咨询与建议

限定检索结果

文献类型

  • 269 篇 会议
  • 60 篇 期刊文献

馆藏范围

  • 329 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 205 篇 工学
    • 182 篇 计算机科学与技术...
    • 139 篇 软件工程
    • 30 篇 控制科学与工程
    • 21 篇 信息与通信工程
    • 16 篇 交通运输工程
    • 15 篇 机械工程
    • 15 篇 生物工程
    • 11 篇 建筑学
    • 9 篇 土木工程
    • 8 篇 网络空间安全
    • 7 篇 材料科学与工程(可...
    • 7 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 4 篇 光学工程
    • 4 篇 石油与天然气工程
  • 97 篇 理学
    • 74 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 物理学
  • 72 篇 管理学
    • 41 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 14 篇 工商管理
    • 5 篇 公共管理
  • 9 篇 医学
    • 8 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
    • 6 篇 社会学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 29 篇 software testing
  • 22 篇 testing
  • 21 篇 petri nets
  • 20 篇 web services
  • 17 篇 software
  • 15 篇 model checking
  • 13 篇 software quality
  • 10 篇 analytical model...
  • 10 篇 cloud computing
  • 9 篇 laboratories
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 semantics
  • 8 篇 feature extracti...
  • 8 篇 security
  • 7 篇 software reliabi...
  • 7 篇 costs
  • 7 篇 algorithm design...
  • 7 篇 business
  • 7 篇 training

机构

  • 165 篇 shanghai key lab...
  • 74 篇 school of comput...
  • 55 篇 department of co...
  • 40 篇 shanghai key lab...
  • 24 篇 department of co...
  • 19 篇 shanghai key lab...
  • 19 篇 school of comput...
  • 16 篇 school of inform...
  • 16 篇 shanghai key lab...
  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 9 篇 shanghai key lab...
  • 8 篇 east china unive...
  • 7 篇 shanghai jiao to...
  • 7 篇 guangxi collabor...
  • 7 篇 computing center...
  • 6 篇 shanghai enginee...
  • 6 篇 shanghai key lab...
  • 6 篇 faculty of engin...
  • 6 篇 beijing key lab....

作者

  • 34 篇 lizhi cai
  • 32 篇 yu huiqun
  • 31 篇 miao huaikou
  • 31 篇 cai lizhi
  • 29 篇 fan guisheng
  • 24 篇 zhenyu liu
  • 21 篇 chen liqiong
  • 19 篇 liu zhenyu
  • 16 篇 huaikou miao
  • 15 篇 chen mingang
  • 13 篇 chen shengbo
  • 11 篇 gao honghao
  • 10 篇 mingang chen
  • 10 篇 liu pan
  • 10 篇 zhang juan
  • 9 篇 genxing yang
  • 9 篇 hongwei zeng
  • 9 篇 yun hu
  • 9 篇 chunhe xia
  • 9 篇 tianbo wang

语言

  • 324 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Shanghai Key Laboratory of Computer Software Evaluating and Testing"
329 条 记 录,以下是111-120 订阅
排序:
Reports Aggregation of Crowdsourcing Test Based on Feature Fusion
Reports Aggregation of Crowdsourcing Test Based on Feature F...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Lizhi Cai Naiqi Wang Mingang Chen Jin Wang Jilong Wang Jiayu Gong Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai Development Center of Computer Software Technology Shanghai China School of Information Science and Engineering. East China University of Science and Technology Shanghai China
In recent years, a new testing method based on the concept of crowdsourcing has made great progress. Developers upload the project to the crowdsourcing test platform and recruit a large number of crowdsourcing workers... 详细信息
来源: 评论
Research progress in the processing of crowdsourced test reports  14
Research progress in the processing of crowdsourced test rep...
收藏 引用
14th EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communications, TridentCom 2019
作者: Wang, Naiqi Cai, Lizhi Chen, Mingang Zhang, Chuwei School of Information Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology Shanghai China Shanghai Foreign Affairs Service Center Shanghai China
In recent years, crowdsourced testing, which uses collective intelligence to solve complex software testing tasks has gained widespread attention in academia and industry. However, due to a large number of workers par... 详细信息
来源: 评论
FLSSM: A Federated Learning Storage Security Model with Homomorphic Encryption
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yang Xia, Chunhe Li, Chang Li, Xiaojian Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing100191 China Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China Guangxi Collaborative Innovation Center Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China College of Computer Science and Information Technology Guangxi Normal University Guilin541004 China School of Cyber Science and Technology Beihang University Beijing100191 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
Federated learning based on homomorphic encryption has received widespread attention due to its high security and enhanced protection of user data privacy. However, the characteristics of encrypted computation lead to... 详细信息
来源: 评论
BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yang Xia, Chunhe Li, Chang Wang, Tianbo The Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China The Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China The School of Cyber Science and Technology Beihang University Beijing100191 China The Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
With the increasing importance of machine learning, the privacy and security of training data have become critical. Federated learning, which stores data in distributed nodes and shares only model parameters, has gain... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
Chemical reaction-inspired dual-population co-evolutionary algorithm for many-objective optimization
收藏 引用
Expert Systems with Applications 2025年 289卷
作者: Weichao Ding Mingshan Chen Wenbo Dong Fei Luo Chunhua Gu School of Information Science and Engineering East China University of Science and Technology 130 Meilong Road Shanghai 200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Many-objective optimization problems (MaOPs) refer to the multi-objective problems with more than three conflicting objectives that need to be optimized simultaneously, which are prevalent but more challenging in scie...
来源: 评论
Construction of a Cloud Scenario Knowledge Graph for Cloud Service Market
Construction of a Cloud Scenario Knowledge Graph for Cloud S...
收藏 引用
IEEE International Conference on software Engineering and Service Sciences (ICSESS)
作者: Shiqi Zhang Xiaoqiang Liu Bo Xu Lizhi Cai Yun Hu School of Computer Science and Technology Donghua University & Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Software Center Shanghai China School of Computer Science and Technology Donghua University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Software Center Shanghai China
Fast-growing cloud computing technology makes cloud application scenarios more diversified and difficult to choose. A knowledge recommending system is an effective way to reach automatic recommendation services. In th... 详细信息
来源: 评论
Dietary Sequence Recommendations Based on TransFM
Dietary Sequence Recommendations Based on TransFM
收藏 引用
International Conference on Smart Grid and Electrical Automation (ICSGEA)
作者: Jie Wu Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai P. R. China
The rapid development of the Internet has changed people's lifestyles, and more and more people choose to eat online. The online catering platform for users inevitably needs to provide personalized recommendations... 详细信息
来源: 评论
A differential evolution-based approach for effort-Aware just-in-Time software defect prediction  1
A differential evolution-based approach for effort-Aware jus...
收藏 引用
1st ACM SIGSOFT International Workshop on Representation Learning for software Engineering and Program Languages, RL+SE and PL 2020, co-located with ESEC/FSE 2020
作者: Yang, Xingguang Yu, Huiqun Fan, Guisheng Yang, Kang East China University of Science and Technology Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China East China University of Science and Technology Shanghai Engineering Research Center of Smart Energy Shanghai China East China University of Science and Technology Shanghai China
software defect prediction technology is an effective method to improve software quality. Effort-Aware just-in-Time software defect prediction (JIT-SDP) aims to identify more defective changes in limited effort. Altho... 详细信息
来源: 评论