咨询与建议

限定检索结果

文献类型

  • 2,387 篇 会议
  • 1,941 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,833 篇 工学
    • 1,934 篇 计算机科学与技术...
    • 1,510 篇 软件工程
    • 583 篇 信息与通信工程
    • 352 篇 电气工程
    • 349 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 218 篇 机械工程
    • 201 篇 光学工程
    • 164 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 140 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 91 篇 网络空间安全
    • 89 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 79 篇 安全科学与工程
  • 1,426 篇 理学
    • 703 篇 数学
    • 385 篇 物理学
    • 307 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 152 篇 化学
    • 144 篇 系统科学
  • 753 篇 管理学
    • 502 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 173 篇 医学
    • 144 篇 临床医学
    • 112 篇 基础医学(可授医学...
  • 118 篇 法学
    • 78 篇 社会学
  • 73 篇 经济学
  • 52 篇 农学
  • 24 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 101 篇 feature extracti...
  • 92 篇 semantics
  • 78 篇 computational mo...
  • 72 篇 deep learning
  • 71 篇 computer science
  • 66 篇 training
  • 65 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 56 篇 optimization
  • 56 篇 servers
  • 54 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 51 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 45 篇 data models
  • 43 篇 resource managem...
  • 43 篇 analytical model...

机构

  • 124 篇 school of comput...
  • 100 篇 national enginee...
  • 91 篇 hubei province k...
  • 89 篇 school of comput...
  • 76 篇 department of co...
  • 57 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 44 篇 state key labora...
  • 43 篇 hubei province k...
  • 43 篇 national enginee...
  • 41 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 37 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 national enginee...
  • 34 篇 university of ch...
  • 33 篇 key laboratory o...
  • 33 篇 school of comput...

作者

  • 237 篇 hai jin
  • 191 篇 jin hai
  • 51 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 33 篇 niyato dusit
  • 32 篇 deqing zou
  • 30 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 26 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 17 篇 zhang xiaolong
  • 17 篇 liu jun
  • 17 篇 li bo

