咨询与建议

限定检索结果

文献类型

  • 33 篇 期刊文献
  • 15 篇 会议

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 20 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 9 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 仪器科学与技术
    • 4 篇 电气工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
  • 20 篇 理学
    • 10 篇 数学
    • 7 篇 物理学
    • 5 篇 生物学
    • 4 篇 系统科学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 9 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 7 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 3 篇 synchronization
  • 2 篇 internet of thin...
  • 2 篇 elastic waves
  • 2 篇 proposals
  • 2 篇 software enginee...
  • 2 篇 information tech...
  • 2 篇 network
  • 2 篇 software testing
  • 2 篇 costs
  • 2 篇 feature extracti...
  • 2 篇 federated learni...
  • 2 篇 numerical method...
  • 1 篇 time
  • 1 篇 jpeg
  • 1 篇 quaternion convo...
  • 1 篇 parallel process...
  • 1 篇 object detection
  • 1 篇 quantum computin...
  • 1 篇 botnet
  • 1 篇 object oriented ...

机构

  • 8 篇 state key labora...
  • 7 篇 school of mathem...
  • 5 篇 lsec institute o...
  • 5 篇 institute of app...
  • 4 篇 caep software ce...
  • 3 篇 school of mathem...
  • 3 篇 school of automa...
  • 3 篇 school of electr...
  • 2 篇 school of mathem...
  • 2 篇 science and tech...
  • 2 篇 state key labora...
  • 2 篇 school of comput...
  • 2 篇 center of mathem...
  • 2 篇 department of ps...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 national univers...
  • 2 篇 school of mathem...
  • 2 篇 moe engineering ...
  • 1 篇 ophthalmology un...

作者

  • 5 篇 zhou yuzhi
  • 5 篇 zhou aihui
  • 3 篇 chen huajie
  • 3 篇 zuohua ding
  • 3 篇 wang ting
  • 3 篇 na zhang
  • 2 篇 xiangyang luo
  • 2 篇 goudarzi mohamma...
  • 2 篇 xiaoan bao
  • 2 篇 kostakos vassili...
  • 2 篇 lü jinhu
  • 2 篇 mahmud redowan
  • 2 篇 ismail leila
  • 2 篇 jinwei wang
  • 2 篇 weile jia
  • 2 篇 buyya rajkumar
  • 2 篇 srirama satish n...
  • 1 篇 j. a. torres
  • 1 篇 han wang
  • 1 篇 d. m. muzny

