咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 202 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 501 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 365 篇 工学
    • 224 篇 计算机科学与技术...
    • 170 篇 软件工程
    • 74 篇 信息与通信工程
    • 70 篇 控制科学与工程
    • 36 篇 机械工程
    • 35 篇 电气工程
    • 35 篇 电子科学与技术(可...
    • 31 篇 交通运输工程
    • 28 篇 生物工程
    • 14 篇 仪器科学与技术
    • 14 篇 安全科学与工程
    • 11 篇 动力工程及工程热...
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 10 篇 光学工程
    • 7 篇 材料科学与工程(可...
  • 172 篇 理学
    • 125 篇 数学
    • 34 篇 系统科学
    • 31 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 20 篇 物理学
    • 9 篇 化学
  • 108 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 22 篇 法学
    • 20 篇 社会学
  • 11 篇 医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 21 篇 petri nets
  • 14 篇 web services
  • 12 篇 feature extracti...
  • 11 篇 training
  • 10 篇 data mining
  • 9 篇 graph neural net...
  • 8 篇 conferences
  • 8 篇 throughput
  • 8 篇 rough set theory
  • 7 篇 information syst...
  • 7 篇 support vector m...
  • 7 篇 lattices
  • 7 篇 laboratories
  • 7 篇 mapreduce
  • 7 篇 computational mo...
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 6 篇 roads
  • 6 篇 vectors
  • 6 篇 schedules

机构

  • 121 篇 key laboratory o...
  • 78 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 department of co...
  • 11 篇 key laboratory o...
  • 10 篇 school of engine...
  • 10 篇 school of softwa...
  • 9 篇 department of co...
  • 9 篇 ieee
  • 9 篇 key laboratory o...
  • 8 篇 school of electr...
  • 8 篇 college of compu...
  • 7 篇 college of infor...
  • 7 篇 department of co...

作者

  • 31 篇 changjun jiang
  • 30 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 20 篇 cheng wang
  • 19 篇 yan chungang
  • 18 篇 ding zhijun
  • 16 篇 wang cheng
  • 16 篇 wang hanli
  • 13 篇 li maozhen
  • 13 篇 mengchu zhou
  • 13 篇 miao duoqian
  • 13 篇 chungang yan
  • 12 篇 liu xiwei
  • 11 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 10 篇 liu guanjun
  • 10 篇 shengjie zhao
  • 10 篇 zhao junqiao
  • 9 篇 xiwei liu
  • 9 篇 liu yang

