咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是511-520 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
An Investigation of Blockchain-Based Sharding  7th
An Investigation of Blockchain-Based Sharding
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Xiao, Jiahong Liang, Wei Cai, Jiahong Zhu, Hangyu Li, Xiong Xie, Songyou School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China Guangdong Financial High-Tech Zone "Blockchain +" Fintech Research Institute Foshan528253 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Nowadays, blockchain distributed ledger technology is becoming more and more prominent, and its decentralization, anonymization, and tampering obvious features have been widely recognized. These excellent technical fe... 详细信息
来源: 评论
Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation systems:Hierarchical Poisoning Attacks and Defenses in Federated Learning
收藏 引用
computer Modeling in Engineering & sciences 2024年 第11期141卷 1305-1325页
作者: Yongsheng Zhu Chong Liu Chunlei Chen Xiaoting Lyu Zheng Chen Bin Wang Fuqiang Hu Hanxi Li Jiao Dai Baigen Cai Wei Wang School of Automation and Intelligence Beijing Jiaotong UniversityBeijing100044China Institute of Computing Technologies China Academy of Railway Sciences Corporation LimitedBeijing100081China School of Computer Science and Technology Beijing Jiaotong UniversityBeijing100044China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing100044China Institute of Infrastructure Inspection China Academy of Railway Sciences Corporation LimitedBeijing100081China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and CybersecurityHangzhou310053China
The development of Intelligent Railway Transportation systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system *** learning offers a promising... 详细信息
来源: 评论
Event-based Video Person Re-identification via Cross-Modality and Temporal Collaboration
Event-based Video Person Re-identification via Cross-Modalit...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Renkai Li Xin Yuan Wei Liu Xin Xu School of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System
Video-based person re-identification (ReID) has become increasingly important due to its applications in video surveillance applications. By employing events in video-based person ReID, more motion information can be ... 详细信息
来源: 评论
RA-MP-Net: Residual attention and multi-scale perception network for microvasculature extraction in optical-resolution photoacoustic microscopy  24
RA-MP-Net: Residual attention and multi-scale perception net...
收藏 引用
7th International Conference on Image and Graphics Processing, ICIGP 2024
作者: Yu, Jialing Meng, Jing Ma, Fei Zhang, Yuanke Liu, Chengbo School of Computer Qufu Normal University Rizhao China Research Center for Biomedical Optics and Molecular Imaging Key Laboratory of Biomedical Imaging Science and System Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China
Optical-resolution photoacoustic microcopy (OR-PAM) is a non-invasive imaging technology that can achieve high-resolution vascular imaging and has been widely used in the field of vessel segmentation. Due to the low c... 详细信息
来源: 评论
Multi-View Representation Learning for Multi-Instance Learning with Applications to Medical Image Classification
Multi-View Representation Learning for Multi-Instance Learni...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Zhao, Lu Yuan, Liming Li, Zhenliang Wen, Xianbin School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin300384 China
Multi-Instance Learning (MIL) is a weakly supervised learning paradigm, in which every training example is a labeled bag of unlabeled instances. In typical MIL applications, instances are often used for describing the... 详细信息
来源: 评论
A nearly optimal distributed algorithm for computing the weighted girth
收藏 引用
science China(Information sciences) 2021年 第11期64卷 80-94页
作者: Qiang-Sheng HUA Lixiang QIAN Dongxiao YU Xuanhua SHI Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology School of Computer Science and Technology Shandong University
computing the weighted girth, which is the sum of weights of edges in the minimum weight cycle,is an important problem in network analysis. The problem for distributively computing girth in unweighted graphs has garne... 详细信息
来源: 评论
An Ensemble Learning Approach for Wind Power Forecasting  3
An Ensemble Learning Approach for Wind Power Forecasting
收藏 引用
3rd International Conference on Electronic Information Engineering and computer, EIECT 2023
作者: Huang, Yuesheng Chen, Sida Wu, Qiling Xiao, Jiapeng Ren, Yongqi Wang, Leijun Chen, Rongjun Li, Jiawen Guangdong Polytechnic Normal University School of Computer Science Guangzhou China Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
With the growing global energy demand and requirement for environmental protection, renewable energy is attracting attention as a vital development direction. Particularly, wind power is rapidly developing as a clean ... 详细信息
来源: 评论
Deep Multi-Instance Learning with Adaptive Recurrent Pooling for Medical Image Classification
Deep Multi-Instance Learning with Adaptive Recurrent Pooling...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Ding, Yi Zhao, Lu Yuan, Liming Wen, Xianbin School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin300384 China
Recently, deep multi-instance neural networks have been successfully applied for medical image classification, where only image-level labels rather than fine-grained patch-level labels are available for use. One key i... 详细信息
来源: 评论
VAGeo: View-specific Attention for Cross-View Object Geo-Localization
VAGeo: View-specific Attention for Cross-View Object Geo-Loc...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhongyang Li Xin Yuan Wei Liu Xin Xu School of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System
Cross-view object geo-localization (CVOGL) aims to locate an object of interest in a captured ground- or drone-view image within the satellite image. However, existing works treat ground-view and drone-view query imag... 详细信息
来源: 评论