语言

  • 47 篇 英文
  • 1 篇 其他
检索条件"机构=Center of Mathematical Computing and Software Engineering"
48 条 记 录,以下是11-20 订阅
排序:
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Quality of Service (QoS)-driven Edge computing and Smart Hospitals: A Vision, Architectural Elements, and Future Directions
arXiv
收藏 引用
arXiv 2023年
作者: Buyya, Rajkumar Srirama, Satish N. Mahmud, Redowan Goudarzi, Mohammad Ismail, Leila Kostakos, Vassilis Lab School of Computing and Information Systems The University of Melbourne Australia School of Computer and Information Sciences The University of Hyderabad India School of Electrical Engineering Computing and Mathematical Sciences Curtin University Perth Australia Lab Department of Computer Science and Software Engineering National Water and Energy Center United Arab Emirates University United Arab Emirates
The Internet of Things (IoT) paradigm is drastically changing our world by making everyday objects an integral part of the Internet. This transformation is increasingly being adopted in the healthcare sector, where Sm... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
Computer-Automated Design of Self-Aligned Multi-Ball Pitch Artifact with High Precision
SSRN
收藏 引用
SSRN 2024年
作者: Zhu, Hongjun Liu, Binghong Zhou, Sen Zhang, Xiaoyan Xin, Liu Chen, Kuo Qian, Ying School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Engineering Research Center of Software Quality Assurance Testing and Assessment Chongqing400065 China College of Mechanical and Vehicle Engineering Chongqing University Chongqing400044 China Chongqing Academy of Metrology and Quality Inspection Chongqing401121 China School of Engineering Computer and Mathematical Sciences Auckland University of Technology Auckland1010 New Zealand Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
This study presents a computational methodology for developing a multi-ball system that automatically aligns during assembly processes. The contributions of this work are threefold: Firstly, a comprehensive error anal... 详细信息
来源: 评论
An extended plane wave framework for the electronic structure calculations of twisted bilayer material systems
arXiv
收藏 引用
arXiv 2023年
作者: Dai, Xiaoying Zhou, Aihui Zhou, Yuzhi LSEC Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China CAEP Software Center for High Performance Numerical Simulation Beijing100088 China Institute of Applied Physics and Computational Mathematics Beijing100088 China
In this paper, we propose an extended plane wave framework to make the electronic structure calculations of the twisted bilayer 2D material systems practically feasible. Based on the foundation in [Y. Zhou, H. Chen, A... 详细信息
来源: 评论
Localization in the Incommensurate Systems: A Plane Wave Study via Effective Potentials
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Ting Zhou, Yuzhi Zhou, Aihui LSEC Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China CAEP Software Center for High Performance Numerical Simulation Beijing100088 China Institute of Applied Physics and Computational Mathematics Beijing100094 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
In this paper, we apply the effective potentials in the localization landscape theory (Filoche et al., 2012, Arnold et al., 2016) to study the spectral properties of the incommensurate systems. We uniquely develop a p... 详细信息
来源: 评论
CB-HVTNet: A channel-boosted hybrid vision transformer network for lymphocyte assessment in histopathological images
arXiv
收藏 引用
arXiv 2023年
作者: Ali, Momina Liaqat Rauf, Zunaira Khan, Asifullah Sohail, Anabia Ullah, Rafi Gwak, Jeonghwan Pattern Recognition Lab Department of Computer & Information Sciences Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan Center for Mathematical Sciences Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan Department of Computer Science Faculty of Computing and Artificial Intelligence Air University IslamabadE-9 Pakistan Perak31750 Malaysia Department of Software Korea National University of Transportation Chungju27469 Korea Republic of
Transformers, due to their ability to learn long-range dependencies, have overcome the shortcomings of convolutional neural networks (CNNs) for global perspective learning. However, their multi-head attention module o... 详细信息
来源: 评论
TEVA: Training-Efficient and Verifiable Aggregation for Federated Learning for Consumer Electronics in Industry 5.0
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xia, Yuanjun Liu, Yining Chen, Jingxue Liang, Yangfan Khan, Fazlullah Alturki, Ryan Wang, Xiaopei Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software School of Computer and Information Security Guilin541004 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325027 China University of Technology School of Mathematical and Physical Sciences SydneyNSW2007 Australia Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems The Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing314001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China Umm AI-Qura University Makkah Department of Software Engineering College of Computing Saudi Arabia Riverside Department of Computer Science and Engineering University of California CA92521 United States
Federated learning (FL) has been widely used for privacy-preserving model updates in Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it remains vulnerable to attacks where adv... 详细信息
来源: 评论
DPA-2:a large atomic model as a multitask learner
收藏 引用
npj Computational Materials 2024年 第1期10卷 185-199页
作者: Duo Zhang Xinzijian Liu Xiangyu Zhang Chengqian Zhang Chun Cai Hangrui Bi Yiming Du Xuejian Qin Anyang Peng Jiameng Huang Bowen Li Yifan Shan Jinzhe Zeng Yuzhi Zhang Siyuan Liu Yifan Li Junhan Chang Xinyan Wang Shuo Zhou Jianchuan Liu Xiaoshan Luo Zhenyu Wang Wanrun Jiang Jing Wu Yudi Yang Jiyuan Yang Manyi Yang Fu-Qiang Gong Linshuang Zhang Mengchao Shi Fu-Zhi Dai Darrin M.York Shi Liu Tong Zhu Zhicheng Zhong Jian Lv Jun Cheng Weile Jia Mohan Chen Guolin Ke Weinan E Linfeng Zhang Han Wang AI for Science Institute BeijingP.R.China DP Technology BeijingP.R.China Academy for Advanced Interdisciplinary Studies Peking UniversityBeijingP.R.China State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingP.R.China University of Chinese Academy of Sciences BeijingP.R.China HEDPS CAPTCollege of EngineeringPeking UniversityBeijingP.R.China Ningbo Institute of Materials Technology and Engineering Chinese Academy of SciencesNingboP.R.China CAS Key Laboratory of Magnetic Materials and Devices and Zhejiang Province Key Laboratory of Magnetic Materials and Application Technology Chinese Academy of SciencesNingboP.R.China School of Electronics Engineering and Computer Science Peking UniversityBeijingP.R.China Shanghai Engineering Research Center of Molecular Therapeutics&New Drug Development School of Chemistry and Molecular EngineeringEast China Normal UniversityShanghaiP.R.China Laboratory for Biomolecular Simulation Research Institute for Quantitative Biomedicine and Department of Chemistry and Chemical BiologyRutgers UniversityPiscatawayNJUSA Department of Chemistry Princeton UniversityPrincetonNJUSA College of Chemistry and Molecular Engineering Peking UniversityBeijingP.R.China Yuanpei College Peking UniversityBeijingP.R.China School of Electrical Engineering and Electronic Information Xihua UniversityChengduP.R.China State Key Laboratory of Superhard Materials College of PhysicsJilin UniversityChangchunP.R.China Key Laboratory of Material Simulation Methods&Software of Ministry of Education College of PhysicsJilin UniversityChangchunP.R.China International Center of Future Science Jilin UniversityChangchunP.R.China Key Laboratory for Quantum Materialsof Zhejiang Province Department of PhysicsSchool of ScienceWestlake UniversityHangzhouP.R.China Atomistic Simulations Italian Institute of TechnologyGenovaItaly State Key Laboratory of Physical Chemistry of Solid Surface iChEMCollege of Chemistry and Chemical EngineeringXiame
The rapid advancements in artificial intelligence(AI)are catalyzing transformative changes in atomic modeling,simulation,and ***-driven potential energy models havedemonstrated the capability to conduct large-scale,lo... 详细信息
来源: 评论
Median Filtering Detection Based on Quaternion Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 929-943页
作者: Jinwei Wang Qiye Ni Yang Zhang Xiangyang Luo Yunqing Shi Jiangtao Zhai Sunil Kr Jha Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing100093China Department of Electrical Computer Engineering New Jersey Institute of TechnologyNew JerseyNJ07102USA
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m... 详细信息
来源: 评论