语言

  • 3,748 篇 英文
  • 463 篇 其他
  • 147 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4344 条 记 录,以下是831-840 订阅
排序:
A passive DDoS attack detection approach based on abnormal analysis in SDN environment  4
A passive DDoS attack detection approach based on abnormal a...
收藏 引用
2021 4th International Conference on computer Information science and Application technology, CISAT 2021
作者: Sun, Shimin Zhang, Xinchao Huang, Wentian Xu, Aixin Wang, Xiaofan Han, Li Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tiangong University Tianjin300387 China National Engineering Laboratory for Computer Virus Prevention and Control Technology School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China
Most of the detection methods against DDoS attacks are based on periodic detection, which leads to high communication overhead, untimely detection, and slow attack response. This paper proposes a passive abnormality d... 详细信息
来源: 评论
Improving Code Search with Multi-Modal Momentum Contrastive Learning
Improving Code Search with Multi-Modal Momentum Contrastive ...
收藏 引用
IEEE/ACM International Conference on Program Comprehension (ICPC)
作者: Zejian Shi Yun Xiong Yao Zhang Zhijie Jiang Jinjing Zhao Lei Wang Shanshan Li Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China Peng Cheng Laboratory Shenzhen China School of Computer National University of Defense Technology China National Key Laboratory of Science and Technology on Information System Security China
Contrastive learning has recently been applied to enhancing the BERT-based pre-trained models for code search. However, the existing end-to-end training mechanism cannot sufficiently utilize the pre-trained models due...
来源: 评论
DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path Planners
DPFuzzer: Discovering Safety Critical Vulnerabilities for Dr...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Yue Wang Chao Yang Xiaodong Zhang Yuwanqi Deng JianFeng Ma State Key Laboratory of Integrated Services Networks (ISN) Xidian University China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an China School of Cyber Engineering Xidian University China School of Computer Science and Technology Xidian University China
State-of-the-art drone path planners enable drones to autonomously travel through obstacles in GPS-denied, uncharted, cluttered environments. However, our investigation shows that path planners fail to maneuver drones... 详细信息
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization  7
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
7th International Conference on Cyber Security and Information Engineering, ICCSIE 2022
作者: Huang, Jianhua Tang, Yunlong Wei, Yongjun Wang, Huan Zhang, Haifeng Zhang, Bing School of Computer Science and Technology School of Software Guangxi University of Science and Technology Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
An AoI-Guaranteed Sensor Data Collection Strategy for RIS-assisted UAV Communication system
An AoI-Guaranteed Sensor Data Collection Strategy for RIS-as...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Yang, Bowen Yu, Yao Li, Jianqi Xu, Tongze Deng, Der-Jiunn Chin, Hui-Hsin Li, Yonghui Northeastern University School of Computer Science and Engineering Shenyang China National Changhua University of Education Department of Computer Science and Information Engineering China Overseas Chinese University Department of Information Technology China University of Sydney School of Electrical and Information Engineering Sydney Australia Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang China
The recently proposed concept of Age of Information (AoI) measures the freshness of the sensor data sampled by remote Internet of Things (IoT) devices, which is an important indicator for the smart city. Unmanned Aeri... 详细信息
来源: 评论
Improving Personality Consistency in Conversation With Commonsense Knowledge
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2024年 33卷 262-271页
作者: Yifan Li Shixuan Fan Wei Wei Xianling Mao Kaihe Xu Dangyang Chen Alibaba Company Ltd. Zhejiang China Cognitive Computing and Intelligent Information Processing (CCIIP) Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Beijing Institute of Technology Beijing China Ping An Property and Casualty Insurance Company of China Ltd. Shenzhen China
Maintaining persona consistency is crucial for an open-domain dialogue system. Existing methods focus on extracting user persona from historical context to guide persona-consistent response generation. Actually, the h... 详细信息
来源: 评论
Analog Circuit Design of Normalized Bistable Stochastic Resonance Model and Its Application in Weak Signal Processing
Analog Circuit Design of Normalized Bistable Stochastic Reso...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Jin Liu Zan Li Qiguang Miao Li Yang Peihan Qi Danyang Wang School of Computer Science and Technology Xidian University Xi’an China State Key Laboratory of Integrated Services Networks Xidian University Xi’an China
The concept of stochastic resonance (SR) describes a counterintuitive phenomenon in which a weak signal can be enhanced by appropriate intensity of stochastic noise in a nonlinear bistable system, and it provides a ne... 详细信息
来源: 评论
Accelerating Backward Aggregation in GCN Training with Execution Path Preparing on GPUs
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Shaoxian Shao, Zhiyuan Yang, Ci Liao, Xiaofei Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
The emerging Graph Convolutional Network (GCN) has been widely used in many domains, where it is important to improve the efficiencies of applications by accelerating GCN trainings. Due to the sparsity nature and expl... 详细信息
来源: 评论
GCD-Sampling: A General Cross-scale Decoupled Sampling for Point Cloud  39
GCD-Sampling: A General Cross-scale Decoupled Sampling for P...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Dai, Tao Wang, Yanzi Xiong, Jianyu Zha, Yaohua Xia, Shu-Tao Zhu, Zexuan College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Tsinghua Shenzhen International Graduate School Tsinghua University China Shenzhen City Key Laboratory of Embedded System Design Shenzhen China
Sampling strategy (e.g., fixed farthest point sampling) of point cloud has been an essential step for developing practical solutions in 3D computer vision tasks. Previous fixed sampling is simple, but suffer from subo... 详细信息
来源: 评论
A Node Confidence Determination Based Moving Target Defense Strategy for SDN
A Node Confidence Determination Based Moving Target Defense ...
收藏 引用
International Conference on Cyber-Enabled Distributed computing and Knowledge Discovery, CyberC
作者: Shimin Sun Guowei Xu Li Han Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
With the rapid development of Internet technology, network assets have become an indispensable part of modern society. Especially in the face of high-value network assets, the attacker is faced with paying a greater c...
来源: 评论