咨询与建议

限定检索结果

文献类型

  • 128 篇 会议
  • 46 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 114 篇 工学
    • 77 篇 计算机科学与技术...
    • 66 篇 软件工程
    • 29 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 17 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 机械工程
    • 6 篇 仪器科学与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 冶金工程
    • 5 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
    • 4 篇 材料科学与工程(可...
    • 4 篇 交通运输工程
    • 4 篇 生物工程
  • 57 篇 理学
    • 33 篇 数学
    • 19 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 大气科学
  • 38 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 6 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 法学
  • 3 篇 农学
  • 1 篇 教育学

主题

  • 5 篇 energy consumpti...
  • 5 篇 semantics
  • 4 篇 computer science
  • 4 篇 fuzzy clustering
  • 3 篇 sensitivity
  • 3 篇 servers
  • 3 篇 pattern recognit...
  • 3 篇 protocols
  • 3 篇 federated learni...
  • 3 篇 artificial intel...
  • 3 篇 classification (...
  • 3 篇 accuracy
  • 3 篇 image reconstruc...
  • 3 篇 data models
  • 3 篇 privacy
  • 3 篇 geometry
  • 2 篇 power demand
  • 2 篇 internet of thin...
  • 2 篇 imaging
  • 2 篇 head

机构

  • 6 篇 school of comput...
  • 6 篇 school of inform...
  • 5 篇 school of mechan...
  • 5 篇 school of comput...
  • 5 篇 engineering inst...
  • 5 篇 zhejiang lab
  • 4 篇 school of instru...
  • 4 篇 first-imaging te...
  • 4 篇 zhejiang sci-tec...
  • 4 篇 school of comput...
  • 4 篇 national superco...
  • 4 篇 institute of com...
  • 4 篇 school of comput...
  • 4 篇 school of comput...
  • 4 篇 school of comput...
  • 4 篇 school of comput...
  • 3 篇 school of inform...
  • 3 篇 school of inform...
  • 3 篇 school of inform...
  • 3 篇 school of comput...

作者

  • 5 篇 shen jian
  • 4 篇 liu yang
  • 4 篇 yang yang
  • 4 篇 wan yao
  • 3 篇 wenbing huang
  • 3 篇 shan xiao
  • 3 篇 wang yasheng
  • 3 篇 dong yinpeng
  • 3 篇 yutong lu
  • 3 篇 huang wenbing
  • 3 篇 zhou pingyi
  • 3 篇 hu yating
  • 3 篇 pin chen
  • 3 篇 chanying huang
  • 3 篇 lyu tianling
  • 3 篇 lu yutong
  • 3 篇 wu hao
  • 3 篇 li yi
  • 3 篇 chen yang
  • 3 篇 wenying zheng

