咨询与建议

限定检索结果

文献类型

  • 44 篇 期刊文献
  • 34 篇 会议

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 51 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 11 篇 生物工程
    • 8 篇 信息与通信工程
    • 4 篇 机械工程
    • 3 篇 控制科学与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
  • 25 篇 理学
    • 13 篇 数学
    • 12 篇 生物学
    • 9 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 1 篇 化学
  • 11 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学

主题

  • 7 篇 semantics
  • 4 篇 deep learning
  • 3 篇 feature extracti...
  • 3 篇 python
  • 3 篇 software
  • 3 篇 open source soft...
  • 2 篇 empirical study
  • 2 篇 well testing
  • 2 篇 data mining
  • 2 篇 real-time system...
  • 2 篇 network architec...
  • 2 篇 codes
  • 2 篇 security
  • 2 篇 software design
  • 2 篇 testing
  • 2 篇 measurement
  • 1 篇 power demand
  • 1 篇 internet of thin...
  • 1 篇 image super‐reso...
  • 1 篇 intrusion detect...

机构

  • 21 篇 software enginee...
  • 14 篇 huawei software ...
  • 6 篇 university of lu...
  • 6 篇 singapore manage...
  • 5 篇 zhejiang univers...
  • 5 篇 the state key la...
  • 4 篇 tencent ai lab
  • 3 篇 zhejiang univers...
  • 3 篇 school of comput...
  • 3 篇 school of inform...
  • 3 篇 the hong kong po...
  • 3 篇 school of softwa...
  • 3 篇 monash universit...
  • 3 篇 data61 csiro
  • 3 篇 university of ch...
  • 3 篇 beihang universi...
  • 3 篇 college of compu...
  • 3 篇 moe engineering ...
  • 3 篇 harbin institute...
  • 3 篇 software enginee...

作者

  • 15 篇 xia xin
  • 12 篇 liu kui
  • 9 篇 xin xia
  • 7 篇 lo david
  • 6 篇 xing hu
  • 6 篇 bissyandé tegawe...
  • 6 篇 hu xing
  • 4 篇 li li
  • 4 篇 xiaohu yang
  • 4 篇 shi yuanming
  • 4 篇 wang ting
  • 4 篇 yang xiaohu
  • 4 篇 kui liu
  • 3 篇 gao cuiyun
  • 3 篇 xu xiwei
  • 3 篇 li shanping
  • 3 篇 zhu liming
  • 3 篇 xing zhenchang
  • 3 篇 david lo
  • 3 篇 tongtong xu

