×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [31]
作者
Han, Hu [3]
Shan, Shig... [3]
Sui, Yuefe... [3]
Sun, Xiaom... [3]
Cao, Yixua... [2]
Chen, Xili... [2]
更多...
文献类型
期刊论文 [31]
发表日期
2021 [31]
语种
英语 [31]
出处
FRONTIERS ... [6]
IEEE TRANS... [3]
IEEE TRANS... [3]
ACM TRANSA... [2]
IEEE TRANS... [2]
PEERJ COMP... [2]
更多...
资助项目
National N... [3]
Beijing Un... [2]
Innovation... [2]
National B... [2]
National K... [2]
National K... [2]
更多...
收录类别
SCI [31]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共31条,第1-10条
帮助
限定条件
发表日期:2021
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
A differential game view of antagonistic dynamics for cybersecurity
期刊论文
COMPUTER NETWORKS, 2021, 卷号: 200, 页码: 11
作者:
Wang, Shengling
;
Pu, Yu
;
Shi, Hongwei
;
Huang, Jianhui
;
Xiao, Yinhao
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2021/12/01
Antagonistic dynamics
Cybersecurity
Differential game
Saddle point
Efficiently Inferring Top-k Largest Monitoring Data Entries Based on Discrete Tensor Completion
期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 卷号: 29, 期号: 6, 页码: 2737-2750
作者:
Tian, Jiazheng
;
Xie, Kun
;
Wang, Xin
;
Xie, Gaogang
;
Li, Kenli
;
Wen, Jigang
;
Zhang, Dafang
;
Cao, Jiannong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/21
Top-k largest entry inference
tensor completion
Heterogeneous Computational Resource Allocation for C-RAN: A Contract-Theoretic Approach
期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 卷号: 14, 期号: 6, 页码: 2026-2040
作者:
Gao, Mingjin
;
Shen, Rujing
;
Yan, Shihao
;
Li, Jun
;
Guan, Haibing
;
Li, Yonghui
;
Shi, Jinglin
;
Han, Zhu
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2022/06/21
Contracts
Resource management
Indium phosphide
III-V semiconductor materials
Base stations
Closed-form solutions
Computer science
Heterogeneous computational resources allocation
virtualized base station
cloud-RAN
cellular networks
contract theory
incentive mechanism
A game model for information dissemination in live streaming e-commerce environment
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 页码: 14
作者:
Lv, Junjie
;
Yao, Wenjing
;
Wang, Yuanzhuo
;
Wang, Zichen
;
Yu, Jianye
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2021/12/01
Learning to Fool the Speaker Recognition
期刊论文
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 卷号: 17, 期号: 3, 页码: 21
作者:
Li, Jiguo
;
Zhang, Xinfeng
;
Xu, Jizheng
;
Ma, Siwei
;
Gao, Wen
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/12/07
Audio forensics
adversarial attack
deep neural network
Follow the perturbed approximate leader for solving semi-bandit combinatorial optimization
期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2021, 卷号: 15, 期号: 5, 页码: 12
作者:
Yang, Feidiao
;
Chen, Wei
;
Zhang, Jialin
;
Sun, Xiaoming
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2021/12/01
online learning
online combinatorial optimization
semi-bandit
follow-the-perturbed-leader
Variant quantifiers in L-3-valued first-order logic
期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2021, 卷号: 15, 期号: 5, 页码: 9
作者:
Li, Wei
;
Sui, Yuefei
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/06/21
L
(3)-valued (three-valued) first-order logic
sequent
quantifier
soundness theorem
completeness theorem
IAUnet: Global Context-Aware Feature Learning for Person Reidentification
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 卷号: 32, 期号: 10, 页码: 4460-4474
作者:
Hou, Ruibing
;
Ma, Bingpeng
;
Chang, Hong
;
Gu, Xinqian
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/12/01
Context modeling
Feature extraction
Computational modeling
Semantics
Aggregates
Visualization
Task analysis
Feature enhancing
interaction-aggregation
person reidentification (reID)
spatial-temporal context modeling
Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center
期刊论文
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 卷号: 9, 期号: 4, 页码: 1376-1390
作者:
Marahatta, Avinab
;
Pirbhulal, Sandeep
;
Zhang, Fa
;
Parizi, Reza M.
;
Choo, Kim-Kwang Raymond
;
Liu, Zhiyong
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2022/06/21
Cloud data center
virtualization
energy efficiency
task scheduling
task merging
virtual machine
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Liang, Ling
;
Hu, Xing
;
Deng, Lei
;
Wu, Yujie
;
Li, Guoqi
;
Ding, Yufei
;
Li, Peng
;
Xie, Yuan
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/06/21
Spatiotemporal phenomena
Computational modeling
Perturbation methods
Biological neural networks
Backpropagation
Unsupervised learning
Training
Adversarial attack
backpropagation through time (BPTT)
neuromorphic computing
spike-compatible gradient
spiking neural networks (SNNs)