques and software-defined networking(SDN),network function virtualization(NFV)shifts network functions(NFs)from hardware implementations to software appliances,between which exi... 详细信息
来源: 评论
OpenDrift: Online Evolving Fraud Detection for Open-Category and Concept-Drift Transactions
OpenDrift: Online Evolving Fraud Detection for Open-Category...
收藏 引用
2023 IEEE International Conference on Web services, ICWS 2023
作者: Wang, Cheng Chai, Songyao Zhu, Hangyu Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China Shanghai Artificial Intelligence Laboratory Shanghai China
The rapid growth of electronic commerce brings convenience to modern life but comes with security risks by various cybercrimes in online payment services. Most existing security methods for fraud detection depend on t... 详细信息
来源: 评论