咨询与建议

限定检索结果

文献类型

  • 2,948 篇 会议
  • 2,521 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,829 篇 工学
    • 2,883 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 705 篇 信息与通信工程
    • 542 篇 控制科学与工程
    • 330 篇 生物工程
    • 312 篇 电气工程
    • 279 篇 电子科学与技术(可...
    • 266 篇 机械工程
    • 218 篇 光学工程
    • 195 篇 生物医学工程(可授...
    • 152 篇 仪器科学与技术
    • 137 篇 化学工程与技术
    • 135 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 89 篇 土木工程
    • 87 篇 建筑学
  • 1,828 篇 理学
    • 1,126 篇 数学
    • 393 篇 物理学
    • 374 篇 生物学
    • 306 篇 统计学(可授理学、...
    • 237 篇 系统科学
    • 140 篇 化学
  • 1,087 篇 管理学
    • 666 篇 管理科学与工程(可...
    • 454 篇 图书情报与档案管...
    • 218 篇 工商管理
  • 149 篇 医学
    • 126 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 76 篇 药学(可授医学、理...
  • 136 篇 法学
    • 100 篇 社会学
  • 77 篇 经济学
    • 77 篇 应用经济学
  • 53 篇 教育学
  • 47 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 179 篇 computer science
  • 135 篇 laboratories
  • 133 篇 semantics
  • 98 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 91 篇 optimization
  • 91 篇 training
  • 81 篇 data mining
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 76 篇 software
  • 70 篇 algorithm design...
  • 64 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 60 篇 cloud computing
  • 59 篇 accuracy
  • 57 篇 software testing
  • 57 篇 web services
  • 56 篇 application soft...

机构

  • 1,069 篇 state key labora...
  • 223 篇 department of co...
  • 223 篇 national key lab...
  • 176 篇 department of co...
  • 138 篇 school of inform...
  • 116 篇 state key labora...
  • 114 篇 state key labora...
  • 108 篇 state key labora...
  • 103 篇 college of compu...
  • 88 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 shandong provinc...
  • 71 篇 shandong provinc...
  • 69 篇 department of co...
  • 59 篇 school of softwa...
  • 57 篇 school of artifi...
  • 57 篇 shanghai key lab...
  • 51 篇 state key labora...
  • 51 篇 state key labora...
  • 50 篇 collaborative in...

作者

  • 67 篇 gao yang
  • 47 篇 shi yinghuan
  • 44 篇 dou wanchun
  • 42 篇 guihai chen
  • 38 篇 sanglu lu
  • 38 篇 li wu-jun
  • 37 篇 zhou zhi-hua
  • 32 篇 baowen xu
  • 32 篇 junping du
  • 31 篇 shen furao
  • 31 篇 yu huiqun
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 29 篇 zhang lijun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 liu hong
  • 27 篇 xu xiaolong
  • 26 篇 yang tianbao
  • 26 篇 xu chang

