咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是571-580 订阅
排序:
ICERS:Intelligent Collaborative Emergency Response system  23
ICERS:Intelligent Collaborative Emergency Response System
收藏 引用
23rd International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2024
作者: Yang, Guoyin Zhang, Haotian Yao, Junfeng Cai, Chengyou Song, Jun Xu, Yuelin Deng, Bin School of Computer Engineer and Science Shanghai University Shanghai China The 32nd Research Institute of China Electronics Technology Group Corporation China CSSC Seago System Technology Co. Ltd. Shanghai200010 China Department of Geography Hong Kong Baptist University Hong Kong Science and Technology on Near-Surface Detection Laboratory Wuxi China
Advances in computer science and technology, coupled with the growing societal demand for enhanced safety, have paved the way for innovative smart home environments. While current smart home systems can send alarms an... 详细信息
来源: 评论
Imaging flow cytometry with a real-time throughput beyond 1,000,000 events per second
收藏 引用
Light(science & Applications) 2025年 第4期14卷 931-947页
作者: Jiehua Zhou Liye Mei Mingjie Yu Xiao Ma Dan Hou Zhuo Yin Xun Liu Yan Ding Kaining Yang Ruidong Xiao Xiandan Yuan Yueyun Weng Mengping Long Taobo Hu Jinxuan Hou Yu Xu Liang Tao Sisi Mei Hui Shen Yaxiaer Yalikun Fuling Zhou Liang Wang Du Wang Sheng Liu Cheng Lei The Institute of Technological Sciences Wuhan UniversityWuhan 430072China School of Computer Science Hubei University of TechnologyWuhan 430068China Division of Materials Science Nara Institute of Science and TechnologyTakayama-cho 8916-5Japan School of Science Hubei University of TechnologyWuhan 430068China Department of Pathology Peking University Cancer HospitalBeijing 100142China Department of Breast Surgery Peking University People’s HospitalBeijing 100044China Department of Thyroid and Breast Surgery Zhongnan HospitalWuhan UniversityWuhan 430071China Department of Radiation and Medical Oncology Zhongnan HospitalWuhan UniversityWuhan 430071China People’s Hospital of Anshun City Guizhou Province Anshun 561000China Department of Hematology Zhongnan HospitalWuhan UniversityWuhan 430071China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic InformationHuazhong University of Science and TechnologyWuhan 430074China Suzhou Institute of Wuhan University Suzhou 215000China Shenzhen Institute of Wuhan University Shenzhen 518057China
Imaging flow cytometry(IFC)combines the imaging capabilities of microscopy with the high throughput of flow cytometry,offering a promising solution for high-precision and high-throughput cell analysis in fields such a... 详细信息
来源: 评论
Privacy-preserving data aggregation achieving completeness of data queries in smart grid
Privacy-preserving data aggregation achieving completeness o...
收藏 引用
作者: Li, Xinyang Zhao, Meng Ding, Yong Yang, Changsong Wang, Huiyong Liang, Hai Wang, Yujue Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
In smart grid systems, the control center formulates strategies and provides services by analyzing electricity consumption data. However, ensuring the privacy and security of user data is a critical concern. While tra... 详细信息
来源: 评论
Investigating the Potential of AI-Driven Data Analytics for eARMS: A Survey-Based Research  7
Investigating the Potential of AI-Driven Data Analytics for ...
收藏 引用
7th International Conference on Internet Applications, Protocols, and services, NETAPPS 2024
作者: Khan, Nauman Ali Bashir, Ijaz Khan, Mudassar Ali Wazir, Waqas Din, Ikram Ud Hassan, Suhaidi Department of CSE Military College of Signals National University of Sciences & Technology Islamabad Pakistan Department of Information Technology The University of Haripur Pakistan Department of Computer Science COMSATS University Islamabad Islamabad Pakistan InterNetWorks Research Laboratory School of Computing Universiti Utara Malaysia UUM Sintok06010 Malaysia
The aim of this paper is on the role of AI powered data analysis in the decision-making processes of information systems such as ERP systems. We reviewed the literature, technological aspects, and case studies that pe... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论
Adaptive Data Transport Mechanism for UAV Surveillance Missions in Lossy Environments  22
Adaptive Data Transport Mechanism for UAV Surveillance Missi...
收藏 引用
22nd IEEE Consumer Communications and Networking Conference, CCNC 2025
作者: Mehrabi, Niloufar Boroujeni, Sayed Pedram Haeri Hofseth, Jenna Razi, Abolfazl Cheng, Long Kaur, Manveen Martin, James Amin, Rahul School of Computing Clemson University ClemsonSC United States California State University Computer Science Department Los AngelesCA United States Massachusetts Institute of Technology Lincoln Laboratory LexingtonMA United States
Unmanned Aerial Vehicles (UAVs) play an increasingly critical role in Intelligence, Surveillance, and Reconnaissance (ISR) missions such as border patrolling and criminal detection due to their ability to access remot... 详细信息
来源: 评论
Optimal Method Combining Blockchain and Multi-Agent system to Ensure Data Integrity and Deduplication in the Cloud Environment
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第10期18卷 90-105页
作者: El Ghazouani, Mohamed Ikidid, Abdelouafi Zaouiat, Charafeddine Ait Aziz, Layla Ichahane, Moulay Youssef Er-Rajy, Latifa ESIM Polydisciplinary Faculty of Sidi Bennour Chouaîb Doukkali University El Jadida Morocco Laboratory of System Analysis Information Processing and Industrial Management EST Salé Mohammed V University Salé Morocco Information Technology Laboratory National School of Applied Sciences Chouaîb Doukkali University El Jadida Morocco Computer Science Department Laboratory of Information Systems Engineering Cadi Ayyad University Marrakesh Morocco
Cloud computing (CC) refers to the transmission, storage, and processing of any type of information at a location that is not owned or controlled by the information owner. This information can be stored and accessed a... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
IoT-Assisted Blockchain-Based Car Rental system Supporting Traceability  28th
IoT-Assisted Blockchain-Based Car Rental System Supporting T...
收藏 引用
28th International Conference on Database systems for Advanced Applications, DASFAA 2023
作者: Chen, Lipan Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Wang, Huiyong Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute Beihang University Hangzhou China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
The majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are many secu... 详细信息
来源: 评论