咨询与建议

限定检索结果

文献类型

  • 276 篇 会议
  • 152 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 291 篇 工学
    • 234 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 60 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 40 篇 生物工程
    • 21 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 18 篇 光学工程
    • 15 篇 仪器科学与技术
    • 14 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 9 篇 化学工程与技术
    • 9 篇 环境科学与工程(可...
  • 130 篇 理学
    • 70 篇 数学
    • 39 篇 生物学
    • 22 篇 系统科学
    • 20 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
  • 95 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 35 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 26 篇 医学
    • 25 篇 基础医学(可授医学...
    • 24 篇 临床医学
    • 14 篇 公共卫生与预防医...
    • 9 篇 药学(可授医学、理...
  • 20 篇 法学
    • 14 篇 社会学
  • 8 篇 教育学
  • 6 篇 经济学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 software enginee...
  • 12 篇 software
  • 11 篇 semantics
  • 10 篇 reinforcement le...
  • 8 篇 edge computing
  • 7 篇 software systems
  • 7 篇 wireless sensor ...
  • 7 篇 analytical model...
  • 7 篇 machine learning
  • 7 篇 artificial intel...
  • 6 篇 internet of thin...
  • 6 篇 conferences
  • 6 篇 ecosystems
  • 6 篇 computer archite...
  • 6 篇 security
  • 5 篇 deep learning
  • 5 篇 decision making
  • 5 篇 cloud computing
  • 5 篇 open source soft...
  • 5 篇 multi agent syst...

机构

  • 8 篇 state key labora...
  • 7 篇 national enginee...
  • 7 篇 shenzhen key lab...
  • 6 篇 the state key la...
  • 6 篇 guangdong labora...
  • 6 篇 state key labora...
  • 6 篇 university of ch...
  • 6 篇 state key lab fo...
  • 6 篇 national water a...
  • 5 篇 national enginee...
  • 5 篇 pca lab key lab ...
  • 4 篇 college of compu...
  • 4 篇 information syst...
  • 4 篇 school of comput...
  • 4 篇 the hong kong po...
  • 4 篇 school of comput...
  • 4 篇 institute for so...
  • 4 篇 state key lab of...
  • 4 篇 school of comput...
  • 4 篇 state key lab of...

作者

  • 15 篇 ismail leila
  • 11 篇 buyya rajkumar
  • 8 篇 guangming xie
  • 8 篇 wang chen
  • 8 篇 leila ismail
  • 8 篇 chen wang
  • 7 篇 rabiser rick
  • 7 篇 xie guangming
  • 7 篇 yang jian
  • 6 篇 ghose aditya k.
  • 6 篇 ying he
  • 5 篇 lochau malte
  • 5 篇 lê lam-son
  • 5 篇 feichtinger kevi...
  • 5 篇 choo kim-kwang r...
  • 5 篇 ghose aditya
  • 5 篇 schmidt-thieme l...
  • 5 篇 f. richard yu
  • 4 篇 xuechen zhao
  • 4 篇 meixner kristof

语言

  • 411 篇 英文
  • 18 篇 其他
  • 5 篇 中文
检索条件"机构=Systems and Software Engineering Lab"
434 条 记 录,以下是11-20 订阅
排序:
PIXHELL: When Pixels Learn to Scream
arXiv
收藏 引用
arXiv 2025年
作者: Guri, Mordechai Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Offensive-Cyber Research Lab
This paper presents a technique for generating sound by leveraging the electrical properties of liquid crystal displays (LCDs). The phenomenon occurs due to vibrational noise produced by capacitors within the LCD pane... 详细信息
来源: 评论
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Bokobza, Roey Mirsky, Yisroel Ben-Gurion University Department of Software and Information Systems Engineering Offensive AI Research Lab Israel
Our paper presents a novel defence against black box attacks, where attackers use the victim model as an oracle to craft their adversarial examples. Unlike traditional preprocessing defences that rely on sanitizing in...
来源: 评论
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
arXiv
收藏 引用
arXiv 2024年
作者: Weiss, Roy Ayzenshteyn, Daniel Amit, Guy Mirsky, Yisroel Ben-Gurion University Israel Department of Software and Information Systems Engineering Offensive AI Research Lab
AI assistants are becoming an integral part of society, used for asking advice or help in personal and confidential issues. In this paper, we unveil a novel side-channel that can be used to read encrypted responses fr... 详细信息
来源: 评论
TPTO: A Transformer-PPO based Task Offloading Solution for Edge Computing Environments  29
TPTO: A Transformer-PPO based Task Offloading Solution for E...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Gholipour, Niloofar De Assuncao, Marcos Dias Agarwal, Pranav Gascon-Samson, Julien Buyya, Rajkumar Univ. of Quebec Dept. of Software Engineering and IT École de Technologie Supérieure Montreal Canada The Univ. of Melbourne CLOUDS Lab School of Computing and Information Systems Australia
Emerging applications in healthcare, autonomous vehicles, and wearable assistance require interactive and low-latency data analysis services. Unfortunately, cloud-centric architectures cannot fulfill the low-latency d... 详细信息
来源: 评论
A Unified Information Diffusion Prediction Model Based on Multi-task Learning  9th
A Unified Information Diffusion Prediction Model Based on M...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Shang, Yingdan Zhou, Bin Zeng, Xiang Chen, Kai College of Computer Science and Technology National University of Defense Technology Changsha China Key Lab of Software Engineering for Complex Systems School of Computer National University of Defense Technology Changsha China
The prediction of online information diffusion trends on social networks is crucial for understanding people’s interests and concerns, and has many real-world applications in fields such as business, politics and soc... 详细信息
来源: 评论
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’
arXiv
收藏 引用
arXiv 2024年
作者: Guri, Mordechai Ben-Gurion University of the Negev Department of Software and Information Systems Engineering Air-Gap Research Lab Israel
Air-gapped systems are disconnected from the Internet and other networks because they contain or process sensitive data. However, it is known that attackers can use computer speakers to leak data via sound to circumve... 详细信息
来源: 评论
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’
PIXHELL Attack: Leaking Sensitive Information from Air-Gap C...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Mordechai Guri Department of Software and Information Systems Engineering Air-Gap Research Lab Ben-Gurion University of the Negev Israel
Air-gapped systems are disconnected from the Internet and other networks because they contain or process sensitive data. However, it is known that attackers can use computer speakers to leak data via sound to circumve... 详细信息
来源: 评论
A Dynamic Selective Parameter Sharing Mechanism Embedded with Multi-Level Reasoning Abstractions  26
A Dynamic Selective Parameter Sharing Mechanism Embedded wit...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Liu, Yan He, Ying Ming, Zhong Yu, F. Richard Shenzhen Key Lab of Digital & Intelligent Technologies & Systems College of Computer Science and Software Engineering Shenzhen University China State Key Laboratory of Integrated Services Networks Xidian University China Shenzhen China
Cooperative multi-agent reinforcement learning (Co-MARL) commonly employs different parameter sharing mechanisms, such as full and partial sharing. However, imprudent application of these mechanisms can potentially co... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. Security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
Mind The Gap: Can Air-Gaps Keep Your Private Data Secure?
arXiv
收藏 引用
arXiv 2024年
作者: Guri, Mordechai Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Air-Gap Research Lab United States
Personal data has become one of the most valuable assets and lucrative targets for attackers in the modern digital world. This includes personal identification information (PII), medical records, legal information, bi... 详细信息
来源: 评论