语言

  • 4,977 篇 英文
  • 353 篇 其他
  • 153 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5483 条 记 录,以下是701-710 订阅
排序:
Human-in-the-loop online just-in-time software defect prediction
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xutong Zhou, Yufei Tang, Yutian Qian, Junyan Zhou, Yuming The State Key Laboratory for Novel Software Technology Nanjing University China The School of Computer Science and Engineering School of Software Guanxi Normal University China The School of Computing Science University of Glasgow United Kingdom
Online Just-In-Time software Defect Prediction (O-JIT-SDP) uses an online model to predict whether a new software change will introduce a bug or not. However, existing studies neglect the interaction of software Quali... 详细信息
来源: 评论
NeRFTAP: Enhancing Transferability of Adversarial Patches on Face Recognition using Neural Radiance Fields
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaoliang Shen, Furao Han, Feng Zhao, Jian Nie, Changhai State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Face recognition (FR) technology plays a crucial role in various applications, but its vulnerability to adversarial attacks poses significant security concerns. Existing research primarily focuses on transferability t... 详细信息
来源: 评论
Investigating the Effectiveness of Data Augmentation from Similarity and Diversity: An Empirical Study
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Suorong Guo, Suhan Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Data augmentation has emerged as a widely adopted technique for improving the generalization capabilities of deep neural networks. However, evaluating the effectiveness of data augmentation methods solely based on mod... 详细信息
来源: 评论
COUNTING RANDOM k-SAT NEAR THE SATISFIABILITY THRESHOLD
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zongchen Lonkar, Aditya Wang, Chunyang Yang, Kuan Yin, Yitong School of Computer Science Georgia Institute of Technology AtlantaGA United States State Key Laboratory for Novel Software Technology New Cornerstone Science Laboratory Nanjing University 163 Xianlin Avenue Jiangsu Province Nanjing210023 China John Hopcroft Center for Computer Science Shanghai Jiao Tong University Shanghai China
We present efficient counting and sampling algorithms for random k-SAT when the clause density satisfies α ≤ 2k poly(k) . In particular, the exponential term 2k matches the satisfiability threshold Θ(2k) for the ex... 详细信息
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
Advmask: A Sparse Adversarial Attack-Based Data Augmentation Method for Image Classification
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Suorong Li, Jinqiao Zhang, Tianyue Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Data augmentation has been an essential technique for improving the generalization ability of deep neural networks in image classification ***, intensive changes in appearance and different degrees of occlusion in ima... 详细信息
来源: 评论
PathLAD+: Towards effective exact methods for subgraph isomorphism problem
收藏 引用
Artificial Intelligence 2024年 337卷
作者: Wang, Yiyuan Jin, Chenghou Cai, Shaowei School of Computer Science and Information Technology Northeast Normal University China Key Laboratory of Applied Statistics of MOE Northeast Normal University Changchun China School of Computer Science Fudan University Shanghai China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences China
The subgraph isomorphism problem (SIP) is a challenging problem with wide practical applications. In the last decade, despite being a theoretical hard problem, researchers designed various algorithms for solving SIP. ... 详细信息
来源: 评论
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Ze Ge, Jidong Liu, Shangqing Zhu, Tingwei Xu, Tongtong Huang, Liguo Luo, Bin National Key Laboratory for Novel Software Technology Nanjing University China Nanyang Technological University Singapore Huawei Software Engineering Application Technology China Department of Computer Science Southern Methodist University United States
Large Language Models (LLMs) have demonstrated remarkable performance in code completion. However, due to the lack of domain-specific knowledge, they may not be optimal in completing code that requires intensive domai... 详细信息
来源: 评论
ML-based Privacy Leakage Behavior Detection in Android Apps at Scale  19
ML-based Privacy Leakage Behavior Detection in Android Apps ...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Bu, ZhiLiang Zhao, Chunlei Gong, Liangyi Wang, Yan Yang, Yi Wang, Xi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin China Tianjin University of Technology School of Computer Science and Engineering Tianjin China Computer Network Information Center Chinese Academy of Sciences Beijing China Southeast University School of Cyber Science and Engineering Nanjing China
In recent years, Android application privacy leaking issues frequently occur, with the results that privacy leakage detection becomes a critical role in app market security review, and numerous mobile apps have been r... 详细信息
来源: 评论
MRM: Site Selection via Mutil-round Meanshift for Global Fairness
MRM: Site Selection via Mutil-round Meanshift for Global Fai...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yu-xin Ge Hong-tao Luo Chen-xuan Fang Zhi-wei Zhu Chong-jun Wang Department of Computer Science and Technology National Key Laboratory for Novel Software Technology Nanjing University Nanjing University Nanjing China
Elevator maintenance plays an important role in the safety and economic aspects of daily life, and the location of elevator maintenance sites is crucial in this scenario. A reasonable location can help reduce economic... 详细信息
来源: 评论