咨询与建议

限定检索结果

文献类型

  • 374 篇 期刊文献
  • 304 篇 会议

馆藏范围

  • 678 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 487 篇 工学
    • 364 篇 计算机科学与技术...
    • 275 篇 软件工程
    • 98 篇 信息与通信工程
    • 47 篇 控制科学与工程
    • 44 篇 生物工程
    • 39 篇 电子科学与技术(可...
    • 35 篇 机械工程
    • 30 篇 电气工程
    • 22 篇 光学工程
    • 20 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 18 篇 仪器科学与技术
    • 16 篇 生物医学工程(可授...
    • 13 篇 建筑学
    • 12 篇 土木工程
  • 226 篇 理学
    • 124 篇 数学
    • 57 篇 物理学
    • 48 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
    • 10 篇 大气科学
  • 133 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 19 篇 法学
    • 10 篇 社会学
    • 9 篇 法学
  • 17 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 19 篇 semantics
  • 15 篇 computer science
  • 15 篇 data mining
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 12 篇 cloud computing
  • 12 篇 training
  • 11 篇 data privacy
  • 11 篇 software testing
  • 10 篇 steganography
  • 10 篇 federated learni...
  • 9 篇 reinforcement le...
  • 9 篇 optimization
  • 9 篇 computational mo...
  • 9 篇 blockchain
  • 8 篇 internet of thin...
  • 8 篇 servers
  • 8 篇 wireless sensor ...
  • 8 篇 software quality
  • 8 篇 clustering algor...

机构

  • 127 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 53 篇 state key labora...
  • 30 篇 school of comput...
  • 28 篇 jiangsu collabor...
  • 23 篇 jiangsu institut...
  • 21 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 jiangsu engineer...
  • 15 篇 school of comput...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 school of softwa...
  • 11 篇 college of compu...
  • 10 篇 school of inform...
  • 10 篇 collaborative in...
  • 10 篇 school of comput...

作者

  • 35 篇 wang jin
  • 23 篇 sun xingming
  • 19 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xu xiaolong
  • 17 篇 xingming sun
  • 16 篇 baowen xu
  • 16 篇 shen jian
  • 15 篇 xu baowen
  • 12 篇 xiaolong xu
  • 12 篇 liu wenjie
  • 11 篇 yongjun ren
  • 10 篇 xia zhihua
  • 10 篇 wenjie liu
  • 10 篇 sunil kumar jha
  • 9 篇 qi lianyong
  • 9 篇 ma tinghuai
  • 9 篇 wei fang
  • 9 篇 ma li
  • 8 篇 liu qi

