咨询与建议

限定检索结果

文献类型

  • 914 篇 期刊文献
  • 659 篇 会议
  • 1 册 图书

馆藏范围

  • 1,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,070 篇 工学
    • 766 篇 计算机科学与技术...
    • 653 篇 软件工程
    • 286 篇 信息与通信工程
    • 188 篇 电气工程
    • 153 篇 生物工程
    • 114 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 95 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 土木工程
  • 580 篇 理学
    • 317 篇 数学
    • 170 篇 生物学
    • 119 篇 物理学
    • 110 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 300 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 99 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 42 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 training
  • 43 篇 deep learning
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 28 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 22 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 college of compu...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 37 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 school of comput...
  • 33 篇 nanyang technolo...
  • 33 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 68 篇 niyato dusit
  • 30 篇 jin hai
  • 22 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 18 篇 hu shengshan
  • 18 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 chen yanping
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 yang yang
  • 12 篇 zhou ziqi
  • 12 篇 wang lihui

语言

  • 1,428 篇 英文
  • 125 篇 其他
  • 34 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1574 条 记 录,以下是291-300 订阅
排序:
DDoS Detection and Defense Based on FLAD and SDN
DDoS Detection and Defense Based on FLAD and SDN
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Jie Dong Wenyu Fang Wanling Zheng Jinkun Liu Yanhua Liu College of Computer and Data Science Fuzhou University Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China
In order to achieve more efficient and accurate DDoS detection while ensuring data privacy, this paper proposes a DDoS detection method based on FLAD. Firstly, this paper uses the FLAD algorithm to train a global DDoS... 详细信息
来源: 评论
Homophily Induced Contrastive Attributed Graph Clustering
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Chen, Man-Sheng Lai, Pei-Yuan Liao, De-Zhang Wang, Chang-Dong Lai, Jian-Huang Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Guangxi Zhuang Autonomous Region Information Center Guangxi Key Laboratory of Digital Infrastructure Nanning China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China South China Technology Commercialization Center Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China
Attributed graph clustering, aiming to discover the underlying graph structure and partition the graph nodes into several disjoint categories, is a basic task in graph data analysis. Although recent efforts over graph... 详细信息
来源: 评论
Solid-SQL: Enhanced Schema-linking based In-context Learning for Robust Text-to-SQL
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Geling Tan, Yunzhi Zhong, Ruichao Xie, Yuanzhen Zhao, Lingchen Wang, Qian Hu, Bo Li, Zang School of Cyber Science and Engineering Wuhan University China Big Data and AI Platform Department Tencent China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China
Recently, large language models (LLMs) have significantly improved the performance of text-to-SQL systems. Nevertheless, many state-of-the-art (SOTA) approaches have overlooked the critical aspect of system robustness... 详细信息
来源: 评论
TraceStream: Anomalous Service Localization based on Trace Stream Clustering with Online Feedback
TraceStream: Anomalous Service Localization based on Trace S...
收藏 引用
International Symposium on Software Reliability engineering (ISSRE)
作者: Tong Zhou Chenxi Zhang Xin Peng Zhenghui Yan Pairui Li Jianming Liang Haibing Zheng Wujie Zheng Yuetang Deng School of Computer Science Fudan University China Shanghai Key Laboratory of Data Science Fudan University China Shanghai Collaborative Innovation Center of Intelligent Visual Computing China Tencent Inc. China
Modern large-scale service-based systems such as microservice systems have become increasingly complex, making it hard to localize anomalous services when various issues emerge. Traces record the workflows of requests...
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
RELI11D: A Comprehensive Multimodal Human Motion dataset and Method
RELI11D: A Comprehensive Multimodal Human Motion Dataset and...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Ming Yan Yan Zhang Shuqiang Cai Shuqi Fan Xincheng Lin Yudi Dai Siqi Shen Chenglu Wen Lan Xu Yuexin Ma Cheng Wang Fujian Key Laboratory of Sensing and Computing for Smart Cities Xiamen University National Institute for Data Science in Health and Medicine Xiamen University Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Xiamen University Shanghai Engineering Research Center of Intelligent Vision and Imaging ShanghaiTech University
Comprehensive capturing of human motions requires both accurate captures of complex poses and precise localization of the human within scenes. Most of the HPE datasets and methods primarily rely on RGB, LiDAR, or IMU ... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
A Cloud computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论
XRL-SHAP-Cache:an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 46-71页
作者: Xiaolong XU Fan WU Muhammad BILAL Xiaoyu XIA Wanchun DOU Lina YAO Weiyi ZHONG School of Software Nanjing University of Information Science and Technology School of Computing and Communications Lancaster University School of Computing Technologies Royal Melbourne Institute of Technology State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering University of New South Wales Data 61 Commonwealth Scientific and Industrial Research Organization School of Computer Science Qufu Normal University
Content delivery networks(CDNs) play a pivotal role in the modern internet infrastructure by enabling efficient content delivery across diverse geographical regions. As an essential component of CDNs, the edge caching... 详细信息
来源: 评论
Self-Supervised Teaching and Learning of Representations on Graphs  23
Self-Supervised Teaching and Learning of Representations on ...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wan, Liangtian Fu, Zhenqiang Sun, Lu Wang, Xianpeng Xu, Gang Yan, Xiaoran Xia, Feng Key Laboratory for Ubiquitous Network Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian China State Key Laboratory of Marine Resource Utilization in South China Sea School of Information and Communication Engineering Hainan University Haikou China State Key Laboratory of Millimeter Waves School of Information Science and Engineering Southeast University Nanjing China Research Center of Big Data Intelligence Research Institute of Artificial Intelligence Zhejiang Lab Hangzhou China School of Computing Technologies Rmit University Melbourne Australia
Recent years have witnessed significant advances in graph contrastive learning (GCL), while most GCL models use graph neural networks as encoders based on supervised learning. In this work, we propose a novel graph le... 详细信息
来源: 评论