咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 237 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 369 篇 工学
    • 270 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 63 篇 信息与通信工程
    • 45 篇 控制科学与工程
    • 45 篇 生物工程
    • 26 篇 机械工程
    • 25 篇 光学工程
    • 24 篇 电气工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 电子科学与技术(可...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 安全科学与工程
    • 13 篇 材料科学与工程(可...
    • 13 篇 网络空间安全
    • 12 篇 土木工程
    • 12 篇 化学工程与技术
    • 11 篇 力学(可授工学、理...
    • 10 篇 建筑学
  • 181 篇 理学
    • 102 篇 数学
    • 46 篇 生物学
    • 37 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 系统科学
    • 16 篇 化学
  • 122 篇 管理学
    • 77 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 16 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 13 篇 法学
  • 8 篇 教育学
  • 7 篇 经济学
  • 6 篇 哲学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 12 篇 reinforcement le...
  • 12 篇 security
  • 11 篇 deep learning
  • 11 篇 software quality
  • 10 篇 servers
  • 10 篇 computational mo...
  • 9 篇 big data
  • 9 篇 predictive model...
  • 9 篇 software testing
  • 9 篇 semantics
  • 9 篇 feature extracti...
  • 9 篇 training
  • 8 篇 software reliabi...
  • 8 篇 algorithm design...
  • 8 篇 software
  • 7 篇 conferences
  • 7 篇 optimization
  • 7 篇 protocols
  • 7 篇 correlation
  • 7 篇 accuracy

机构

  • 178 篇 state key labora...
  • 52 篇 school of comput...
  • 27 篇 state key labora...
  • 25 篇 state key labora...
  • 21 篇 state key labora...
  • 20 篇 college of compu...
  • 17 篇 shanghai key lab...
  • 17 篇 collaborative in...
  • 15 篇 ministry key lab...
  • 15 篇 zhongguancun lab...
  • 14 篇 key laboratory o...
  • 13 篇 university of ch...
  • 13 篇 beijing advanced...
  • 12 篇 school of cyber ...
  • 12 篇 state key labora...
  • 11 篇 collage of compu...
  • 11 篇 institute of art...
  • 9 篇 beihang universi...
  • 8 篇 school of inform...
  • 8 篇 state key labora...

作者

  • 20 篇 wei li
  • 14 篇 yuefei sui
  • 13 篇 lizhi cai
  • 12 篇 limin xiao
  • 12 篇 chen mingang
  • 11 篇 peng hao
  • 10 篇 li zhoujun
  • 10 篇 huang di
  • 10 篇 cai lizhi
  • 9 篇 tao chuanqi
  • 9 篇 mingang chen
  • 9 篇 li ruan
  • 8 篇 jianwei niu
  • 7 篇 guo hongjing
  • 7 篇 hongbin luo
  • 7 篇 cheng jian
  • 7 篇 shan zhang
  • 7 篇 yongwang zhao
  • 7 篇 zhiyuan wang
  • 7 篇 dianfu ma