语言

  • 641 篇 英文
  • 24 篇 其他
  • 13 篇 中文
检索条件"机构=School of Computer and Software and Jiangsu Engineering"
678 条 记 录,以下是71-80 订阅
排序:
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
3D Object Detection with Attention:Shell-Based Modeling
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 537-550页
作者: Xiaorui Zhang Ziquan Zhao Wei Sun Qi Cui School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada
LIDAR point cloud-based 3D object detection aims to sense the surrounding environment by anchoring objects with the Bounding Box(BBox).However,under the three-dimensional space of autonomous driving scenes,the previou... 详细信息
来源: 评论
A spectrum-enhanced attention model for semantic segmentation of remote sensing images
A spectrum-enhanced attention model for semantic segmentatio...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Xin Xu, Feng Tao, Feifei Tong, Yao Lyu, Xin Zhong, Jianyi Kaup, André College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology Ministry of Water Resources Hohai University Nanjing China School of Computer Engineering Jiangsu Ocean University Lianyungang China School of Artificial Intelligence and Information Technology Nanjing University of Chinese Medicine Nanjing China Multimedia Communications and Signal Processing Friedrich-Alexander University Erlangen-Nuremberg Erlangen Germany
Semantic segmentation of remote sensing images (RSIs) is essential for applications such as environmental monitoring, urban planning, and disaster management. Convolutional Neural Networks (CNNs) and their variants st... 详细信息
来源: 评论
A Novel Quantum Byzantine Consensus Protocol Based on Malicious Node Prevention Mechanism
A Novel Quantum Byzantine Consensus Protocol Based on Malici...
收藏 引用
2022 International Conference on Blockchain Technology and Information Security, ICBCTIS 2022
作者: Gao, Xinxin Xu, Juan Fan, Jihao College of Computer Science & Technology Nanjing University of Aeronautics & Astronautics Jiangsu Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Jiangsu Nanjing China School of Electronic and Optical Engineering Nanjing University of Science and Technology Jiangsu Nanjing China
Blockchain is a decentralized distributed ledger database. Consensus protocol is the core protocol of blockchain to solve Byzantine agreement problem. To let all blockchain nodes reach an agreement, the most commonly ... 详细信息
来源: 评论
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Huang, Yuxian Yang, Geng Yuan, Dong Yu, Shui Nanjing University of Posts and Telecommunication College of Computer Science and Software China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China University of Sydney School of Electrical and Information Engineering Australia University of Technology Sydney School of Computer Science Australia
Recently, self-supervised learning has garnered significant attention for its ability to extract high-quality features from unlabeled data. However, existing research indicates that backdoor attacks can pose significa... 详细信息
来源: 评论
An Automatic Reflective Clothing Detection Algorithm Based on YOLOv5 for Work Type Recognition  11
An Automatic Reflective Clothing Detection Algorithm Based o...
收藏 引用
11th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2022
作者: He, Xinyi Ma, Ping Chen, Yiyang Liu, Yuan School of Artificial Intelligence and Computer Science Jiangnan University Jiangsu Key Laboratory of Media Design and Software Technology Wuxi214122 China School of Mechanical and Electrical Engineering Soochow University Suzhou215137 China
At present, traditional manual methods are still utilized for the inspection of reflective clothing on a wide range of construction sites. Using this manual inspection methods wastes much human resource. In this paper... 详细信息
来源: 评论
SABER: Model-agnostic Backdoor Attack on Chain-of-Thought in Neural Code Generation
arXiv
收藏 引用
arXiv 2024年
作者: Jin, Naizhu Li, Zhong Guo, Yinggang Su, Chao Zhang, Tian Zeng, Qingkai State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing210023 China School of Computer Science and Engineering Changshu Institute of Technology Jiangsu Suzhou215506 China
Recent studies have proposed integrating Chain-of-Thought (CoT) reasoning to further enhance the reliability of Code Language Models (CLMs) in generating code, a step-by-step approach that breaks down complex programm... 详细信息
来源: 评论
Safeguarding Privacy in Real-Time Trajectory Releases for AI-Driven Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Cai, Sujin Tian, Wei Lv, Taizhi Wang, Xiangchen Li, Xin Jiangsu Maritime Institute School of Information and Engineering Nanjing211106 China Guizhou University of Commerce College of Computer and Information engineering Guiyang550014 China Southern University of Science and Technology College of Computer Science Shenzhen518055 China Hohai University College of Computer Science and Software Engineering Nanjing211106 China
Intelligent consumer applications optimize product recommendations by analyzing users' real-time trajectory information and mobility patterns to gain insights into their consumption preferences. However, privacy c... 详细信息
来源: 评论
Data Reconstruction from Gradient Updates in Federated Learning  4th
Data Reconstruction from Gradient Updates in Federated Lea...
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Zhang, Xiaoxue Li, Junhao Zhang, Jianjie Yan, Jijie Zhu, Enmin Chen, Kongyang School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou China Pazhou Lab Guangzhou China Jiangsu Key Laboratory of Media Design and Software Technology Jiangnan University Wuxi China
Federated learning has become an emerging technology to protect data privacy in the distributed learning area, by keeping each client user’s data locally. However, recent work shows that client users’ data might sti... 详细信息
来源: 评论
Deep Convolutional Neural Network Approach for COVID-19 Detection
收藏 引用
computer Systems Science & engineering 2022年 第7期42卷 201-211页
作者: Yu Xue Bernard-Marie Onzo Romany F.Mansour Shoubao Su School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjingChina Department of Mathematics Faculty of ScienceNew Valley UniversityEl-Kharja72511Egypt Jiangsu Key Laboratory of Data Science and Smart Software Jinling Institute of TechnologyNanjing211169China
Coronavirus disease 2019(Covid-19)is a life-threatening infectious disease caused by a newly discovered strain of the *** by the end of 2020,Covid-19 is still not fully understood,but like other similar viruses,the ma... 详细信息
来源: 评论