咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 154 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 293 篇 工学
    • 236 篇 计算机科学与技术...
    • 204 篇 软件工程
    • 60 篇 信息与通信工程
    • 53 篇 控制科学与工程
    • 40 篇 生物工程
    • 21 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 18 篇 光学工程
    • 15 篇 仪器科学与技术
    • 14 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 9 篇 土木工程
    • 9 篇 化学工程与技术
    • 9 篇 环境科学与工程(可...
    • 8 篇 建筑学
  • 130 篇 理学
    • 70 篇 数学
    • 39 篇 生物学
    • 22 篇 系统科学
    • 20 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
  • 96 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 26 篇 医学
    • 25 篇 基础医学(可授医学...
    • 24 篇 临床医学
    • 14 篇 公共卫生与预防医...
    • 9 篇 药学(可授医学、理...
  • 20 篇 法学
    • 14 篇 社会学
  • 8 篇 教育学
  • 6 篇 经济学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 17 篇 software enginee...
  • 12 篇 semantics
  • 12 篇 software
  • 10 篇 reinforcement le...
  • 8 篇 edge computing
  • 7 篇 software systems
  • 7 篇 wireless sensor ...
  • 7 篇 analytical model...
  • 7 篇 machine learning
  • 7 篇 artificial intel...
  • 6 篇 internet of thin...
  • 6 篇 conferences
  • 6 篇 ecosystems
  • 6 篇 computer archite...
  • 6 篇 security
  • 5 篇 deep learning
  • 5 篇 decision making
  • 5 篇 accuracy
  • 5 篇 cloud computing
  • 5 篇 open source soft...

机构

  • 8 篇 state key labora...
  • 7 篇 national enginee...
  • 7 篇 shenzhen key lab...
  • 6 篇 the state key la...
  • 6 篇 guangdong labora...
  • 6 篇 state key labora...
  • 6 篇 university of ch...
  • 6 篇 state key lab fo...
  • 6 篇 national water a...
  • 5 篇 national enginee...
  • 5 篇 school of comput...
  • 5 篇 pca lab key lab ...
  • 4 篇 college of compu...
  • 4 篇 information syst...
  • 4 篇 the hong kong po...
  • 4 篇 software enginee...
  • 4 篇 school of comput...
  • 4 篇 institute for so...
  • 4 篇 state key lab of...
  • 4 篇 school of comput...

作者

  • 15 篇 ismail leila
  • 11 篇 buyya rajkumar
  • 9 篇 leila ismail
  • 8 篇 guangming xie
  • 8 篇 wang chen
  • 8 篇 chen wang
  • 7 篇 rabiser rick
  • 7 篇 xie guangming
  • 7 篇 yang jian
  • 6 篇 ghose aditya k.
  • 6 篇 ying he
  • 5 篇 lochau malte
  • 5 篇 lê lam-son
  • 5 篇 feichtinger kevi...
  • 5 篇 xia xin
  • 5 篇 choo kim-kwang r...
  • 5 篇 ghose aditya
  • 5 篇 schmidt-thieme l...
  • 5 篇 f. richard yu
  • 4 篇 jin zhi

