咨询与建议

限定检索结果

文献类型

  • 152 篇 会议
  • 98 篇 期刊文献

馆藏范围

  • 250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 144 篇 工学
    • 93 篇 计算机科学与技术...
    • 71 篇 软件工程
    • 40 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 12 篇 航空宇航科学与技...
    • 9 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 7 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 建筑学
  • 66 篇 理学
    • 36 篇 数学
    • 23 篇 生物学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 35 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 农学

主题

  • 9 篇 training
  • 7 篇 electroencephalo...
  • 7 篇 feature extracti...
  • 7 篇 mobile communica...
  • 6 篇 tools
  • 5 篇 software systems
  • 5 篇 bandwidth
  • 5 篇 optimization
  • 5 篇 servers
  • 5 篇 semantics
  • 5 篇 hardware
  • 5 篇 accuracy
  • 4 篇 linux
  • 4 篇 deep learning
  • 4 篇 deep neural netw...
  • 4 篇 software enginee...
  • 4 篇 predictive model...
  • 4 篇 visualization
  • 4 篇 sentiment analys...
  • 4 篇 prediction algor...

机构

  • 22 篇 school of softwa...
  • 21 篇 school of cyber ...
  • 19 篇 school of comput...
  • 18 篇 hubei key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 16 篇 services computi...
  • 15 篇 cluster and grid...
  • 13 篇 school of inform...
  • 12 篇 college of compu...
  • 11 篇 state key labora...
  • 9 篇 cas center for e...
  • 9 篇 tianjin key labo...
  • 9 篇 national enginee...
  • 8 篇 gansu provincial...
  • 7 篇 department of co...
  • 6 篇 national mobile ...
  • 6 篇 joint research c...
  • 6 篇 engineering rese...
  • 5 篇 engineering rese...

作者

  • 16 篇 hu shengshan
  • 16 篇 li minghui
  • 11 篇 zhang leo yu
  • 11 篇 jin hai
  • 10 篇 zhou ziqi
  • 8 篇 hai jin
  • 8 篇 cheol-hoon lee
  • 7 篇 bin hu
  • 7 篇 wan wei
  • 7 篇 wang xianlong
  • 6 篇 minghui li
  • 6 篇 gang zhou
  • 6 篇 do-hyung kim
  • 6 篇 shengshan hu
  • 5 篇 hu bin
  • 5 篇 qinglin zhao
  • 5 篇 xiao yingyuan
  • 5 篇 zhang hangtao
  • 5 篇 sun-ja kim
  • 4 篇 deng yongqiang

语言

  • 223 篇 英文
  • 18 篇 其他
  • 9 篇 中文
检索条件"机构=Software and System Engineering Research Laboratory"
250 条 记 录,以下是111-120 订阅
排序:
Data protection and provenance in cloud of things environment: research challenges
收藏 引用
International Journal of Information and Computer Security 2020年 第4期12卷 416-435页
作者: Wang, Chundong Yang, Lei Guo, Hao Wan, Fujin Key Laboratory of Computer Vision and System Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin China Global Energy Internet Research Institute Beijing University of Technology Tianjin China Department of College of Computer and Control Engineering Nankai University Tianjin China
Internet of things are increasingly being deployed over the cloud (also referred to as cloud of things) to provide a broader range of services. However, there are serious challenges of CoT in the data protection and s... 详细信息
来源: 评论
Analytical Models for QoT Estimations in Super-C and Super-C + L Bands Optical Transmission systems
Analytical Models for QoT Estimations in Super-C and Super-C...
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Baoluo Yan Yijun Sun Ziwen Zhou Hong Liu Hongya Wang Chen Huan Zhiyong Zhao Lipeng Feng Anxu Zhang Zhenhua Feng Hu Shi WDM System Department of Wireline Product R&D Institute ZTE Corp. Beijing China State Key Laboratory of Mobile Network and Mobile Multimedia Technology China School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China Optics Valley Laboratory School of Optical and Electronic Information and Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China China Telecom Research Institute Beijing China
We propose a novel physical model-based QoT estimation with achieved OSNR estimation error ≤ 1.5 dB in primary paths and OSNR prediction error ≤ 1.76 dB in unestablished lightpaths for both super-C bands and super-C... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Linear building pattern recognition via spatial knowledge graph
arXiv
收藏 引用
arXiv 2023年
作者: Wei, Zhiwei Xiao, Yi Tong, Ying Xu, Wenjia Wang, Yang Key Laboratory of Network Information System Technology Institute of Electronic Chinese Academy of Sciences Beijing 100830 The Aerospace Information Research Institute Chinese Academic of Sciences Beijing 100830 School of Resources and Environment Science Wuhan University Wuhan 430079 School of Software Engineering Shenzhen Institute of Information Technology Guangdong Shenzhen 518172 School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876
Building patterns are important urban structures that reflect the effect of the urban material and social-economic on a region. Previous researches are mostly based on the graph isomorphism method and use rules to rec... 详细信息
来源: 评论
Quantum reversible circuits for multiplicative inverse
收藏 引用
EPJ Quantum Technology 2022年 第1期9卷 1-17页
作者: Luo, Qing-bin Yang, Guo-wu Li, Xiao-yu Li, Qiang Department of Computer Science and Technology School of Information Engineering Hubei Minzu University Enshi China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big data research Center & School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China
The synthesis of quantum circuits for multiplicative inverse over $\operatorname{GF}(2^{8})$ are discussed in this paper. We first convert the multiplicative inverse operation in $\operatorname{GF}(2^{8})$ to arithmet...
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
An Effective Network Repair Strategy Against Both Random and Malicious Edge Attacks
An Effective Network Repair Strategy Against Both Random and...
收藏 引用
第40届中国控制会议
作者: Jianda Zhao Shiwen Sun Hao Shen Chengyi Xia School of Computer Science and Engineering Tianjin University of Technology Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education
Attack vulnerability and protection of large-scale complex networks are of great significance in academic and engineering *** this study,the problem of structural vulnerability of complex networks induced by attacks o... 详细信息
来源: 评论
LCW: A Lightweight Recommendation Framework for Non-profit Crowdfunding Projects
LCW: A Lightweight Recommendation Framework for Non-profit C...
收藏 引用
作者: Jinxin Liu Yingyuan Xiao Wenguang Zheng Engineering Research Center of Learning-Based Intelligent System Ministry of EducationTianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
In recent years, crowdfunding platform has gradually emerged as a new economic model, and more and more people choose crowdfunding to obtain the initial funds needed by the project. However,with the increasing number ... 详细信息
来源: 评论
How to respond to emerging threats of cyberspace security via social engineering? A novel paradigm to solve cyberspace security issues
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Lin, Hao Wang, Chun-Dong Gao, Hao-Yu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing Novel Software Technology Ministry of Education Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China College of Data Science and Application Inner Mongolia University of Technology Hohhot China
Cybersecurity researchers always ignore the "people" behind the issues when dealing with cyberspace security issues. The human and technological aspects of cyberspace security must be simultaneously addresse... 详细信息
来源: 评论