语言

  • 154 篇 英文
  • 16 篇 中文
  • 7 篇 其他
检索条件"机构=School of Computer Science and Engineering Nanjing University of Sci.& Tech."
176 条 记 录,以下是21-30 订阅
排序:
CODE-MVP: Learning to Represent Source Code from Multiple Views with Contrastive Pre-Training
CODE-MVP: Learning to Represent Source Code from Multiple Vi...
收藏 引用
2022 Findings of the Association for Computational Linguistics: NAACL 2022
作者: Wang, Xin Wang, Yasheng Wan, Yao Wang, Jiawei Zhou, Pingyi Li, Li Wu, Hao Liu, Jin School of Computer Science Wuhan University China Huawei Noah's Ark Lab Hong Kong School of Computer Sci. & Tech. Huazhong University of Science and Technology China Faculty of Information Technology Monash University Australia School of Information Science and Engineering Yunnan University China
Recent years have witnessed increasing interest in code representation learning, which aims to represent the semantics of source code into distributed vectors. Currently, various works have been proposed to represent ... 详细信息
来源: 评论
FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation
FusTP-FL: Enhancing Differential Federated Learning through ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Xiong Yan Kedong Yan Chanying Huang Dan Yin Shan Xiao School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Comp. Science & Engineering Nanjing Univ. of Science & Technology Nanjing China School of Elec. & Inf. Engineering Beijing Univ. of Civil Engineering & Architecture Beijing China Fiberhome Comm. Tech. Co. Wuhan China
Federated Learning enables multiple clients to collaboratively train a model without sharing their individual data, thereby protecting local data privacy. However, attackers, such as untrusted servers, can still compr... 详细信息
来源: 评论
DLSCA: Improving Cross-Device Side-Channel Analysis Using Device Discrepancy Correction
DLSCA: Improving Cross-Device Side-Channel Analysis Using De...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Fanliang Hu Yi Li Haowen Tan Shan Jiang Zhiyuan Xiao School of Computer Science Nanjing University of Information Science and Technology Nanjing China School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou China
In this paper, we focus on the problem of Transfer Learning (TL) in Side-Channel Analysis (SCA) due to differences between the source device and the target device. Such differences are inevitable in practical SCA, but...
来源: 评论
FedFC: An Efficient Personalized Federated Learning Method on Non-iid Data
FedFC: An Efficient Personalized Federated Learning Method o...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yuxin Yang Yifei Wang Chanying Huang Qianmu Li Shan Xiao School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China School of Computer Science & Engineering Nanjing University of Science & Technology Nanjing China School of Cyber Science & Engineering Nanjing Univ. of Science & Technology Nanjing China Fiberhome R & D Center Fiberhome Communication Tech. Co. Wuhan China
Federated Learning has been widely used due to its ability to train models while ensuring data privacy and security. However, the presence of non-i.i.d. (independent and identically distributed) data among different p...
来源: 评论
Invited Paper: Actuator Trajectory Planning for UAVs with Overhead Manipulator using Reinforcement Learning
Invited Paper: Actuator Trajectory Planning for UAVs with Ov...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Hazim Alzorgan Abolfazl Razi Ata Jahangir Moshayedi School of Computer Science Clemson University Clemson SC School of Information Engineering Jiangxi University of Sci. & Tech. Jiangxi China
In this paper, we investigate the operation of an aerial manipulator system, namely an Unmanned Aerial Vehicle (UAV) equipped with a controllable arm with two degrees of freedom to carry out actuation tasks on the fly...
来源: 评论
Learning Superconductivity from Ordered and Disordered Material Structures  38
Learning Superconductivity from Ordered and Disordered Mater...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Pin Peng, Luoxuan Jiao, Rui Mo, Qing Wang, Zhen Huang, Wenbing Liu, Yang Lu, Yutong National Supercomputer Center in Guangzhou School of Computer Science and Engineering Sun Yat-sen University China Dept. of Comp. Sci. & Tech. Institute for AI BNRist Center Tsinghua University China Institute for AIR Tsinghua University China Gaoling School of Artificial Intelligence Renmin University of China China Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China
Superconductivity is a fascinating phenomenon observed in certain materials under certain conditions. However, some critical aspects of it, such as the relationship between superconductivity and materials' chemica...
来源: 评论
Efficient Registered Attribute Based Access Control with Same Sub-policies in Mobile Cloud Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Weng, Wuwei Li, Jiguo Zhang, Yichen Lu, Yang Shen, Jian Han, Jinguang Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China Southeast University School of Cyber Science and Engineering Nanjing210096 China
Ciphertext-policy attribute-based encryption (CP-ABE) has long been considered as a promising access control tech.ology for cloud storage. However, CP-ABE depends on a central trusted authority to generate and distrib... 详细信息
来源: 评论
Actuator Trajectory Planning for UAVs with Overhead Manipulator using Reinforcement Learning
arXiv
收藏 引用
arXiv 2023年
作者: Alzorgan, Hazim Razi, Abolfazl Moshayedi, Ata Jahangir School of Computer Science Clemson University ClemsonSC United States School of Information Engineering Jiangxi University of Sci. & Tech. Jiangxi China
In this paper, we investigate the operation of an aerial manipulator system, namely an Unmanned Aerial Vehicle (UAV) equipped with a controllable arm with two degrees of freedom to carry out actuation tasks on the fly... 详细信息
来源: 评论
BBDAS: Blockchain-Assisted Blinded Data Auditing Scheme for Cloud-Edge Systems  6th
BBDAS: Blockchain-Assisted Blinded Data Auditing Scheme for...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Wang, Chen Cui, Yuxin Yang, Bing Shen, Wei Tong, Wei School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China School of Computer Science Nanjing University of Information Science Technology Jiangsu210044 China Zhejiang Sci-Tech University Hangzhou310018 China Hangzhou Institute of Technology Xidian University Hangzhou311200 China
In distributed large-scale intelligent computing, efficient collaboration between the cloud and edge devices is essential to provide rapid data access for a vast number of users, which is crucial for optimal data... 详细信息
来源: 评论
Investigating the Impact of Bug Dependencies on Bug-Fixing Time Prediction
Investigating the Impact of Bug Dependencies on Bug-Fixing T...
收藏 引用
International Symposium on Empirical Software engineering and Measurement, ESEM
作者: Chenglin Li Yangyang Zhao Yibiao Yang Yuming Zhou Liming Nie Zuohua Ding School of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou China State Key Lab for Novel Software Technology Nanjing University Nanjing China School of Computer Science and Engineering Nanyang Technological University Singapore
Background: Bug dependencies refer to the link relationships between bugs and related issues, which are commonly observed in software evolution. It has been found that bugs with bug dependencies often take longer time...
来源: 评论