咨询与建议

限定检索结果

文献类型

  • 1,197 篇 会议
  • 836 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,452 篇 工学
    • 1,167 篇 计算机科学与技术...
    • 977 篇 软件工程
    • 267 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 86 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 31 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 638 篇 理学
    • 400 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 116 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 434 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 52 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 38 篇 feature extracti...
  • 31 篇 optimization
  • 30 篇 software
  • 28 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 524 篇 state key labora...
  • 221 篇 department of co...
  • 130 篇 national key lab...
  • 108 篇 state key labora...
  • 75 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 21 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhang lijun
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,917 篇 英文
  • 61 篇 中文
  • 58 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2038 条 记 录,以下是461-470 订阅
排序:
Vaccine Allocation Strategy for Addressing Vaccine-Induced Asymptomatic Infections
Vaccine Allocation Strategy for Addressing Vaccine-Induced A...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Aibin Tang Yineng Gao Miao Liu Yue Peng Jiming Liu Benyun Shi College of Computer and Information Engineering Nanjing Tech University Nanjing P.R. China College of Artificial Intelligence Nanjing Tech University Nanjing P.R. China Department of Computer Science Hong Kong Baptist University Hong Kong State Key Lab for Novel Software Technology Nanjing University P.R. China
This study investigates the role of mass vaccination in mitigating the impact of infectious diseases, with a focus on the often-overlooked issue of asymptomatic carriers among vaccinated individuals. To accurately cap...
来源: 评论
Robin: A novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Ying Wang, Yibo Wang, Sinan Liu, Yepang Xu, Chang Cheung, Shing-Chi Yu, Hai Zhu, Zhiliang The Software College Northeasthern University China The Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China The State Key Lab for Novel Software Technology The Department of Computer Science and Technology Nanjing University China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Hong Kong
Android introduces a new permission model that allows apps to request permissions at runtime rather than at the installation time since 6.0 (Marshmallow, API level 23). While this runtime permission model provides use... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Robust Generalization against Photon-Limited Corruptions via Worst-Case Sharpness Minimization
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Zhuo Zhu, Miaoxi Xia, Xiaobo Shen, Li Yu, Jun Gong, Chen Han, Bo Du, Bo Liu, Tongliang Syndey Ai Centre The University of Sydney Australia National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China Jd Explore Academy China Department of Automation University of Science and Technology of China China Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology China Department of Computer Science Hong Kong Baptist University Hong Kong
Robust generalization aims to tackle the most challenging data distributions which are rare in the training set and contain severe noises, i.e., photon-limited corruptions. Common solutions such as distributionally ro... 详细信息
来源: 评论
Physics-informed Inverse Design of Multi-bit Programmable Metasurfaces
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Yucheng Yang, Jia-Qi Fan, Kebin Wang, Sheng Wu, Jingbo Zhang, Caihong Zhan, De-Chuan Padilla, Willie J. Jin, Biaobing Chen, Jian Wu, Peiheng Key Laboratory of Optoelectronic Devices and Systems with Extreme Performances of MOE School of Electronic Science and Engineering Nanjing University Nanjing210023 China Purple Mountain Laboratories Nanjing211111 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Electrical and Computer Engineering Duke University Box 90291 DurhamNC27708 United States
Emerging reconfigurable metasurfaces offer various possibilities in programmatically manipulating electromagnetic waves across spatial, spectral, and temporal domains, showcasing great potential for enhancing terahert... 详细信息
来源: 评论
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou310023 China ZJUT Binjiang Institute of Artificial Intelligence Hangzhou310056 China Fudan University Adaptive Networks and Control Lab Department of Electronic Engineering School of Information Science and Technology Shanghai200433 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Shenzhen518066 China National Key Laboratory of Electromagnetic Space Security Jiaxing314033 China
Due to the decentralized and public nature of the blockchain ecosystem, malicious activities on the Ethereum platform impose immeasurable losses on users. At the same time, the transparency of cryptocurrency transacti... 详细信息
来源: 评论
Incremental Few-Shot Semantic Segmentation via Embedding Adaptive-Update and Hyper-class Representation
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Guangchen Wu, Yirui Liu, Jun Wan, Shaohua Wang, Wenhai Lu, Tong Collage of Computer and Information Hohai University Nanjing China Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Singapore Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen China Shanghai AI Laboratory Shanghai China National Key Lab for Novel Software Technology Nanjing University Nanjing China
Incremental few-shot semantic segmentation (IFSS) targets at incrementally expanding model’s capacity to segment new class of images supervised by only a few samples. However, features learned on old classes could si... 详细信息
来源: 评论
An empirical study on issue knowledge transfer from python to R for machine learning software  32
An empirical study on issue knowledge transfer from python t...
收藏 引用
32nd International Conference on software Engineering and Knowledge Engineering, SEKE 2020
作者: Huang, Wenchin Ji, Zhenlan Li, Yanhui State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Management and Engineering Nanjing University China
Background: With the blowout of programming languages, developers employ different languages to solve similar problems (e.g., to implement machine learning algorithms) separately and frequently, which gives rise to kn... 详细信息
来源: 评论
Boosting component-based synthesis with control structure recommendation  1
Boosting component-based synthesis with control structure re...
收藏 引用
1st ACM SIGSOFT International Workshop on Representation Learning for software Engineering and Program Languages, RL+SE and PL 2020, co-located with ESEC/FSE 2020
作者: Liu, Binbin Dong, Wei Zhang, Yating Wang, Daiyan Liu, Jiaxin College of Computer Science National University of Defense Technology Changsha China Key Lab. of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China
Component-based synthesis is an important research field in program synthesis. API-based synthesis is a subfield of component-based synthesis, the component library of which are Java APIs. Unlike existing work in API-... 详细信息
来源: 评论