咨询与建议

限定检索结果

文献类型

  • 2,140 篇 会议
  • 1,763 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,917 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,750 篇 工学
    • 2,044 篇 计算机科学与技术...
    • 1,703 篇 软件工程
    • 521 篇 信息与通信工程
    • 323 篇 控制科学与工程
    • 242 篇 生物工程
    • 212 篇 电子科学与技术(可...
    • 211 篇 电气工程
    • 172 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 97 篇 动力工程及工程热...
    • 77 篇 网络空间安全
    • 69 篇 交通运输工程
    • 67 篇 建筑学
    • 59 篇 土木工程
  • 1,283 篇 理学
    • 770 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 201 篇 统计学(可授理学、...
    • 131 篇 系统科学
    • 120 篇 化学
  • 757 篇 管理学
    • 457 篇 管理科学与工程(可...
    • 343 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 66 篇 computer science
  • 64 篇 training
  • 62 篇 computational mo...
  • 57 篇 data mining
  • 56 篇 deep learning
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 45 篇 machine learning
  • 45 篇 clustering algor...
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 37 篇 quality of servi...
  • 36 篇 authentication

机构

  • 293 篇 state key labora...
  • 213 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 90 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 70 篇 school of comput...
  • 69 篇 computer school ...
  • 61 篇 state key lab. f...
  • 56 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 43 篇 state key labora...
  • 43 篇 school of comput...
  • 42 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 xiao limin
  • 39 篇 huang di
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 26 篇 dou wanchun
  • 22 篇 zhao jian
  • 22 篇 tao dacheng
  • 22 篇 bai xiao
  • 21 篇 he keqing
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo
  • 19 篇 qi lianyong
  • 19 篇 xu baowen

语言

  • 3,685 篇 英文
  • 130 篇 其他
  • 103 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3917 条 记 录,以下是241-250 订阅
排序:
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Validity-Preserving Delta Debugging via Generator Trace Reduction
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Luyao Zhang, Xing Hua, Ziyue Jiang, Yanyan He, Xiao Xiong, Yingfei Xie, Tao Key Laboratory of High Confidence Software Technologies Ministry of Education School of Computer Science Peking University Beijing China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China School of Computer and Communication Engineering University of Science and Technology Beijing China
Reducing test inputs that trigger bugs is crucial for efficient debugging. Delta debugging is the most popular approach for this purpose. When test inputs need to conform to certain specifications, existing delta debu... 详细信息
来源: 评论
How Can We Cope with the Impact of Microservice Architecture Smells?  2022
How Can We Cope with the Impact of Microservice Architecture...
收藏 引用
11th International Conference on software and computer Applications, ICSCA 2022
作者: Ding, Xiang Zhang, Cheng Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University China School of Computer Science and Technology Anhui University China State Key Lab for Novel Software Technology Nanjing University China
Context: software Architecture Smells (AS) are potential software structure problems and always impact software quality negatively. And with the development of Microservice architecture, the Microservice Architecture ... 详细信息
来源: 评论
Implementation of Domain-oriented Microservices Decomposition based on Node-attributed Network  2022
Implementation of Domain-oriented Microservices Decompositio...
收藏 引用
11th International Conference on software and computer Applications, ICSCA 2022
作者: Cao, Lingli Zhang, Cheng Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University China School of Computer Science and Technology Anhui University China State Key Lab for Novel Software Technology Nanjing University China
The features of microservices, such as scalability and maintainability, have attracted the industry to migrate monolithic projects to microservices. However, how to decompose microservices during migration is a tricky... 详细信息
来源: 评论
Enhancing Topic Interpretability for Neural Topic Modeling through Topic-wise Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Gao, Xin Lin, Yang Li, Ruiqing Wang, Yasha Chu, Xu Ma, Xinyu Yu, Hailong Software Engineering Institution School of Computer Science Peking University Beijing China Key Lab of High Confidence Software Technologies Ministry of Education Beijing China Center on Frontiers of Computing Studies School of Computer Science Peking University China National Engineering Research Center of Software Engineering Peking University Beijing China
Data mining and knowledge discovery are essential aspects of extracting valuable insights from vast datasets. Neural topic models (NTMs) have emerged as a valuable unsupervised tool in this field. However, the predomi... 详细信息
来源: 评论
Towards Expanding Precise Timing for Collaborative Its with Deterministic Communications in 6G
Towards Expanding Precise Timing for Collaborative Its with ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Hongxing Li Haotian Li Qianhan Gao Guochu Shou Yaqiong Liu Zhigang Guo Yihong Hu State Key Laboratory of Networking and Switching Technology School of Computer Science (National Pilot Software Engineering School) Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
The demand for precise timing continues to grow with the rapid development of smart cities, where intelligent transportation emerges as a critical application heavily dependent on accurate time distribution. Determini... 详细信息
来源: 评论
SWISP: Distributed Convoy Mining via Sliding Window-based Indexing and Sub-track Partitioning
SWISP: Distributed Convoy Mining via Sliding Window-based In...
收藏 引用
International Conference on Data engineering
作者: Chenxu Wang Xin Yang Tianyi Li Jiaxing Wei Pinghui Wang Hongzhen Xiang Christain S. Jensen School of Software Engineering MOE Key Lab of INNS Xi'an Jiaotong University Xi'an China School of Software Engineering Xi'an Jiaotong University Xi'an China Department of Computer Science Aalborg University Aalborg Denmark MOE Key Lab of INNS Xi'an Jiaotong University Xi'an China
With the widespread deployment of location-aware mobile devices, a mass of trajectory data is being generated and collected. Mining co-movement patterns of people and vehicles from streaming and massive trajectory dat... 详细信息
来源: 评论
CorrMAE: Pre-training Correspondence Transformers with Masked Autoencoder
arXiv
收藏 引用
arXiv 2024年
作者: Liao, Tangfei Zhang, Xiaoqin Xiao, Guobao Li, Min Wang, Tao Ye, Mang School of Computer Science Wuhan University China College of Computer Science and Artificial Intelligence Wenzhou University China School of Electronics and Information Engineering Tongji University China State Key Lab for Novel Software Technology Nanjing University China
Pre-training has emerged as a simple yet powerful methodology for representation learning across various domains. However, due to the expensive training cost and limited data, pre-training has not yet been extensively... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
PPIRB:Achieving an privacy-preserving image retrieval scheme Based on Blockchain  5
PPIRB:Achieving an privacy-preserving image retrieval scheme...
收藏 引用
5th International Conference on Data Science and Information Technology, DSIT 2022
作者: Yuan, Bo Peng, Jiahui Li, Chunpei Qiu, Wangjie School of Computer Science and Engineering State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Guangxi Key Lab of Multi-source Information Mining Security Guangxi Normal University GuiLin China State Key Laboratory of Software Development Environment Beihang University Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing100191 China
With the proliferation of cloud services, the work of large-scale image retrieval is carried out on remote cloud become a trend in order to get rid of the storage burden and computation. However, traditional retrieval... 详细信息
来源: 评论