咨询与建议

限定检索结果

文献类型

  • 1,197 篇 会议
  • 838 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,454 篇 工学
    • 1,168 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 267 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 86 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 31 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 638 篇 理学
    • 400 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 116 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 52 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 38 篇 feature extracti...
  • 31 篇 optimization
  • 30 篇 software
  • 28 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 524 篇 state key labora...
  • 222 篇 department of co...
  • 130 篇 national key lab...
  • 108 篇 state key labora...
  • 75 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 39 篇 department of co...
  • 37 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 school of electr...
  • 27 篇 department of co...
  • 25 篇 department of co...
  • 21 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,919 篇 英文
  • 61 篇 中文
  • 58 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2040 条 记 录,以下是371-380 订阅
排序:
Efficient Edge Intelligence under Clustering for UAV Swarm Networks
Efficient Edge Intelligence under Clustering for UAV Swarm N...
收藏 引用
2021 IEEE International Conference on Space-Air-Ground Computing, SAGC 2021
作者: Qu, Yuben Dong, Chao Wu, Tao Zhuang, Yan Dai, Haipeng Wu, Fan Nanjing University of Aeronautics and Astronautics The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology China National University of Defense Technology China Shanghai Jiao Tong University Department of Computer Science and Engineering China Nanjing University State Key Laboratory for Novel Software Technology China
Unmanned aerial vehicles (UAVs) are expected to be widely used in many critical applications including monitoring, surveillance, urban target tracking, and delivery of goods, from military to civil fields. To realize ... 详细信息
来源: 评论
GAI-Enabled Explainable Personalized Federated Semi-Supervised Learning
arXiv
收藏 引用
arXiv 2024年
作者: Peng, Yubo Jiang, Feibo Dong, Li Wang, Kezhi Yang, Kun State Key Laboratory of Novel Software Technology Nanjing University Nanjing China Suzhou China School of Information Science and Engineering Hunan Normal University Changsha China Changsha Social Laboratory of Artificial Intelligence Hunan University of Technology and Business Changsha China Department of Computer Science Brunel University London United Kingdom
Federated learning (FL) is a commonly distributed algorithm for mobile users (MUs) training artificial intelligence (AI) models, however, several challenges arise when applying FL to real-world scenarios, such as labe... 详细信息
来源: 评论
Scaling Multi-Objective Security Games Provably via Space Discretization Based Evolutionary Search
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Yu-Peng Qian, Hong Qin, Rong-Jun Chen, Yi Zhou, Aimin School of Computer Science and Technology East China Normal University Shanghai China Shanghai Institute of AI for Education East China Normal University Shanghai China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Polixir Technologies Nanjing China Department of Computer Science and Artificial Intelligence Wenzhou University Wenzhou China
In the field of security, multi-objective security games (MOSGs) allow defenders to simultaneously protect targets from multiple heterogeneous attackers. MOSGs aim to simultaneously maximize all the heterogeneous payo... 详细信息
来源: 评论
TDID: Transparent and Efficient Decentralized Identity Management with Blockchain
TDID: Transparent and Efficient Decentralized Identity Manag...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jiakun Hao Jianbo Gao Peng Xiang Jiashuo Zhang Ziming Chen Hao Hu Zhong Chen School of Computer Science Peking University Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China State Key Lab for Novel Software Technology Nanjing University Nanjing Jiangsu China
Decentralized identity (DID) is an identity management framework aiming to return the ownership of an identity to its corresponding user. Recent studies propose to store the identifiers of DID issuers and implement id...
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Identification of Microservices through Processed Dynamic Traces and Static Calls
Identification of Microservices through Processed Dynamic Tr...
收藏 引用
computer science and Management technology (ICCSMT), International Conference on
作者: Sijie Wu Cheng Zhang Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University School of Computer Science and Technology Anhui University State Key Lab for Novel Software Technology Nanjing University Hefei China
As the complexity of software systems continues to increase, traditional monolithic software architectures will become difficult to scale and maintain. Microservices as an emerging software architecture it advocates d...
来源: 评论
How to Reduce Change Detection to Semantic Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Guo-Hua Gao, Bin-Bin Wang, Chenjie State Key Laboratory for Novel Software Technology Nanjing University China Youtu Lab Tencent China Department of Computer Science and Engineering Shanghai Jiao Tong University China
Change detection (CD) aims to identify changes that occur in an image pair taken different times. Prior methods devise specific networks from scratch to predict change masks in pixel-level, and struggle with general s... 详细信息
来源: 评论
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-trained Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Quanjun Fang, Chunrong Zheng, Yi Zhang, Yaxin Zhao, Yuan Huang, Rubing Zhou, Jianyi Yang, Yun Zheng, Tao Chen, Zhenyu Department of Computing Technologies Swinburne University of Technology Melbourne Australia State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China School of Computer Science and Engineering Macau University of Science and Technology Jiangsu Nanjing China Huawei Cloud Computing Technologies Co. Ltd. Beijing China Shenzhen Research Institute of Nanjing University Guangdong Shenzhen China
Unit testing validates the correctness of the units of the software system under test and serves as the cornerstone in improving software quality and reliability. To reduce manual efforts in writing unit tests, some t... 详细信息
来源: 评论
Dual Teacher Knowledge Distillation with Domain Alignment for Face Anti-spoofing
arXiv
收藏 引用
arXiv 2024年
作者: Kong, Zhe Zhang, Wentian Wang, Tao Zhang, Kaihao Li, Yuexiang Tang, Xiaoying Luo, Wenhan Sun Yat-sen University the Shenzhen Campus Shenzhen China Jarvis Research Center Tencent YouTu Lab Singapore The State Key Laboratory for Novel Software Technology Nanjing University Nanjing China The Harbin Institute of Technology Shenzhen China The Department of Electronic and Electrical Engineering Southern University of Science and Technology Shenzhen China
Face recognition systems have raised concerns due to their vulnerability to different presentation attacks, and system security has become an increasingly critical concern. Although many face anti-spoofing (FAS) metho... 详细信息
来源: 评论
Hyper-IIoT: A Smart Contract-inspired Access Control Scheme for Resource-constrained Industrial Internet of Things
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年
作者: Li, Dun Li, Hongzhi Crespi, Noel Minerva, Roberto Li, Ming Liang, Wei Li, Kuan-Ching Tsinghua University Department of Industrial Engineering China Institut Polytechnique de Paris Samovar Telecom SudParis Palaiseau91120 France Chizhou University College of Big Data and Artificial Intelligence Chizhou247100 China The Hong Kong Polytechnic University Research Institute for Advanced Manufacturing Hung Hom Hong Kong Hunan University of Science and Technology School of Computer Science and Engineering Hunan University of Science and Technology Sanya Research Institute Hunan Key Laboratory for Service Computing and Novel Software Technology China Providence University Dept. of Computer Science and Information Engineering Taiwan
In recent years, the refinements in industrial processes and the increasing complexity of managing privacy-sensitive data in Industrial Internet of Things (IIoT) devices have highlighted the need for secure, robust, a... 详细信息
来源: 评论