咨询与建议

限定检索结果

文献类型

  • 2,947 篇 会议
  • 2,510 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,817 篇 工学
    • 2,870 篇 计算机科学与技术...
    • 2,343 篇 软件工程
    • 707 篇 信息与通信工程
    • 517 篇 控制科学与工程
    • 329 篇 生物工程
    • 310 篇 电气工程
    • 279 篇 电子科学与技术(可...
    • 267 篇 机械工程
    • 220 篇 光学工程
    • 194 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 136 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 98 篇 网络空间安全
    • 89 篇 土木工程
    • 87 篇 建筑学
  • 1,827 篇 理学
    • 1,127 篇 数学
    • 391 篇 物理学
    • 373 篇 生物学
    • 307 篇 统计学(可授理学、...
    • 237 篇 系统科学
    • 139 篇 化学
  • 1,088 篇 管理学
    • 665 篇 管理科学与工程(可...
    • 456 篇 图书情报与档案管...
    • 219 篇 工商管理
  • 147 篇 医学
    • 124 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 76 篇 药学(可授医学、理...
  • 136 篇 法学
    • 100 篇 社会学
  • 77 篇 经济学
    • 77 篇 应用经济学
  • 54 篇 教育学
  • 47 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 179 篇 computer science
  • 135 篇 laboratories
  • 132 篇 semantics
  • 97 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 91 篇 optimization
  • 91 篇 training
  • 81 篇 data mining
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 76 篇 software
  • 70 篇 algorithm design...
  • 64 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 60 篇 cloud computing
  • 59 篇 accuracy
  • 58 篇 web services
  • 57 篇 software testing
  • 56 篇 application soft...

机构

  • 1,067 篇 state key labora...
  • 224 篇 department of co...
  • 223 篇 national key lab...
  • 176 篇 department of co...
  • 139 篇 school of inform...
  • 117 篇 state key labora...
  • 114 篇 state key labora...
  • 108 篇 state key labora...
  • 102 篇 college of compu...
  • 88 篇 university of ch...
  • 81 篇 school of comput...
  • 81 篇 shandong provinc...
  • 71 篇 shandong provinc...
  • 69 篇 department of co...
  • 59 篇 school of softwa...
  • 58 篇 school of artifi...
  • 57 篇 shanghai key lab...
  • 51 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 state key labora...

作者

  • 68 篇 gao yang
  • 47 篇 shi yinghuan
  • 43 篇 dou wanchun
  • 42 篇 guihai chen
  • 38 篇 sanglu lu
  • 38 篇 li wu-jun
  • 37 篇 zhou zhi-hua
  • 32 篇 shen furao
  • 32 篇 baowen xu
  • 32 篇 junping du
  • 31 篇 yu huiqun
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 30 篇 zhang lijun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 liu hong
  • 26 篇 yang tianbao
  • 26 篇 xu xiaolong
  • 26 篇 xu chang

