咨询与建议

限定检索结果

文献类型

  • 276 篇 会议
  • 60 篇 期刊文献

馆藏范围

  • 336 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 209 篇 工学
    • 185 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 30 篇 控制科学与工程
    • 21 篇 信息与通信工程
    • 16 篇 交通运输工程
    • 15 篇 机械工程
    • 14 篇 生物工程
    • 11 篇 建筑学
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 网络空间安全
    • 7 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 石油与天然气工程
    • 4 篇 安全科学与工程
  • 97 篇 理学
    • 73 篇 数学
    • 16 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 物理学
  • 73 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 14 篇 工商管理
    • 5 篇 公共管理
  • 9 篇 医学
    • 8 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
    • 6 篇 社会学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 29 篇 software testing
  • 23 篇 testing
  • 21 篇 petri nets
  • 20 篇 software
  • 20 篇 web services
  • 15 篇 model checking
  • 13 篇 software quality
  • 10 篇 analytical model...
  • 10 篇 cloud computing
  • 9 篇 laboratories
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 semantics
  • 8 篇 algorithm design...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 7 篇 software reliabi...
  • 7 篇 costs
  • 7 篇 business
  • 7 篇 training

机构

  • 165 篇 shanghai key lab...
  • 73 篇 school of comput...
  • 55 篇 department of co...
  • 40 篇 shanghai key lab...
  • 24 篇 department of co...
  • 19 篇 shanghai key lab...
  • 19 篇 school of comput...
  • 16 篇 school of inform...
  • 16 篇 shanghai key lab...
  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 9 篇 shanghai key lab...
  • 8 篇 east china unive...
  • 7 篇 shanghai jiao to...
  • 7 篇 school of inform...
  • 7 篇 guangxi collabor...
  • 7 篇 computing center...
  • 6 篇 shanghai enginee...
  • 6 篇 shanghai key lab...
  • 6 篇 faculty of engin...

作者

  • 37 篇 lizhi cai
  • 33 篇 yu huiqun
  • 31 篇 miao huaikou
  • 30 篇 cai lizhi
  • 29 篇 fan guisheng
  • 24 篇 zhenyu liu
  • 21 篇 chen liqiong
  • 19 篇 liu zhenyu
  • 16 篇 huaikou miao
  • 14 篇 chen mingang
  • 13 篇 chen shengbo
  • 11 篇 gao honghao
  • 10 篇 mingang chen
  • 10 篇 liu pan
  • 10 篇 zhang juan
  • 9 篇 genxing yang
  • 9 篇 hongwei zeng
  • 9 篇 yun hu
  • 9 篇 chunhe xia
  • 9 篇 tianbo wang

语言

  • 331 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Shanghai Key Laboratory of Computer Software Testing and Evaluation"
336 条 记 录,以下是321-330 订阅
排序:
Imperceptible Face Forgery Attack via Adversarial Semantic Mask
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Decheng Su, Qixuan Peng, Chunlei Wang, Nannan Gao, Xinbo State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Xidian University Shaanxi Xi’an710071 China Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversar... 详细信息
来源: 评论
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yang Xia, Chunhe Lin, Wanshuang Wang, Tianbo The Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China The Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China The School of Cyber Science and Technology Beihang University Beijing100191 China The Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
With the rapid development of machine learning and a growing concern for data privacy, federated learning has become a focal point of attention. However, attacks on model parameters and a lack of incentive mechanisms ... 详细信息
来源: 评论
An Identification Method of Image-based for Output Pattern of Metamorphic Relation in Burnup Calculation Program
An Identification Method of Image-based for Output Pattern o...
收藏 引用
Science and Technology Innovation (IAECST), International Academic Exchange Conference on
作者: Shengfu Fu Xiaohua Yang Meng Li Fan Wang Engineering and Technology Research Center of Software Evaluation and Testing for Intellectual Equipment of Hunan Province Hengyang of Hunan Prov. China CNNC Key Laboratory on High Trusted Computing Hengyang of Hunan Prov. China School of Computer Science and Technology University of South China Hengyang China
It is challenging to verify the design and analysis software adequately for nuclear power areas because of the inflated cost, time-consuming benchmark problems development, and few verification examples. This situatio... 详细信息
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based Network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
FedForgery: Generalized Face Forgery Detection with Residual Federated Learning
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Decheng Dang, Zhan Peng, Chunlei Zheng, Yu Li, Shuang Wang, Nannan Gao, Xinbo The State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China The School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China The State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Xidian University Shaanxi Xi’an710071 China The Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China
With the continuous development of deep learning in the field of image generation models, a large number of vivid forged faces have been generated and spread on the Internet. These high-authenticity artifacts could gr... 详细信息
来源: 评论
PIG: Prompt Images Guidance for Night-Time Scene Parsing
arXiv
收藏 引用
arXiv 2024年
作者: Xie, Zhifeng Qiu, Rui Wang, Sen Tan, Xin Xie, Yuan Ma, Lizhuang Department of Film and Television Engineering Shanghai University Shanghai200072 China Shanghai Key Laboratory of Computer Software Testing and Evaluating China Hanghai Engineering Research Center of Motion Picture Special Effects Shanghai200072 China School of Computer Science and Technology China Normal University Shanghai200062 China Chongqing Institute of East China Normal University Chongqing401120 China School of Computer Science and Technology East China Normal University Shanghai200062 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China
Night-time scene parsing aims to extract pixel-level semantic information in night images, aiding downstream tasks in understanding scene object distribution. Due to limited labeled night image datasets, unsupervised ... 详细信息
来源: 评论
Research and Practice on Performance Test of Call Center Platform System
收藏 引用
Journal of Physics: Conference Series 2018年 第1期1069卷
作者: Wei Song Chunye Du Chunliu Zhang Shanghai Key Laboratory of Computer Software Evaluating & Testing 1588 Lianhang Road Shanghai China
Call center is more and more closely linked with people's daily life. This paper analyzes the three major problems of call center service (cask effect, avalanche effect, cumulative effect), introduces the call cen...
来源: 评论
Message from program chairs
Proceedings - 2018 IEEE/ACIS 19th International Conference o...
收藏 引用
Proceedings - 2018 IEEE/ACIS 19th International Conference on software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2018 2018年 ix页
作者: Yeo, Hyun Hong, Chung Sun Yeom, Gun Huck Cai, Lizhi Matsuo, Tokuro Fukuta, Naoki Hwang, Ha Jin SunChon National University Korea Republic of Kyung Hee University Korea Republic of Pusan National University Korea Republic of Shanghai Key Laboratory of Computer Software Evaluating and Testing China Advanced Institute of Industrial Technology Japan Shizuoka University Japan Sunway University Malaysia
来源: 评论
BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yang Xia, Chunhe Li, Chang Wang, Tianbo The Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China The Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China The School of Cyber Science and Technology Beihang University Beijing100191 China The Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
With the increasing importance of machine learning, the privacy and security of training data have become critical. Federated learning, which stores data in distributed nodes and shares only model parameters, has gain... 详细信息
来源: 评论