咨询与建议

限定检索结果

文献类型

  • 1,409 篇 会议
  • 1,088 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,725 篇 工学
    • 1,388 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 308 篇 信息与通信工程
    • 233 篇 控制科学与工程
    • 139 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 99 篇 机械工程
    • 73 篇 光学工程
    • 64 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 安全科学与工程
  • 748 篇 理学
    • 481 篇 数学
    • 147 篇 生物学
    • 140 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 501 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 194 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 45 篇 医学
    • 40 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 64 篇 semantics
  • 49 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 testing
  • 35 篇 feature extracti...
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 941 篇 state key labora...
  • 207 篇 department of co...
  • 125 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 state key labora...
  • 86 篇 state key labora...
  • 78 篇 college of compu...
  • 66 篇 department of co...
  • 54 篇 school of comput...
  • 52 篇 state key labora...
  • 47 篇 national key lab...
  • 46 篇 nanjing universi...
  • 41 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 the state key la...
  • 32 篇 state key lab. f...
  • 28 篇 department of co...
  • 27 篇 university of ch...
  • 27 篇 school of comput...

作者

  • 56 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 ying mingsheng
  • 31 篇 qi lei
  • 30 篇 shen furao
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,223 篇 英文
  • 221 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2502 条 记 录,以下是281-290 订阅
排序:
Nerftap: Enhancing Transferability of Adversarial Patches on Face Recognition Using Neural Radiance Fields
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Xiaoliang Shen, Fu-Rao Han, Feng Zhao, Jian Nie, Changhai State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Face recognition (FR) technology plays a crucial role in various applications, but its vulnerability to adversarial attacks poses significant security concerns. Existing research primarily focuses on transferability t... 详细信息
来源: 评论
Decentralized Counterfactual Value with Threat Detection in Multi-Agent Mixed Cooperative and Competitive Environment
SSRN
收藏 引用
SSRN 2023年
作者: Dong, Shaokang Li, Chao Yang, Shangdong Gao, Yang State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science Nanjing University of Posts and Telecommunications China
This paper introduces a fully decentralized method to address the problem of general mixed cooperation and competition in multi-agent setting. There are two main types of traditional Multi-Agent Reinforcement Learning... 详细信息
来源: 评论
Momentum Posterior Regularization for Multi-hop Dense Retrieval
arXiv
收藏 引用
arXiv 2024年
作者: Xia, Zehua Wu, Yuyang Xia, Yiyun Nguyen, Cam-Tu State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science Nanjing University China School of Artificial Intelligence Nanjing University China
Multi-hop question answering (QA) often requires sequential retrieval (multi-hop retrieval), where each hop retrieves missing knowledge based on information from previous hops. To facilitate more effective retrieval, ... 详细信息
来源: 评论
ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems
ATOM: Automated Black-Box Testing of Multi-Label Image Class...
收藏 引用
IEEE International Conference on Automated software Engineering (ASE)
作者: Shengyou Hu Huayao Wu Peng Wang Jing Chang Yongjun Tu Xiu Jiang Xintao Niu Changhai Nie Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University China Guangdong OPPO Mobile Telecommunications Corp. Ltd. China
Multi-label Image Classification Systems (MICSs) developed based on Deep Neural Networks (DNNs) are extensively used in people's daily life. Currently, although there are a variety of approaches to test DNN-based ...
来源: 评论
Vulnerable Region-Aware Greybox Fuzzing
收藏 引用
Journal of computer science & technology 2021年 第5期36卷 1212-1228页
作者: Ling-Yun Situ Zhi-Qiang Zuo Le Guan Lin-Zhang Wang Xuan-Dong Li Jin Shi Peng Liu State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China School of Information Management Nanjing UniversityNanjing 210023China Department of Computer Science University of GeorgiaAthensGA 30602U.S.A. College of Information Sciences and Technology Pennsylvania State UniversityState CollegePA 16802U.S.A
Fuzzing is known to be one of the most effective techniques to uncover security vulnerabilities of large-scale software *** fuzzing,it is crucial to distribute the fuzzing resource appropriately so as to achieve the b... 详细信息
来源: 评论
Generalized Image Embedding for Multi-Domain Image Retrieval
Generalized Image Embedding for Multi-Domain Image Retrieval
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Boao Xiao Siyuan Wu Xin He Wanchun Dou State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science Nanjing University of Posts and Telecommunications China
Image embedding, being a fundamental task in computer vision, plays a crucial role in various downstream tasks such as image retrieval. Widely adopted in e-commerce and social media collaboration, image retrieval bene...
来源: 评论
Vehicle Check-In Data-driven POI Recommendation Based on Improved SVD and Graph Convolutional Network  19
Vehicle Check-In Data-driven POI Recommendation Based on Imp...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Liu, Yuwen Zhang, Jie Dou, Ruihan Zhou, Xiaokang Xu, Xiaolong Wang, Shoujin Qi, Lianyong College of Computer Science and Technology Qingdao China Nanjing University State Key Laboratory for Novel Software Technology Department of Computer Science and Technology China Shanghai Meteorological Information and Technology Support Center China University of Waterloo Faculty of Mathematics Waterloo Canada Shiga University Faculty of Data Science Japan Riken Center for Advanced Intelligence Project Riken Japan Nanjing University of Information Science and Technology School of Computer and Software China Macquarie University School of Computing Australia Qufu Normal University School of Computer Science China
The application of automobile tool software is becoming increasingly widespread, and its functions are becoming increasingly diverse. Using vehicle traffic data to give users with recommendations for Points-of-interes... 详细信息
来源: 评论
Camera Seismocardiogram Based Monitoring of Left Ventricular Ejection Time
收藏 引用
IEEE Transactions on Biomedical Engineering 2025年 PP卷 PP页
作者: Zhou, Zhiqin Huang, Jia Li, Haozhe Liu, Lin Zhu, Yingen Shan, Caifeng Wang, Wenjin Nanjing University State Key Laboratory for Novel Software Technology School of Intelligence Science and Technology China Southern University of Science and Technology Department of Biomedical Engineering China The Third People's Hospital of Shenzhen Intensive Care Unit China Shandong University of Science and Technology College of Electrical Engineering and Automation China
Left Ventricular Ejection Time (LVET), reflecting the duration from the onset to the end of blood ejection by the left ventricle during each heartbeat, is a critical parameter for measuring cardiac pumping efficiency.... 详细信息
来源: 评论
Duplicate Data Elimination Optimization Strategy Based on Edge Service Management
Duplicate Data Elimination Optimization Strategy Based on Ed...
收藏 引用
Cyber science and technology Congress (CyberSciTech), IEEE
作者: Yonglin Pu Xiaolong Xu Lianyong Qi Wanchun Dou Jiong Yu Ziyang Li School of Software Nanjing University of Information Science and Technology Nanjing China College of Computer Science and Technology China University of Petroleum (East China) Dongying China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Software Xinjiang University Urumqi China
Due to the absence of duplicate data elimination technologies in edge architectures, the interaction experience with mobile users suffers. In response to this issue, an optimized strategy for duplicate data eliminatio... 详细信息
来源: 评论
CACam: Consecutive Angular Measurements with Camera on Smartphone for Distance Estimation
CACam: Consecutive Angular Measurements with Camera on Smart...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yifan Zhu Xiaojun Zhu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
To estimate the distance between a user and the target object for personal interest or for subsequent actions, the commonly used method is to search the target in the map application. However this is limited by GPS si... 详细信息
来源: 评论