语言

  • 473 篇 英文
  • 21 篇 中文
  • 10 篇 其他
检索条件"机构=The Key Laboratory of Embedded System and Service Computing Supported by Ministry of Education"
501 条 记 录,以下是71-80 订阅
排序:
Information Security Evaluation by Information Flow Analysis Based on Stochastic Petri Nets
Information Security Evaluation by Information Flow Analysis...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Hanqian Tu Dongming Xiang Wang Lin Guanjun Liu Department of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou China Department of Computer Science Key laboratory of Embedded System and Service Computing Ministry of Education Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Shanghai China
The Petri-net-based information flow analysis offers an effective approach for detecting information leakage by the concept of non-interference. Although the related studies propose efficient solutions, they lack quan... 详细信息
来源: 评论
On the Expressive Power of Behavior Structure
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Cheng Zhu, Hangyu Lin, Yuhang Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Shanghai Artificial Intelligence Laboratory Shanghai200232 China
Efforts toward a comprehensive description of behavior have indeed facilitated the development of representation-based approaches that utilize deep learning to capture behavioral information. As behavior complexity in... 详细信息
来源: 评论
Behavioral Authentication for Security and Safety
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Cheng Tang, Hao Zhu, Hangyu Zheng, Junhan Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Shanghai Artificial Intelligence Laboratory Shanghai200232 China
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system is secure or safe can be judged by whether the behavior of certain agent(... 详细信息
来源: 评论
Unsupervised Multivariate Time Series Anomaly Detection by Feature Decoupling in Federated Learning Scenarios
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: He, Yifan Ding, Xi Tang, Yateng Guan, Jihong Zhou, Shuigeng Fudan University School of Computer Science Shanghai200433 China Shanghai Key Laboratory of Intelligent Information Processing Shanghai200433 China Tencent Weixin Group Guangzhou510308 China Tongji University Department of Computer Science and Technology Shanghai201804 China Ministry of Education Key Laboratory of Embedded System and Service Computing Tongji University Shanghai200092 China
Anomalies are usually regarded as data errors or novel patterns previously unseen, which are quite different from most observed data. Accurate detection of anomalies is crucial in various application scenarios. This p... 详细信息
来源: 评论
Joint DNN Partition and Thread Allocation Optimization for Energy-Harvesting MEC systems
Joint DNN Partition and Thread Allocation Optimization for E...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Yizhou Shi Liying Li Yue Zeng Peijin Cong Junlong Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education Shanghai China
Deep neural networks (DNNs) have demonstrated exceptional performance, leading to diverse applications across various mobile devices (MDs). Considering factors like portability and environmental sustainability, an inc... 详细信息
来源: 评论
Multi-modal Large Language Model Enhanced Pseudo 3D Perception Framework for Visual Commonsense Reasoning
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Jian Wang, Hanli Shi, Miaojing The Department of Computer Science & Technology The Key Laboratory of Embedded System & Service Computing Ministry of Education Tongji University Shanghai200092 China The College of Electronic and Information Engineering Tongji University Shanghai201804 China
The visual commonsense reasoning (VCR) task is to choose an answer and provide a justifying rationale based on the given image and textural question. Representative works first recognize objects in images and then ass... 详细信息
来源: 评论
LSR-IGRU: Stock Trend Prediction Based on Long Short-Term Relationships and Improved GRU
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Peng Li, Yuante Hu, Yifan Liu, Qinyuan Cheng, Dawei Liang, Yuqi Department of Computer Science and Technology Tongji University Shanghai China Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Artificial Intelligence Laboratory Shanghai China Seek Data Group Emoney Inc Shanghai China
Stock price prediction is a challenging problem in the field of finance and receives widespread attention. In recent years, with the rapid development of technologies such as deep learning and graph neural networks, m... 详细信息
来源: 评论
A Money Laundering Structure Detection Method Based on Incremental Transaction Analysis
A Money Laundering Structure Detection Method Based on Incre...
收藏 引用
Data Science and Information Technology (DSIT), International Conference on
作者: Yifei Meng Zhong Li Key Laboratory of Embedded System and Service Computing Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China College of Information Science and Technology Donghua University Shanghai China
Money laundering is the process of legitimizing dirty money through complex transactions, posing a serious threat to a country’s financial stability and national security. Nowadays, with the prevalence of organized m...
来源: 评论
FedWNS: Data Distribution-Wise Node Selection in Federated Learning via Reinforcement Learning
FedWNS: Data Distribution-Wise Node Selection in Federated L...
收藏 引用
International Conference on Computer supported Cooperative Work in Design
作者: Chengwu Tu Shengjie Zhao Hao Deng School of Software Engineering Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Shanghai China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of Education Shanghai China
To deal with the discrepancy between global and local objectives in the federated learning invoked by the non-independent, identically distributed (non-IID) data and mitigate the impact of catastrophic forgetting in t...
来源: 评论
MIME: Fast and Accurate Flow Information Compression for Multi-Spread Estimation
MIME: Fast and Accurate Flow Information Compression for Mul...
收藏 引用
International Conference on Network Protocols
作者: Hanwen Zhang He Huang Yu-E Sun Zhaojie Wang School of Computer Science & Technology Soochow University Suzhou China School of Rail Transportation Soochow University Suzhou China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
Spread estimation is an essential issue in high-speed networks with wide applications, such as network billing, quality of service, anomaly detection, etc. As a promising technique, sketch can efficiently estimate per...
来源: 评论