咨询与建议

限定检索结果

文献类型

  • 1,192 篇 会议
  • 833 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,453 篇 工学
    • 1,168 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 267 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 85 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 31 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 638 篇 理学
    • 400 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 116 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 28 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 75 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 21 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,908 篇 英文
  • 61 篇 中文
  • 58 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2029 条 记 录,以下是101-110 订阅
排序:
Finding Cross-rule Optimization Bugs in Datalog Engines
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Chi Wang, Linzhang Rigger, Manuel State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China National University of Singapore Singapore
Datalog is a popular and widely-used declarative logic programming language. Datalog engines apply many cross-rule optimizations;bugs in them can cause incorrect results. To detect such optimization bugs, we propose a... 详细信息
来源: 评论
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
MIRROR: Model Inversion for Deep Learning Network with High Fidelity  29
MIRROR: Model Inversion for Deep Learning Network with High ...
收藏 引用
29th Annual Network and Distributed System Security Symposium, NDSS 2022
作者: An, Shengwei Tao, Guanhong Xu, Qiuling Liu, Yingqi Shen, Guangyu Yao, Yuan Xu, Jingwei Zhang, Xiangyu Department of Computer Science Purdue University United States State Key Laboratory for Novel Software Technology Nanjing University China
Model inversion reverse-engineers input samples from a given model, and hence poses serious threats to information confidentiality. We propose a novel inversion technique based on StyleGAN, whose generator has a speci... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
A Comprehensive Survey on Communication-Efficient Federated Learning in Mobile Edge Environments
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Jia, Ninghui Qu, Zhihao Ye, Baoliu Wang, Yanyan Hu, Shihong Guo, Song Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources College of Computer Science and Software Engineering Nanjing211100 China Nanjing University State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing210023 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Kowloon Hong Kong
In traditional centralized machine learning, transmitting raw data to a cloud center incurs high communication costs and raises privacy concerns. This is particularly challenging in mobile edge environments, where dev... 详细信息
来源: 评论
Non-stationary online learning with memory and non-stochastic control
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2023年 第1期24卷 9831-9900页
作者: Peng Zhao Yu-Hu Yan Yu-Xiang Wang Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science University of California Santa Barbara CA
We study the problem of Online Convex Optimization (OCO) with memory, which allows loss functions to depend on past decisions and thus captures temporal effects of learning problems. In this paper, we introduce dynami... 详细信息
来源: 评论
BPMN++: Comprehensive Business Process Modeling for Industrial Internet Application  20
BPMN++: Comprehensive Business Process Modeling for Industri...
收藏 引用
20th IEEE International Symposium on Parallel and Distributed Processing with Applications, 12th IEEE International Conference on Big Data and Cloud Computing, 12th IEEE International Conference on Sustainable Computing and Communications and 15th IEEE International Conference on Social Computing and Networking, ISPA/BDCloud/SocialCom/SustainCom 2022
作者: Cheng, Hangyu Kang, Guosheng Liu, Jianxun Wen, Yiping Cao, Buqing Wang, Zhen School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hnust Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Xiangtan China
Business process management is the end-to-end business process modeling, analysis, and optimization to achieve business goals. Business Process Modeling Notation (BPMN) is usually used to represent business process mo... 详细信息
来源: 评论
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1-21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论
Long- and Short- Term Sequential Recommendation with Temporal Interval  19
Long- and Short- Term Sequential Recommendation with Tempora...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: He, Kun Liu, Qiyan Li, Qianmu Meng, Shunmei Nanjing University of Science and Technology Nanjing China University of Toronto Computer Engineering Canada Nanjing University State Key Lab. for Novel Software Technology Nanjing China
Sequential recommendation aims to learn the changes of users' interests according to their historical behaviors and predict the most likely next item. Since user's historical behavior are sequential actions, u... 详细信息
来源: 评论
Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective
Lightweight Approaches to DNN Regression Error Reduction: An...
收藏 引用
International Conference on software Engineering (ICSE)
作者: Zenan Li Maorun Zhang Jingwei Xu Yuan Yao Chun Cao Taolue Chen Xiaoxing Ma Jian Lü Department of Computer Science and Technology State Key Lab of Novel Software Technology Nanjing University China Department of Computer Science Birkbeck University of London UK
Regression errors of Deep Neural Network (DNN) models refer to the case that predictions were correct by the old-version model but wrong by the new-version model. They frequently occur when upgrading DNN models in pro...
来源: 评论