语言

  • 74 篇 英文
  • 4 篇 其他
检索条件"机构=The Software Engineering Application Technology Lab"
78 条 记 录,以下是11-20 订阅
排序:
Fast Point-to-Surface Projection for Large CAD Models and Quality Testing  3
Fast Point-to-Surface Projection for Large CAD Models and Qu...
收藏 引用
3rd International Conference on Optics and Image Processing, ICOIP 2023
作者: Liu, Wu Bao, Ziheng Yang, Chunhui Liu, Yusheng Wu, Lei Fifth Electronic Research Institute of Ministry of Industry and Information Technology MIIT Key Lab of Industrial Software Engineering Application Technology Guangzhou510610 China State Key Lab of CAD&CG Zhejiang University Hangzhou310027 China
Point projection for Non-Uniform Rational B-Splines (NURBS) surfaces is a fundamental operator in Computer-Aided modeling (CAD) modeling. This operator takes as input a query point and a NURBS surface in 3, and output... 详细信息
来源: 评论
A Survey on Modern Code Review: Progresses, Challenges and Opportunities
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zezhou Gao, Cuiyun Guo, Zhaoqiang Li, Zhenhao Liu, Kui Xia, Xin Zhou, Yuming Harbin Institute of Technology Shenzhen China Software Engineering Application Technology Lab Huawei Hangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Over the past decade, modern code review (MCR) has been deemed as a crucial practice of software quality assurance, which is applied to improve software quality and transfer development knowledge within a software tea... 详细信息
来源: 评论
Identify and Update Test Cases when Production Code Changes: A Transformer-Based Approach  23
Identify and Update Test Cases when Production Code Changes:...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software engineering
作者: Xing Hu Zhuang Liu Xin Xia Zhongxin Liu Tongtong Xu Xiaohu Yang School of Software Technology Zhejiang University Ningbo China College of Computer Science and Technology Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei Hangzhou China
software testing is one of the most essential parts of the software lifecycle and requires a substantial amount of time and effort. During the software evolution, test cases should coevolve with the production code. H... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. Security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
Dual Prompt-Based Few-Shot Learning for Automated Vulnerability Patch Localization
Dual Prompt-Based Few-Shot Learning for Automated Vulnerabil...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Junwei Zhang Xing Hu Lingfeng Bao Xin Xia Shanping Li The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China
Vulnerabilities are disclosed with corresponding patches so that users can remediate them in time. However, there are instances where patches are not released with the disclosed vulnerabilities, causing hidden dangers... 详细信息
来源: 评论
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 125-137页
作者: Debasmita Mishra Bighnaraj Naik Janmenjoy Nayak Alireza Souri Pandit Byomakesha Dash S.Vimal Department of Computer Application Veer Surendra Sai University of TechnologyBurlaSambalpur768018OdishaIndia Department of Computer Science Maharaja Sriram Chandra Bhanja Deo(MSCB)UniversityBaripada757003OdishaIndia Department of Software Engineering HaliçUniversity34394IstanbulTurkey Department of Information Technology Aditya Institute of Technology and Management(AITAM)Tekkali532201Andhra PradeshIndia Data Analytics Lab Department of Artificial Intelligence and Data ScienceRamco Institute of TechnologyNorth Venganallur VillageRajapalayam 626117 Virudhunagar DistrictTamilnaduIndia
In this paper,an advanced and optimized Light Gradient Boosting Machine(LGBM)technique is proposed to identify the intrusive activities in the Internet of Things(IoT)*** followings are the major contributions:i)An opt... 详细信息
来源: 评论
Investigating White-Box Attacks for On-Device Models
Investigating White-Box Attacks for On-Device Models
收藏 引用
International Conference on software engineering (ICSE)
作者: Mingyi Zhou Xiang Gao Jing Wu Kui Liu Hailong Sun Li Li Monash University Melbourne VIC Australia Beihang University Beijing China Huawei Software Engineering Application Technology Lab China Beihang University Beijing Yunnan Key Laboratory of Software Engineering China
Numerous mobile apps have leveraged deep learning capabilities. However, on-device models are vulnerable to attacks as they can be easily extracted from their corresponding mobile apps. Although the structure and para... 详细信息
来源: 评论
Investigating White-Box Attacks for On-Device Models
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Mingyi Liu, Kui Gao, Xiang Sun, Hailong Wu, Jing Li, Li Monash University MelbourneVIC Australia Huawei Software Engineering Application Technology Lab China Beihang University Beijing China Beihang University Beijing Yunnan Key Laboratory of Software Engineering China
Numerous mobile apps have leveraged deep learning capabilities. However, on-device models are vulnerable to attacks as they can be easily extracted from their corresponding mobile apps. Although the structure and para... 详细信息
来源: 评论
Distinguishing LLM-generated from Human-written Code by Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Xiaodan Ni, Chao Guo, Xinrong Liu, Shaoxuan Wang, Xiaoya Liu, Kui Yang, Xiaohu State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei Hangzhou China
Large language models (LLMs), such as ChatGPT released by OpenAI, have attracted significant attention from both industry and academia due to their demonstrated ability to generate high-quality content for various tas... 详细信息
来源: 评论
Code Change Intention, Development Artifact and History Vulnerability: Putting Them Together for Vulnerability Fix Detection by LLM
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Xu Zhu, Wenhan Pacheco, Michael Zhou, Jiayuan Wang, Shaowei Hu, Xing Liu, Kui University of Manitoba WinnipegMB Canada Huawei Canada Canada Zhejiang University Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China
Detecting vulnerability fix commits in open-source software is crucial for maintaining software security. To help OSS identify vulnerability fix commits, several automated approaches are developed. However, existing a... 详细信息
来源: 评论