咨询与建议

限定检索结果

文献类型

  • 159 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 253 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 241 篇 工学
    • 208 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 76 篇 电气工程
    • 37 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 交通运输工程
    • 1 篇 化学工程与技术
    • 1 篇 网络空间安全
  • 15 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
  • 9 篇 理学
    • 4 篇 数学
    • 3 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
  • 5 篇 医学
    • 4 篇 临床医学
    • 1 篇 基础医学(可授医学...
  • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
    • 1 篇 教育学

主题

  • 15 篇 cloud computing
  • 12 篇 deep learning
  • 7 篇 petri nets
  • 7 篇 test case priori...
  • 7 篇 federated learni...
  • 6 篇 task analysis
  • 6 篇 service composit...
  • 6 篇 semantics
  • 6 篇 security
  • 6 篇 qos
  • 5 篇 energy consumpti...
  • 5 篇 regression testi...
  • 5 篇 software test
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 attention mechan...
  • 5 篇 privacy
  • 4 篇 petri net
  • 4 篇 reliability
  • 4 篇 collaborative fi...

机构

  • 105 篇 shanghai key lab...
  • 49 篇 shanghai univ sc...
  • 43 篇 east china univ ...
  • 40 篇 shanghai key lab...
  • 19 篇 shanghai key lab...
  • 17 篇 shanghai inst te...
  • 14 篇 east china univ ...
  • 14 篇 shanghai dev ctr...
  • 12 篇 donghua univ sch...
  • 10 篇 shanghai key lab...
  • 10 篇 shanghai univ ct...
  • 9 篇 beihang univ sch...
  • 9 篇 shanghai key lab...
  • 8 篇 shanghai engn re...
  • 8 篇 e china univ sci...
  • 7 篇 beihang univ bei...
  • 6 篇 shanghai jiao to...
  • 6 篇 nanjing univ sta...
  • 6 篇 school of cyber ...
  • 6 篇 chongqing univ p...

作者

  • 53 篇 yu huiqun
  • 43 篇 fan guisheng
  • 34 篇 miao huaikou
  • 32 篇 cai lizhi
  • 22 篇 liu zhenyu
  • 20 篇 chen liqiong
  • 15 篇 ma lizhuang
  • 14 篇 chen mingang
  • 14 篇 gao honghao
  • 10 篇 wang hongya
  • 10 篇 sun huaiying
  • 9 篇 zeng hongwei
  • 9 篇 wang tianbo
  • 9 篇 chen chen
  • 9 篇 liu pan
  • 9 篇 chen shengbo
  • 9 篇 hu yun
  • 9 篇 xia chunhe
  • 8 篇 yi ran
  • 8 篇 xiao yingyuan

语言

  • 251 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Shanghai Key Lab Comp Software Evaluating Testing"
253 条 记 录,以下是241-250 订阅
排序:
Response time evaluation of mobile applications combining network protocol analysis and information fusion
收藏 引用
INFORMATION AND software TECHNOLOGY 2022年 145卷
作者: Liu, Pan Li, Yihao Ludong Univ Sch Informat & Elect Engn Yantai Peoples R China Shanghai Business Sch Fac Business Informat Shanghai Peoples R China Shanghai Key Lab Comp Software Testing & Evaluati Shanghai Peoples R China
The response time of a mobile application (app), especially a mobile stock trading app, is an important factor that affects customer satisfaction. However, it is considerably difficult to accurately evaluate the perfo... 详细信息
来源: 评论
A Novel Self-Adaptive VM Consolidation Strategy Using Dynamic Multi-Thresholds in IaaS Clouds
收藏 引用
FUTURE INTERNET 2018年 第6期10卷
作者: Xie, Lei Chen, Shengbo Shen, Wenfeng Miao, Huaikou Shanghai Univ Sch Comp Engn & Sci Shanghai 200444 Peoples R China Shanghai Key Lab Comp Software Testing & Evaluati Shanghai 201112 Peoples R China Shanghai Univ Shanghai Inst Adv Commun & Data Sci Shanghai 200444 Peoples R China
With the rapid development of cloud computing, the demand for infrastructure resources in cloud data centers has further increased, which has already led to enormous amounts of energy costs. Virtual machine (VM) conso... 详细信息
来源: 评论
Test Sequence Reduction of Wireless Protocol Conformance testing to Internet of Things
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2018年 第1期2018卷
作者: Lin, Weiwei Zeng, Hongwei Gao, Honghao Miao, Huaikou Wang, Xiaolin Shanghai Univ Sch Comp Engn & Sci Shanghai 200444 Peoples R China Shanghai Key Lab Comp Software Testing & Evaluati Shanghai 201114 Peoples R China Taishan Univ Dept Informat Sci & Technol Tai An 271000 Shandong Peoples R China Shanghai Univ Comp Ctr Shanghai 200444 Peoples R China Shanghai Key Lab Intelligent Mfg & Robot Shanghai 200072 Peoples R China
Wireless communication protocols are indispensable in Internet of Things (loT), which refer to rules and conventions that must be followed by both entities to complete wireless communication or service. Wireless proto... 详细信息
来源: 评论
Instance and Category Supervision are Alternate Learners for Continual Learning
Instance and Category Supervision are Alternate Learners for...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Xudong Tian Zhizhong Zhang Xin Tan Jun Liu Chengjie Wang Yanyun Qu Guannan Jiang Yuan Xie East China Normal University Shanghai Key Laboratory of Computer Software Testing & Evaluating Chongqing Institute of East China Normal University Tencent YouTu Lab Xiamen University Contemporary Amperex Technology Co. Limited
Continual Learning (CL) is the constant development of complex behaviors by building upon previously acquired skills. Yet, current CL algorithms tend to incur class-level forgetting as the label information is often q...
来源: 评论
Face photo-sketch synthesis via intra-domain enhancement
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2023年 259卷
作者: Peng, Chunlei Zhang, Congyu Liu, Decheng Wang, Nannan Gao, Xinbo Xidian Univ Sch Cyber Engn State Key Lab Integrated Serv Networks Xian 710071 Shaanxi Peoples R China Shanghai Key Lab Comp Software Evaluating & Testi Shanghai 201112 Peoples R China Xidian Univ Sch Telecommun Engn State Key Lab Integrated Serv Networks Xian 710071 Shaanxi Peoples R China Chongqing Univ Posts & Telecommun Chongqing Key Lab Image Cognit Chongqing 400065 Peoples R China
Face photo-sketch synthesis plays an increasingly important role in the field of law enforcement and entertainment. However, most of the existing methods only focus on how to cross the modality differences between the... 详细信息
来源: 评论
Graph attention automatic encoder based on contrastive learning for domain recognition of spatial transcriptomics
COMMUNICATIONS BIOLOGY
收藏 引用
COMMUNICATIONS BIOLOGY 2024年 第1期7卷 1-17页
作者: Wang, Tianqi Zhu, Huitong Zhou, Yunlan Ding, Weihong Ding, Weichao Han, Liangxiu Zhang, Xueqin East China Univ Sci & Technol Sch Informat Sci & Engn Shanghai Peoples R China Shanghai Jiao Tong Univ Xinhua Hosp Sch Med Dept Clin Lab Shanghai Peoples R China Fudan Univ Huashan Hosp Shanghai Peoples R China Manchester Metropolitan Univ Sch Comp Math & Digital Technol Manchester England Shanghai Key Lab Comp Software Evaluating & Testin Shanghai Peoples R China
Spatial transcriptomics is an emerging technology that enables the profiling of gene expression in tissues while preserving spatial location information. This innovative approach is anticipated to provide a comprehens...
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based Network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论