咨询与建议

限定检索结果

文献类型

  • 726 篇 期刊文献
  • 337 篇 会议
  • 1 册 图书

馆藏范围

  • 1,064 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 626 篇 理学
    • 442 篇 物理学
    • 135 篇 数学
    • 65 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 21 篇 化学
    • 19 篇 系统科学
  • 572 篇 工学
    • 329 篇 计算机科学与技术...
    • 279 篇 软件工程
    • 124 篇 核科学与技术
    • 64 篇 生物工程
    • 58 篇 信息与通信工程
    • 48 篇 控制科学与工程
    • 43 篇 生物医学工程(可授...
    • 38 篇 电气工程
    • 36 篇 机械工程
    • 36 篇 光学工程
    • 28 篇 电子科学与技术(可...
    • 20 篇 力学(可授工学、理...
    • 19 篇 交通运输工程
    • 18 篇 土木工程
    • 17 篇 化学工程与技术
    • 16 篇 仪器科学与技术
    • 16 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
  • 121 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 43 篇 医学
    • 36 篇 临床医学
    • 29 篇 基础医学(可授医学...
    • 21 篇 药学(可授医学、理...
  • 15 篇 法学
  • 11 篇 教育学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 65 篇 hadron colliders
  • 54 篇 higgs bosons
  • 30 篇 hadron-hadron sc...
  • 27 篇 relativistic hea...
  • 26 篇 supersymmetric m...
  • 24 篇 top quark
  • 22 篇 w & z bosons
  • 22 篇 particle product...
  • 22 篇 bosons
  • 22 篇 extensions of hi...
  • 21 篇 supersymmetry
  • 21 篇 quark & gluon je...
  • 20 篇 particle data an...
  • 17 篇 deep learning
  • 17 篇 electroweak inte...
  • 17 篇 photons
  • 16 篇 feature extracti...
  • 14 篇 hypothetical par...
  • 14 篇 proton-proton in...
  • 13 篇 superpartners

机构

  • 388 篇 department for p...
  • 376 篇 institute of phy...
  • 356 篇 institute of phy...
  • 331 篇 marian smoluchow...
  • 321 篇 department of ph...
  • 319 篇 faculty of scien...
  • 304 篇 department of ph...
  • 304 篇 kirchhoff-instit...
  • 301 篇 department of ph...
  • 291 篇 department of ph...
  • 290 篇 department of ph...
  • 283 篇 department of ph...
  • 282 篇 instituto de fís...
  • 279 篇 dipartimento di ...
  • 278 篇 west university ...
  • 270 篇 fakultät für phy...
  • 270 篇 graduate school ...
  • 269 篇 department of ph...
  • 269 篇 universidade fed...
  • 260 篇 departamento de ...

作者

  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 g. bella
  • 247 篇 d. calvet
  • 245 篇 j. m. izen
  • 245 篇 j. strandberg
  • 245 篇 n. orlando
  • 245 篇 y. tayalati
  • 245 篇 g. spigo
  • 245 篇 v. chiarella
  • 245 篇 f. siegert
  • 244 篇 a. dimitrievska
  • 244 篇 f. deliot
  • 239 篇 y. abulaiti
  • 236 篇 r. ströhmer
  • 236 篇 m. rijssenbeek
  • 236 篇 s. jin
  • 236 篇 g. gaudio
  • 236 篇 s. mohapatra
  • 235 篇 i. van vulpen

