咨询与建议

限定检索结果

文献类型

  • 1,473 篇 会议
  • 1,220 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,701 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,465 篇 计算机科学与技术...
    • 1,180 篇 软件工程
    • 317 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 133 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
    • 37 篇 建筑学
  • 893 篇 理学
    • 552 篇 数学
    • 184 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 546 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 38 篇 feature extracti...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 cloud computing
  • 29 篇 deep learning

机构

  • 507 篇 state key labora...
  • 202 篇 department of co...
  • 151 篇 department of co...
  • 118 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 63 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 21 篇 gao yang
  • 21 篇 lu sanglu
  • 21 篇 xu xiaolong

语言

  • 2,524 篇 英文
  • 90 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2701 条 记 录,以下是231-240 订阅
排序:
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases  23
Domain Adaptive Code Completion via Language Models and Deco...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software Engineering
作者: Ze Tang Jidong Ge Shangqing Liu Tingwei Zhu Tongtong Xu Liguo Huang Bin Luo National Key Laboratory for Novel Software Technology Nanjing University China Nanyang Technological University Singapore Huawei Software Engineering Application Technology China Department of Computer Science Southern Methodist University USA
Large Language Models (LLMs) have demonstrated remarkable performance in code completion. However, due to the lack of domain-specific knowledge, they may not be optimal in completing code that requires intensive domai... 详细信息
来源: 评论
Attack and Improvement of a Hidden Vector Encryption Scheme  12
Attack and Improvement of a Hidden Vector Encryption Scheme
收藏 引用
12th International Conference on Electronics, Communications and Networks, CECNet 2022
作者: Wang, Ke Wang, Zhikun Luo, Song Guan, Zhi Key Laboratory of High Confidence Software Technologies Peking University MoE Beijing China Department of Computer Science and Technology Eecs Peking University Beijing China School of Computer Science and Engineering Chongqing University of Technology Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
Hidden Vector Encryption (HVE) is a new kind of attribute-based encryption in which a vector is hidden in the ciphertext or linked with the secret key. In ESORICS 2014, Phuong et al. proposed an HVE scheme with consta... 详细信息
来源: 评论
CopGAT: Co-propagation Self-supervised Graph Attention Network
CopGAT: Co-propagation Self-supervised Graph Attention Netwo...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Baoming Zhang Ming Xu Mingcai Chen Mingyuan Chen Chongjun Wang Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Graph Attention Network (GAT) is one of the state-of-the-art architectures for Graph Neural Networks (GNNs). In this paper, we first propose Label Purity to explore the relationship between the graph attention and the... 详细信息
来源: 评论
Supervised Contrastive Learning with Prototype Distillation for Data Incremental Learning
SSRN
收藏 引用
SSRN 2024年
作者: Yang, Suorong Zhang, Tianyue Xu, Baile Shen, Furao Zhao, Jian State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
The goal of Data Incremental Learning (DIL) is to enable learning from small-scale data batches from non-stationary data streams without clear task divisions. This approach often encounters the issue of catastrophic f... 详细信息
来源: 评论
Vulnerable Region-Aware Greybox Fuzzing
收藏 引用
Journal of computer science & technology 2021年 第5期36卷 1212-1228页
作者: Ling-Yun Situ Zhi-Qiang Zuo Le Guan Lin-Zhang Wang Xuan-Dong Li Jin Shi Peng Liu State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China School of Information Management Nanjing UniversityNanjing 210023China Department of Computer Science University of GeorgiaAthensGA 30602U.S.A. College of Information Sciences and Technology Pennsylvania State UniversityState CollegePA 16802U.S.A
Fuzzing is known to be one of the most effective techniques to uncover security vulnerabilities of large-scale software *** fuzzing,it is crucial to distribute the fuzzing resource appropriately so as to achieve the b... 详细信息
来源: 评论
AdaAugment: A Tuning-Free and Adaptive Approach to Enhance Data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Suorong Li, Peijia Xiong, Xi Shen, Furao Zhao, Jian State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Data augmentation (DA) is widely employed to improve the generalization performance of deep models. However, most existing DA methods use augmentation operations with random magnitudes throughout training. While this ... 详细信息
来源: 评论
Nerftap: Enhancing Transferability of Adversarial Patches on Face Recognition Using Neural Radiance Fields
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Xiaoliang Shen, Fu-Rao Han, Feng Zhao, Jian Nie, Changhai State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Face recognition (FR) technology plays a crucial role in various applications, but its vulnerability to adversarial attacks poses significant security concerns. Existing research primarily focuses on transferability t... 详细信息
来源: 评论
EntAugment: Entropy-Driven Adaptive Data Augmentation Framework for Image Classification
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Suorong Shen, Furao Zhao, Jian State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Data augmentation (DA) has been widely used to improve the generalization of deep neural networks. While existing DA methods have proven effective, they often rely on augmentation operations with random magnitudes to ... 详细信息
来源: 评论
CADEC: A Combinatorial Auction for Dynamic Distributed DNN Inference Scheduling in Edge-Cloud Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Xu, Xiaolong Hu, Yuhao Cui, Guangming Qi, Lianyong Dou, Wanchun Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software China Nanjing University State Key Laboratory for Novel Software Technology China College of Computer science and technology Qingdao China Georgia State University Department of Computer Science United States
Deep Neural Network (DNN) Inference, as a key enabler of intelligent applications, is often computation-intensive and latency-sensitive. Combining the advantages of cloud computing (abundant computing resources) and e... 详细信息
来源: 评论
AoI-aware Incentive Mechanism for Mobile Crowdsensing using Stackelberg Game
AoI-aware Incentive Mechanism for Mobile Crowdsensing using ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Mingjun Xiao Yin Xu Jinrui Zhou Jie Wu Sheng Zhang Jun Zheng School of Computer Science and Technology University of Science and Technology of China China Suzhou Institute for Advanced Research University of Science and Technology of China China Department of Computer and Information Sciences Temple Universityy State Key Laboratory for Novel Software Technology Nanjing University China
Mobile CrowdSensing (MCS) is a mobile computing paradigm, through which a platform can coordinate a crowd of workers to accomplish large-scale data collection tasks using their mobile devices. Information freshness ha...
来源: 评论