语言

  • 4,996 篇 英文
  • 321 篇 其他
  • 153 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5471 条 记 录,以下是1091-1100 订阅
排序:
Security Analysis for a VANET Privacy Protection Scheme
收藏 引用
Journal of Cyber Security 2022年 第1期4卷 57-64页
作者: Yuzhen Liu Xiaoliang Wang Zhoulei Cao Frank Jiang School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411201China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201China School of Engineering and IT University of New South WalesNSWAustralia
Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing *** to the openness of wireless channel and the sensitivity of traffic information,data trans... 详细信息
来源: 评论
Image Data Augmentation for Deep Learning: A Survey
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Suorong Xiao, Weikang Zhang, Mengchen Guo, Suhan Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Deep learning has achieved remarkable results in many computer vision tasks. Deep neural networks typically rely on large amounts of training data to avoid overfitting. However, labeled data for real-world application... 详细信息
来源: 评论
Sensitivity Pruner: Filter-Level Deep Neural Network Compression
SSRN
收藏 引用
SSRN 2022年
作者: Guo, Suhan Lai, Bilan Yang, Suorong Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Nanjing University China School of Artificial Intelligence Nanjing University China Department of Computer Science and Technology Nanjing University China School of Electronic Science and Engineering Nanjing University China
As neural networks get deeper to better higher performance, the demand for deployable models on resource-constrained devices also grows. In this work, we propose to achieve model compression using filter-level pruning... 详细信息
来源: 评论
Learning Fair and Efficient Multiple Access Schemes with Decomposed MADDPG
Learning Fair and Efficient Multiple Access Schemes with Dec...
收藏 引用
Future Communications and Networks (FCN), International Conference on
作者: Zhaoyang Liu Haoxin Lin Xijun Wang Jie Gong Xiang Chen School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin China State Key Lab of Novel Software Technology Nanjing University Nanjing China Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
With the growing demand for wireless communication networks, achieving efficient and equitable channel access schemes has become paramount. In this paper, we delve into the realm of distributed channel access in homog... 详细信息
来源: 评论
Dts-Adapstnet: An Adaptive Spatiotemporal Neural Networks for Traffic Prediction with Mulit-Graph Fusion
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Jing Shi, Wenlong Ye, Xiucai Tsai, Peiwei School of Computer Science and Mathematics Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China Department of Computer Science University of Tsukuba Tsukuba Japan Department of Computer Science and Software Engineering Swinburne University of Technology Hawthorn Australia
Traffic prediction is of vital importance in intelligent transportation systems. It can realize efficient route planning, avoid traffic congestion and reduce travel time, etc. However, it is difficult to make accurate... 详细信息
来源: 评论
A Comprehensive Evaluation of Large Language Models for Method Name Prediction
SSRN
收藏 引用
SSRN 2024年
作者: Qian, Hanwei Xu, Tingting Ding, Ziqi Liu, Wei Zhu, Shaomin Yin, Jie Feng, Xia Fang, Chunrong Zhao, Jianhua Sun, Weisong State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing210093 China Jiangsu Police Institute China City University of Macau 999078 China Tongji University Shanghai200092 China School of Computer Science and Engineering Nanyang Technological University 639798 Singapore
High-quality method names are essential for understanding and maintaining programs. However, naming methods can be challenging, especially for new developers. To address this, deep-learning techniques have been develo... 详细信息
来源: 评论
HeGTa: Leveraging Heterogeneous Graph-enhanced Large Language Models for Few-shot Complex Table Understanding  39
HeGTa: Leveraging Heterogeneous Graph-enhanced Large Languag...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Jin, Rihui Li, Yu Qi, Guilin Hu, Nan Li, Yuan-Fang Chen, Jiaoyan Wang, Jianan Chen, Yongrui Min, Dehai Bi, Sheng School of Computer Science and Engineering Southeast University China Ministry of Education China Monash University Australia The University of Manchester United Kingdom Alibaba Group China Law and Innovation Lab Law School Southeast University China State Key Laboratory for Novel Software Technology Nanjing University China
Table Understanding (TU) has achieved promising advancements, but it faces the challenges of the scarcity of manually labeled tables and the presence of complex table structures. To address these challenges, we propos...
来源: 评论
Analyzing close relations between target artifacts for improving IR-based requirement traceability recovery
收藏 引用
Frontiers of Information technology & Electronic Engineering 2021年 第7期22卷 957-968页
作者: Haijuan WANG Guohua SHEN Zhiqiu HUANG Yaoshen YU Kai CHEN College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing 211106China Key Laboratory of Safety-Critical Software Ministry of Industry and Information TechnologyNanjing 211106China
Requirement traceability is an important and costly task that creates trace links from requirements to different software *** trace links can help engineers reduce the time and complexity of software *** information r... 详细信息
来源: 评论
HeGTa: Leveraging Heterogeneous Graph-enhanced Large Language Models for Few-shot Complex Table Understanding
arXiv
收藏 引用
arXiv 2024年
作者: Jin, Rihui Li, Yu Qi, Guilin Hu, Nan Li, Yuan-Fang Chen, Jiaoyan Wang, Jianan Chen, Yongrui Min, Dehai Bi, Sheng School of Computer Science and Engineering Southeast University China Key Laboratory of New Generation Artificial Intelligence Technology and its Interdisciplinary Applications Southeast University Ministry of Education China Monash University Australia The University of Manchester United Kingdom Alibaba Group China Law and Innovation Lab Law School Southeast University China State Key Laboratory for Novel Software Technology Nanjing University China
Table Understanding (TU) has achieved promising advancements, but it faces the challenges of the scarcity of manually labeled tables and the presence of complex table structures. To address these challenges, we propos... 详细信息
来源: 评论
Preventing the Popular Item Embedding Based Attack in Federated Recommendations
Preventing the Popular Item Embedding Based Attack in Federa...
收藏 引用
International Conference on Data Engineering
作者: Jun Zhang Huan Li Dazhong Rong Yan Zhao Ke Chen Lidan Shou The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Department of Computer Science Aalborg University Aalborg Denmark
Privacy concerns have led to the rise of federated recommender systems (FRS), which can create personalized models across distributed clients. However, FRS is vulnerable to poisoning attacks, where malicious users man... 详细信息
来源: 评论