语言

  • 1,018 篇 英文
  • 28 篇 其他
  • 19 篇 中文
检索条件"机构=Shanghai Development Center of Computer Software Technology"
1064 条 记 录,以下是211-220 订阅
排序:
CHESS: Learning User Correlation from Semantic-related Cascades for Diffusion Prediction
CHESS: Learning User Correlation from Semantic-related Casca...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Huacheng Li Chunhe Xia Tianbo Wang Haopeng Zhao Key Laboratory of Beijing Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Understanding the information diffusion trajectory in online social networks has become an ever-growing prominent research direction in the information era. Users interact with social information they are interested i...
来源: 评论
GUARD: Multigranularity-based Unsupervised Anomaly Detection Algorithm for Multivariate Time Series  8
GUARD: Multigranularity-based Unsupervised Anomaly Detection...
收藏 引用
8th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2022
作者: Meng, Fan Yang, Qunli He, Zhengda Yang, Shangdong Tang, Weidong Public Credit Information Center Jiangsu Strategy and Development Research Center Nanjing China Nanjing University State Key Lab for Novel Software Technology Nanjing China China Pharmaceutical University School of Science Nanjing China The School of Computer Science Nanjing University of Posts and Teleconnnunications Nanjing China China Telecom Corporation Limited Nanjing Branch Customer Operations Department Nanjing China
Unsupervised anomaly detection on multivariate time series (MTS) is a valuable problem in practice because it significantly reduces labeling costs. Even though most classical methods begin to consider inter-series dep... 详细信息
来源: 评论
LOGCAN++: Adaptive Local-global class-aware network for semantic segmentation of remote sensing imagery
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Xiaowen Lian, Rongrong Wu, Zhenkai Guo, Hongbo Yang, Fan Ma, Mengting Wu, Sensen Du, Zhenhong Song, Siyang Zhang, Wei The School of Software Technology Zhejiang University Hangzhou310027 China The school of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200030 China The School of Computer Science and Technology Zhejiang University Hangzhou310027 China The School of Earth Sciences Zhejiang University Hangzhou310027 China The Innovation Center of Yangtze River Delta Zhejiang University Zhejiang Jiaxing314103 China The HUBG Lab Department of Computer Science University of Exeter United Kingdom
Remote sensing images usually characterized by complex backgrounds, scale and orientation variations, and large intra-class variance. General semantic segmentation methods usually fail to fully investigate the above i... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
Resonant Beam Multi-Target DOA Estimation
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Yixuan Jiang, Qingwei Xiong, Mingliang Fang, Wen Liu, Mingqing Zhang, Qingqing Liu, Qingwen Yan, Gang Research Institute for Intelligent Autonomous Systems Tongji University Shanghai201210 China Department of Computer Science and Technology Tongji University Shanghai201804 China College of Electronics and Information Engineering Tongji University Shanghai201804 China LiFi Research and Development Center Department of Engineering University of Cambridge Cambridge United Kingdom School of Information Engineering Zhejiang University of Technology Zhejiang Hangzhou310014 China University of Electronic Science and Technology of China Zhejiang Huzhou313001 China School of Physics Science and Engineering Tongji University Shanghai200092 China
With the increasing demand for internet of things (IoT) applications, especially for location-based services, how to locate passive mobile targets (MTs) with minimal beam control has become a challenge. Resonant beam ... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based Network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
Reinforcement Learning-Based Explainable Recommendation over Knowledge Graphs with Negative Sampling
Reinforcement Learning-Based Explainable Recommendation over...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Siyuan Zhang Yuanxin Ouyang Zhuang Liu Wenge Rong Zhang Xiong State Key Laboratory of Software Development Environment Beihang University Beijing China Engineering Research Center of Advanced Computer Application Technology Ministry of Education Beihang University Beijing China
Introducing knowledge graphs (KGs) into the recommender systems not only improves their performance but also enhances the interpretability. However, most KG-based recommendation methods have the problem of inefficienc...
来源: 评论
center-guided Classifier for Semantic Segmentation of Remote Sensing Images
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wei Ma, Mengting Jiang, Yizhen Lian, Rongrong Wu, Zhenkai Cui, Kangning Ma, Xiaowen School of Software Technology Zhejiang University Hangzhou310027 China Innovation Center of Yangtze River Delta Zhejiang University Zhejiang Jiaxing314103 China School of Computer Science and Technology Zhejiang University Hangzhou310027 China Department of Mathematics City University of Hong Kong Hong Kong Noah’s Ark Lab Huawei Shanghai201206 China
Compared with natural images, remote sensing images (RSIs) have the unique characteristic. i.e., larger intraclass variance, which makes semantic segmentation for remote sensing images more challenging. Moreover, exis... 详细信息
来源: 评论