咨询与建议

限定检索结果

文献类型

  • 276 篇 会议
  • 60 篇 期刊文献

馆藏范围

  • 336 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 209 篇 工学
    • 185 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 30 篇 控制科学与工程
    • 21 篇 信息与通信工程
    • 16 篇 交通运输工程
    • 15 篇 机械工程
    • 14 篇 生物工程
    • 11 篇 建筑学
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 网络空间安全
    • 7 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 石油与天然气工程
    • 4 篇 安全科学与工程
  • 97 篇 理学
    • 73 篇 数学
    • 16 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 物理学
  • 73 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 14 篇 工商管理
    • 5 篇 公共管理
  • 9 篇 医学
    • 8 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
    • 6 篇 社会学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 29 篇 software testing
  • 23 篇 testing
  • 21 篇 petri nets
  • 20 篇 software
  • 20 篇 web services
  • 15 篇 model checking
  • 13 篇 software quality
  • 10 篇 analytical model...
  • 10 篇 cloud computing
  • 9 篇 laboratories
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 semantics
  • 8 篇 algorithm design...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 7 篇 software reliabi...
  • 7 篇 costs
  • 7 篇 business
  • 7 篇 training

机构

  • 165 篇 shanghai key lab...
  • 73 篇 school of comput...
  • 55 篇 department of co...
  • 40 篇 shanghai key lab...
  • 24 篇 department of co...
  • 19 篇 shanghai key lab...
  • 19 篇 school of comput...
  • 16 篇 school of inform...
  • 16 篇 shanghai key lab...
  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 9 篇 shanghai key lab...
  • 8 篇 east china unive...
  • 7 篇 shanghai jiao to...
  • 7 篇 school of inform...
  • 7 篇 guangxi collabor...
  • 7 篇 computing center...
  • 6 篇 shanghai enginee...
  • 6 篇 shanghai key lab...
  • 6 篇 faculty of engin...

作者

  • 37 篇 lizhi cai
  • 33 篇 yu huiqun
  • 31 篇 miao huaikou
  • 30 篇 cai lizhi
  • 29 篇 fan guisheng
  • 24 篇 zhenyu liu
  • 21 篇 chen liqiong
  • 19 篇 liu zhenyu
  • 16 篇 huaikou miao
  • 14 篇 chen mingang
  • 13 篇 chen shengbo
  • 11 篇 gao honghao
  • 10 篇 mingang chen
  • 10 篇 liu pan
  • 10 篇 zhang juan
  • 9 篇 genxing yang
  • 9 篇 hongwei zeng
  • 9 篇 yun hu
  • 9 篇 chunhe xia
  • 9 篇 tianbo wang

语言

  • 331 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Shanghai Key Laboratory of Computer Software Testing and Evaluation"
336 条 记 录,以下是331-340 订阅
排序:
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
An Optimization Method Based on Be-ACO Algorithm in Service Composition Context
收藏 引用
Computational intelligence and neuroscience 2022年 第1期2022卷 5231262页
作者: Zhoujie Du Huaikou Miao School of Computer Engineering and Science Shanghai University Shanghai 200444 China. Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai 201112 China.
With the increasing complexity of users' needs and increasing uncertainty of a single web service in big data environment, service composition becomes more and more difficult. In order to improve the solution accu...
来源: 评论
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protec...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Changnan Jiang Chunhe Xia Mengyao Liu Rui Fang Pengfei Li Huacheng Li Tianbo Wang Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing China
The federated Android malware classifier has attracted much attention owing to its advantages of privacy protection and multi-party joint modeling. However, the research indicates that the gradient transmitted within ... 详细信息
来源: 评论
Extreme Hourly Rainfall in the Middle and Lower Reaches of the Yangtze River Basin - Spatiotemporal Transition and Causality Analysis
SSRN
收藏 引用
SSRN 2023年
作者: Gu, Haoting He, Guangxin Li, Zhongliang Zhang, Ping Cheng, Yuexuan Collaborative Innovation Center on Forecast and Evaluation of Meteorological Disasters Nanjing University of Information Science and Technology Nanjing210044 China Guangzhou Institute of Tropical Marine Meteorology China Meteorological Administration Guangzhou510080 China Key Laboratory of Meteorology and Ecological Environment of Hebei Province Hebei Provincial Institute of Meteorological Sciences Shijiazhuang050021 China College of Computer and Software Nanjing Vocational University of Industry Technology Nanjing210046 China School of Information Management & Engineering Shanghai University of Finance and Economics Shanghai Shanghai200433 China
This study employs ground observation data and hourly ERA5 data from 1980 to 2020, utilizing methods such as trend analysis and M-K tests, to explore the spatiotemporal evolution characteristics and difference analysi... 详细信息
来源: 评论