语言

  • 472 篇 英文
  • 68 篇 其他
  • 15 篇 中文
检索条件"机构=The Key Laboratory of the Software Development and Verification Technology"
553 条 记 录,以下是1-10 订阅
DeepTD: Diversity-Guided Deep Neural Network Test Generation  9th
DeepTD: Diversity-Guided Deep Neural Network Test Generation
收藏 引用
9th International Symposium on Dependable software Engineering: Theories, Tools and Applications, SETTA 2023
作者: Zhu, Jin Tao, Chuanqi Guo, Hongjing Ju, Yue College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing China State Key Laboratory for Novel Software Technology Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China
Coverage-guided Fuzz Testing (CGF) techniques have been applied to deep neural network (DNN) testing in recent years, generating a significant number of test samples to uncover inherent defects in DNN models. However,... 详细信息
来源: 评论
Multisource transfer learning based on multiconcept and multispace for text classification  3
Multisource transfer learning based on multiconcept and mult...
收藏 引用
3rd International Symposium on Computer Applications and Information Systems, ISCAIS 2024
作者: Qu, Qiaoli Zhu, Yi Pan, Jianhan School of Computer Science and Technology Jiangsu Normal University Xuzhou China The Key Laboratory of the Software Development and Verification Technology The Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing210016 China
Many multi-source transfer learning methods use the latent attributes between source domains to mitigate interference. However, these strategies have some shortcomings. Strategies that only use commonality may lose va... 详细信息
来源: 评论
software Defect Prediction Model Based on Syntactic Semantics and Flow Information Features  11
Software Defect Prediction Model Based on Syntactic Semantic...
收藏 引用
11th International Conference on Dependable Systems and Their Applications, DSA 2024
作者: Huang, Chongyang Zhu, Yi Yu, Qiao Ding, Yi Hao, Guosheng Jiangsu Normal University Jiangsu Xuzhou China Nanjing University of Aeronautics and Astronautics Key Laboratory for Safety-Critical Software Development and Verification Jiangsu Nanjing China
Using deep learning to determine whether a source code file contains defects has become an important research topic. In the past, many researchers have tended to convert code into Abstract Syntax Tree and use deep neu... 详细信息
来源: 评论
A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 43-57页
作者: Brou Bernard Ehui Chen CHEN Shirui WANG Hua GUO Jianwei LIU School of Cyber Sciences and Technology Beihang University State Key Laboratory of Software Development Environment Beihang University Sino-French Engineering School Beihang University Beihang Hangzhou Innovation Institute Yuhang
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the use... 详细信息
来源: 评论
Automated Functionality and Security Evaluation of Large Language Models  9
Automated Functionality and Security Evaluation of Large Lan...
收藏 引用
9th IEEE International Conference on Smart Cloud, SmartCloud 2024
作者: Ding, Minjie Shen, Ying Chen, Mingang Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology Shanghai China
Natural language processing (NLP) is rapidly developing. A series of Large Language Models (LLMs) have emerged, represented by ChatGPT, which have made significant breakthroughs in natural language understanding and g... 详细信息
来源: 评论
An Evaluation System for Large Language Models based on Open-Ended Questions  11
An Evaluation System for Large Language Models based on Open...
收藏 引用
11th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2024
作者: Cao, Zhiyuan Ma, Zeyu Chen, Mingang Computer and Information Engineering College Shanghai Polytechnic University Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer software Technology Mathematical and Science College Shanghai Normal University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer software Technology Shanghai China
We designed a large language model evaluation system based on open-ended questions. The system accomplished multidimensional evaluation of LLMs using open-ended questions, and it presented evaluation results with eval... 详细信息
来源: 评论
IVIFUZZER: A Fuzzing method for vulnerability exploitation on the operating interface of the In-Vehicle Infotainment system  5
IVIFUZZER: A Fuzzing method for vulnerability exploitation o...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and Information technology, AINIT 2024
作者: Wu, Jianhua Zhang, Xin Shanghai Development Center of Computer Software Technology Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai201112 China
As an important information system of intelligent and connected vehicles, most In-Vehicle Infotainment systems are set up and manage the vehicles through user interaction. This paper presents a Fuzzing method IVIFUZZE... 详细信息
来源: 评论
Research on Measuring Method of Function Size of Information System  26
Research on Measuring Method of Function Size of Information...
收藏 引用
26th ACIS International Winter Conference on software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Chunye, Du Shanghai Development Center of Computer Software Technology Shanghai Key Laboratory of Computer Software Testing &evaluating Shanghai China
With the rapid development of software industry, a variety of new technologies are produced. Research and development in cloud computing, big data, artificial intelligence, the Internet of Things, blockchain, and othe... 详细信息
来源: 评论
Analysis for Microservice Architecture Application Quality Model and Testing Method  26
Analysis for Microservice Architecture Application Quality M...
收藏 引用
26th ACIS International Winter Conference on software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Gong, Jiayu Cai, Lizhi Shanghai Development Center of Computer Software Technology Shanghai Key Laboratory of Computer Software Testing & Evaluation Shanghai China
In recent years, microservice architectures have benefited from low coupling and high cohesion characteristics, allowing flexible on-demand deployment of complex applications and simplifying the difficulty of developi... 详细信息
来源: 评论
Combining KNN with AutoEncoder for Outlier Detection
收藏 引用
Journal of Computer Science & technology 2024年 第5期39卷 1153-1166页
作者: Shu-Zheng Liu Shuai Ma Han-Qing Chen Li-Zhen Cui Jie Ding State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Software Shandong UniversityJinan 250100China Joint SDU-NTU Centre for Artificial Intelligence Research Shandong UniversityJinan 250100China School of Computer Science Jiangsu University of Science and TechnologyZhenjiang 212003China
K-nearest neighbor(KNN)is one of the most fundamental methods for unsupervised outlier detection because of its various advantages,e.g.,ease of use and relatively high ***,most data analytic tasks need to deal with hi... 详细信息
来源: 评论