咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是521-530 订阅
排序:
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
High-integrated photonic tensor core utilizing high-dimensional lightwave and microwave multidomain multiplexing
收藏 引用
Light(science & Applications) 2025年 第1期14卷 227-237页
作者: Xiangyan Meng Nuannuan Shi Guojie Zhang Junshen Li Ye Jin Shiyou Sun Yichen Shen Wei Li Ninghua Zhu Ming Li Key Laboratory of Optoelectronic Materials and Devices Institute of SemiconductorsChinese Academy of SciencesBeijing100083China College of Materials Science and Opto-Electronic Technology University of Chinese Academy of SciencesBeijing100049China School of Electronic Electrical and Communication EngineeringUniversity of Chinese Academy of SciencesBeijing100049China China Academy of Space Technology(Xi’an) Xi’anShaanxi710100China WeChat Pay Lab 33 Shenzhen Tencent Computer System Co.Ltd.Shenzhen518054China Lightelligence Group Hangzhou311121China
The burgeoning volume of parameters in artificial neural network models has posed substantial challenges to conventional tensor computing *** from the available optical multidimensional information entropy,optical int... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Crucial Interaction Elements Detection for 5G Core Network based on the Complex Network Model
Crucial Interaction Elements Detection for 5G Core Network b...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Ruinan Peng Xinhong Hei Yichuan Wang Xiaoxue Liu Yeqiu Xiao School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
This paper focuses on the issue of crucial interaction elements detection in the 5G core network. Given the current absence of an effective method for quantification evaluating the importance of interaction elements, ... 详细信息
来源: 评论
Probability analysis of system vulnerability distribution based on the matroid theory
Probability analysis of system vulnerability distribution ba...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Yichuan Wang Peipei Li Xin Song Yeqiu Xiao Xiaoxue Liu School of computer science and engineering Xi’an University of technology Xi’an China Shanxi Key Laboratory for Network Computing and Security Technology
In recent years, system vulnerability mining techniques have emerged in an endless stream. At present, the existing vulnerability mining techniques are mainly to analyze the source code or monitor and analyze the beha... 详细信息
来源: 评论
Research on Code Virtualization Methods for Cloud Applications
Research on Code Virtualization Methods for Cloud Applicatio...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Zhoukai Wang Zuoyan Xu Yaling Zhang Xin Song Yichuan Wang School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
With the vigorous development of technologies such as the Internet, mobile devices, and the Internet of Things, cloud services have gained a crucial position in our life and have become an essential part of daily oper... 详细信息
来源: 评论
A Novel Multipath Data Transmission Method with Traffic Obfuscation
A Novel Multipath Data Transmission Method with Traffic Obfu...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Xinhong Hei Jianfeng Chen Yichuan Wang Xin Song Lei Zhu School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the rapid progress of network communication technology, the issues of user identity and privacy are critical. However, there are many disadvantages in traditional single-path data transmission, for example, the l... 详细信息
来源: 评论
MBTDiff: Multi-segmentation Brain Tumor Model with Diffusion Probabilistic Model  9
MBTDiff: Multi-segmentation Brain Tumor Model with Diffusion...
收藏 引用
9th International Conference on Image, Vision and computing, ICIVC 2024
作者: Zeng, Shuqi Liu, Jun Xu, Ji Luo, Yuan School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China Key Laboratory of Biomarkers and In Vitro Diagnosis Translation Zhejiang province Hangzhou China Hubei Engineering Research Center for Intelligent Digital Technology in New Power System Hubei Central China Technology Development of Electric Power Co. Ltd Wuhan China
The diffusion probability model has recently garnered remarkable achievements in image generation, emerging as a prominent research focus within computer vision. It has been observed through numerous studies that the ... 详细信息
来源: 评论
A Comprehensive Overview of Object Detection Based on Deep Learning
A Comprehensive Overview of Object Detection Based on Deep L...
收藏 引用
Intelligent Data and Security (IDS), IEEE International Conference on
作者: Gaojing Yuan Linshu Chen Jiahong Cai Chaoyi Yang Jinnian Liu Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
Target detection is an important task in the field of computer vision and its application has been extended to the medical field. In the medical field, target detection techniques can be used for diagnosis, treatment ... 详细信息
来源: 评论
Compiler Differentiation Detection Method for Binary Similarity
Compiler Differentiation Detection Method for Binary Similar...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Xiaoxue Liu Xinwei Duan Xinhong Hei Yichuan Wang Xin Song School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
Compiler differential detection can be performed by detecting the similarity between the binary compiled by the compiler and the ideal compiled file. This article proposes a javac compiler differentiation detection sy... 详细信息
来源: 评论