语言

  • 410 篇 英文
  • 23 篇 其他
  • 5 篇 中文
检索条件"机构=Software and Systems Engineering Lab"
438 条 记 录,以下是11-20 订阅
排序:
PIXHELL: When Pixels Learn to Scream
arXiv
收藏 引用
arXiv 2025年
作者: Guri, Mordechai Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Offensive-Cyber Research Lab
This paper presents a technique for generating sound by leveraging the electrical properties of liquid crystal displays (LCDs). The phenomenon occurs due to vibrational noise produced by capacitors within the LCD pane... 详细信息
来源: 评论
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Bokobza, Roey Mirsky, Yisroel Ben-Gurion University Department of Software and Information Systems Engineering Offensive AI Research Lab Israel
Our paper presents a novel defence against black box attacks, where attackers use the victim model as an oracle to craft their adversarial examples. Unlike traditional preprocessing defences that rely on sanitizing in...
来源: 评论
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
arXiv
收藏 引用
arXiv 2024年
作者: Weiss, Roy Ayzenshteyn, Daniel Amit, Guy Mirsky, Yisroel Ben-Gurion University Israel Department of Software and Information Systems Engineering Offensive AI Research Lab
AI assistants are becoming an integral part of society, used for asking advice or help in personal and confidential issues. In this paper, we unveil a novel side-channel that can be used to read encrypted responses fr... 详细信息
来源: 评论
TPTO: A Transformer-PPO based Task Offloading Solution for Edge Computing Environments  29
TPTO: A Transformer-PPO based Task Offloading Solution for E...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Gholipour, Niloofar De Assuncao, Marcos Dias Agarwal, Pranav Gascon-Samson, Julien Buyya, Rajkumar Univ. of Quebec Dept. of Software Engineering and IT École de Technologie Supérieure Montreal Canada The Univ. of Melbourne CLOUDS Lab School of Computing and Information Systems Australia
Emerging applications in healthcare, autonomous vehicles, and wearable assistance require interactive and low-latency data analysis services. Unfortunately, cloud-centric architectures cannot fulfill the low-latency d... 详细信息
来源: 评论
A Unified Information Diffusion Prediction Model Based on Multi-task Learning  9th
A Unified Information Diffusion Prediction Model Based on M...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Shang, Yingdan Zhou, Bin Zeng, Xiang Chen, Kai College of Computer Science and Technology National University of Defense Technology Changsha China Key Lab of Software Engineering for Complex Systems School of Computer National University of Defense Technology Changsha China
The prediction of online information diffusion trends on social networks is crucial for understanding people’s interests and concerns, and has many real-world applications in fields such as business, politics and soc... 详细信息
来源: 评论
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’
arXiv
收藏 引用
arXiv 2024年
作者: Guri, Mordechai Ben-Gurion University of the Negev Department of Software and Information Systems Engineering Air-Gap Research Lab Israel
Air-gapped systems are disconnected from the Internet and other networks because they contain or process sensitive data. However, it is known that attackers can use computer speakers to leak data via sound to circumve... 详细信息
来源: 评论
Closing the Loop between User Stories and GUI Prototypes: An LLM-Based Assistant for Cross-Functional Integration in software Development  25
Closing the Loop between User Stories and GUI Prototypes: An...
收藏 引用
2025 CHI Conference on Human Factors in Computing systems, CHI 2025
作者: Kretzer, Felix Kolthoff, Kristian Bartelt, Christian Ponzetto, Simone Paolo Maedche, Alexander Karlsruhe Institute of Technology (KIT) Karlsruhe Germany Institute for Software and Systems Engineering Clausthal University of Technology Clausthal-Zellerfeld Germany Data and Web Science Group University of Mannheim Mannheim Germany Human-centered Systems Lab (H-lab) Karlsruhe Institute of Technology (KIT) Karlsruhe Germany
Graphical user interfaces (GUIs) are at the heart of almost every software we encounter. GUIs are often created through a collaborative effort involving UX designers, product owners, and software developers, constantl... 详细信息
来源: 评论
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’
PIXHELL Attack: Leaking Sensitive Information from Air-Gap C...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Mordechai Guri Department of Software and Information Systems Engineering Air-Gap Research Lab Ben-Gurion University of the Negev Israel
Air-gapped systems are disconnected from the Internet and other networks because they contain or process sensitive data. However, it is known that attackers can use computer speakers to leak data via sound to circumve... 详细信息
来源: 评论
A Dynamic Selective Parameter Sharing Mechanism Embedded with Multi-Level Reasoning Abstractions  26
A Dynamic Selective Parameter Sharing Mechanism Embedded wit...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Liu, Yan He, Ying Ming, Zhong Yu, F. Richard Shenzhen Key Lab of Digital & Intelligent Technologies & Systems College of Computer Science and Software Engineering Shenzhen University China State Key Laboratory of Integrated Services Networks Xidian University China Shenzhen China
Cooperative multi-agent reinforcement learning (Co-MARL) commonly employs different parameter sharing mechanisms, such as full and partial sharing. However, imprudent application of these mechanisms can potentially co... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. Security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论