咨询与建议

限定检索结果

文献类型

  • 402 篇 会议
  • 172 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 316 篇 工学
    • 275 篇 计算机科学与技术...
    • 184 篇 软件工程
    • 51 篇 信息与通信工程
    • 31 篇 生物工程
    • 27 篇 电气工程
    • 26 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 13 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 110 篇 理学
    • 65 篇 数学
    • 33 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 10 篇 化学
    • 8 篇 物理学
  • 96 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 2 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 memory managemen...
  • 15 篇 virtual machine ...
  • 14 篇 semantics

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 59 篇 school of comput...
  • 52 篇 services computi...
  • 45 篇 school of cyber ...
  • 29 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 19 篇 zhejiang lab
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 service computin...

作者

  • 300 篇 hai jin
  • 199 篇 jin hai
  • 77 篇 xiaofei liao
  • 47 篇 deqing zou
  • 45 篇 liao xiaofei
  • 37 篇 song wu
  • 27 篇 long zheng
  • 26 篇 zou deqing
  • 24 篇 haikun liu
  • 24 篇 shi xuanhua
  • 22 篇 ran zheng
  • 21 篇 xuanhua shi
  • 21 篇 wu song
  • 19 篇 hu shengshan
  • 18 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 16 篇 yu huang
  • 15 篇 jiang xiao
  • 14 篇 liu haikun

语言

  • 546 篇 英文
  • 25 篇 其他
  • 11 篇 中文
检索条件"机构=China Services Computing Technology and System Lab and Cluster and Grid"
581 条 记 录,以下是491-500 订阅
排序:
Energy Saving Strategy of Power system cluster Based on Container Virtualization
Energy Saving Strategy of Power System Cluster Based on Cont...
收藏 引用
IEEE Asia Power and Energy Engineering Conference (APEEC)
作者: Ran Zheng Hao Wang Hai Jin Dechao Xu Yong Chen Xiaomeng Li Yufei Rao Zhenan Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Power Grid Safety and Energy Conservation China Electric Power Research Institute Haidian District Beijing China State Grid Henan Electric Power Company Electric Power Research Institute Zhengzhou China
With the continuous development of power grids, the scale of supercomputing clusters has also gradually increased to carry a large number of power system simulation calculations, and the problem of high energy consump...
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论
Fed-AugMix: Balancing Privacy and Utility via Data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Haoyang Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Gradient leakage attacks pose a significant threat to the privacy guarantees of federated learning. While distortion-based protection mechanisms are commonly employed to mitigate this issue, they often lead to notable... 详细信息
来源: 评论
Accelerating GPGPU architecture simulation
Accelerating GPGPU architecture simulation
收藏 引用
2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer systems, SIGMETRICS 2013
作者: Yu, Zhibin Eeckhout, Lieven Goswami, Nilanjan Li, Tao John, Lizy K. Jin, Hai Xu, Chengzhong Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China ELIS Department Ghent University Belgium Intelligent Design of Efficient Architectures Lab. University of Florida Gainesville FL United States Department of Electrical and Computer Engineering University of Texas Austin TX United States Service Computing Technologies and System Lab./Cluster and Grid Computing Lab. HUST Wuhan China Department of Electrical and Computer Engineering Wayne State University MI United States
Recently, graphics processing units (GPUs) have opened up new opportunities for speeding up general-purpose parallel applications due to their massive computational power and up to hundreds of thousands of threads ena... 详细信息
来源: 评论
Cross-Language Binary-Source Code Matching with Intermediate Representations
arXiv
收藏 引用
arXiv 2022年
作者: Gui, Yi Wan, Yao Zhang, Hongyu Huang, Huifang Sui, Yulei Xu, Guandong Shao, Zhiyuan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Newcastle Australia School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan China School of Computer Science University of Technology Sydney Australia
Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment. Currently, several approaches ha... 详细信息
来源: 评论
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Yueming Wu Xiaodi Li Deqing Zou Wei Yang Xin Zhang Hai Jin Cluster and Grid Computing Lab Services Computing Technology and System Lab National Engineering Research Center for Big Data Technology and System School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Texas at Dallas Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use either syntax-based features which can be evaded by transformation attacks or semantic-based features which ... 详细信息
来源: 评论
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection
arXiv
收藏 引用
arXiv 2022年
作者: Wan, Wei Hu, Shengshan Lu, Jianrong Yu Zhang, