咨询与建议

限定检索结果

文献类型

  • 5,174 篇 会议
  • 3,478 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,808 篇 工学
    • 4,513 篇 计算机科学与技术...
    • 3,664 篇 软件工程
    • 1,025 篇 信息与通信工程
    • 736 篇 控制科学与工程
    • 473 篇 生物工程
    • 472 篇 电气工程
    • 395 篇 机械工程
    • 384 篇 电子科学与技术(可...
    • 272 篇 光学工程
    • 251 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 188 篇 仪器科学与技术
    • 169 篇 网络空间安全
    • 166 篇 动力工程及工程热...
    • 155 篇 安全科学与工程
    • 148 篇 建筑学
    • 136 篇 交通运输工程
    • 135 篇 土木工程
  • 2,665 篇 理学
    • 1,694 篇 数学
    • 535 篇 生物学
    • 515 篇 物理学
    • 460 篇 统计学(可授理学、...
    • 324 篇 系统科学
    • 211 篇 化学
  • 1,685 篇 管理学
    • 1,002 篇 管理科学与工程(可...
    • 744 篇 图书情报与档案管...
    • 312 篇 工商管理
  • 198 篇 法学
    • 147 篇 社会学
  • 195 篇 医学
    • 159 篇 临床医学
    • 141 篇 基础医学(可授医学...
  • 101 篇 经济学
  • 90 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 26 篇 艺术学
  • 23 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 272 篇 laboratories
  • 208 篇 semantics
  • 169 篇 feature extracti...
  • 150 篇 computational mo...
  • 142 篇 data mining
  • 141 篇 software
  • 137 篇 software enginee...
  • 127 篇 training
  • 121 篇 deep learning
  • 119 篇 algorithm design...
  • 115 篇 optimization
  • 108 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 101 篇 cloud computing
  • 98 篇 accuracy
  • 92 篇 costs
  • 91 篇 software testing
  • 90 篇 application soft...
  • 89 篇 predictive model...

机构

  • 1,025 篇 state key labora...
  • 209 篇 state key labora...
  • 202 篇 national key lab...
  • 191 篇 department of co...
  • 182 篇 college of compu...
  • 168 篇 department of co...
  • 151 篇 university of ch...
  • 123 篇 tianjin key labo...
  • 113 篇 school of inform...
  • 109 篇 state key labora...
  • 104 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 beijing key labo...
  • 93 篇 school of comput...
  • 91 篇 key laboratory o...
  • 88 篇 school of softwa...
  • 86 篇 state key labora...
  • 83 篇 shandong provinc...
  • 78 篇 national enginee...

作者

  • 64 篇 junping du
  • 63 篇 gao yang
  • 46 篇 yin baocai
  • 41 篇 shi yinghuan
  • 40 篇 zhang hua
  • 40 篇 wang wei
  • 39 篇 shen linlin
  • 38 篇 baocai yin
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 37 篇 guihai chen
  • 34 篇 xu baowen
  • 32 篇 dou wanchun
  • 31 篇 yu huiqun
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 li wu-jun

语言

  • 7,636 篇 英文
  • 807 篇 其他
  • 247 篇 中文
  • 2 篇 德文
检索条件"机构=Computer and Software Technology Laboratory"
8679 条 记 录,以下是81-90 订阅
排序:
SP-E: Security Evaluation Framework of In-vehicle Infotainment System based on Threat Analyses and Penetration Tests  2
SP-E: Security Evaluation Framework of In-vehicle Infotainme...
收藏 引用
2022 2nd International Conference on Communication technology and Information technology, ICCTIT 2022
作者: Li, Shuang Zhang, Xin Zhou, Yue Zhang, Meng School of Computer Science Fudan University 200433 China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology 201112 China
With the increasing requirement of people, the functions of in-vehicle infotainment systems are becoming more and more abundant, and their security also affects the safety of vehicles. Therefore, it is more and more i... 详细信息
来源: 评论
DeepTD: Diversity-Guided Deep Neural Network Test Generation  9th
DeepTD: Diversity-Guided Deep Neural Network Test Generation
收藏 引用
9th International Symposium on Dependable software Engineering: Theories, Tools and Applications, SETTA 2023
作者: Zhu, Jin Tao, Chuanqi Guo, Hongjing Ju, Yue College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing China State Key Laboratory for Novel Software Technology Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China
Coverage-guided Fuzz Testing (CGF) techniques have been applied to deep neural network (DNN) testing in recent years, generating a significant number of test samples to uncover inherent defects in DNN models. However,... 详细信息
来源: 评论
Introduction to the Special Issue on Formal Methods and Models for System Design
收藏 引用
ACM Transactions on Embedded Computing Systems 2025年 第3期24卷 1-3页
作者: Brandt, Jens Saha, Indranil Zhang, Lijun Hochschule Niederrhein Krefeld Germany Department of Computer Science and Engineering Indian Institute of Technology Kanpur Kanpur India State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
来源: 评论
SyNet:Medical image anomaly detection with noise synthesis network  10
SyNet:Medical image anomaly detection with noise synthesis n...
收藏 引用
10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024
作者: Liu, Jingnian Liang, Wei Chen, Yuxiang Jin, Kai Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtang China
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv... 详细信息
来源: 评论
LAMB: Label-Induced Mixed-Level Blending for Multimodal Multi-label Emotion Detection  19th
LAMB: Label-Induced Mixed-Level Blending for Multimodal Mul...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Qian, Shuwei Guo, Ming Fan, Zhicheng Chen, Mingcai Wang, Chongjun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
To better understand complex human emotions, there is growing interest in utilizing heterogeneous sensory data to detect multiple co-occurring emotions. However, existing studies have focused on extracting static info... 详细信息
来源: 评论
Time Series Data Cleaning under Expressive Constraints on Both Rows and Columns  40
Time Series Data Cleaning under Expressive Constraints on Bo...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Ding, Xiaoou Li, Genglong Wang, Hongzhi Wang, Chen Song, Yichen School of Computer Science and Technology Harbin Institute of Technology China Tsinghua University National Engineering Laboratory for Big Data Software EIRI China
Time series data generated by thousands of sensors are suffering data quality problems. Traditional constraint-based techniques have greatly contributed to data cleaning applications. However, cleaning methods that su... 详细信息
来源: 评论
The Computational Advantage of MIP∗ Vanishes in the Presence of Noise  39
The Computational Advantage of MIP∗ Vanishes in the Presenc...
收藏 引用
39th Computational Complexity Conference, CCC 2024
作者: Dong, Yangjing Fu, Honghao Natarajan, Anand Qin, Minglong Xu, Haochen Yao, Penghui State Key Laboratory for Novel Software Technology Nanjing University China Massachusetts Institute of Technology CambridgeMA United States State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Hefei National Laboratory China
The class MIP∗ of quantum multiprover interactive proof systems with entanglement is much more powerful than its classical counterpart MIP [7, 29, 28]: while MIP = NEXP, the quantum class MIP∗ is equal to RE, a class ... 详细信息
来源: 评论
Recommending Missed Citations Identified by Reviewers: A New Task, Dataset and Baselines  30
Recommending Missed Citations Identified by Reviewers: A New...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Long, Kehan Li, Shasha Wang, Pancheng Bao, Chenlong Tang, Jintao Wang, Ting School of Computer National University of Defense Technology China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China
Citing comprehensively and appropriately has become a challenging task with the explosive growth of scientific publications. Current citation recommendation systems aim to recommend a list of scientific papers for a g... 详细信息
来源: 评论
Testing Constraint Checking Implementations via Principled Metamorphic Transformations  31
Testing Constraint Checking Implementations via Principled M...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Gao, Mingchen Wang, Huiyan Xu, Chang Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University Department of Computer Science and Technology Nanjing China
Constraint checking techniques are being widely used for ensuring the consistency of software artifacts during their development and evolution (e.g., detecting inconsistency in an application's running contexts or... 详细信息
来源: 评论
Adversarial image detection based on the maximum channel of saliency maps
收藏 引用
Optoelectronics Letters 2022年 第5期18卷 307-312页
作者: FU Haoran WANG Chundong LIN Hao HAO Qingbo Key Laboratory of Computer Vision and System Tianjin Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjin University of TechnologyTianjin 300384China
Studies have shown that deep neural networks(DNNs) are vulnerable to adversarial examples(AEs) that induce incorrect behaviors. To defend these AEs, various detection techniques have been developed. However, most of t... 详细信息
来源: 评论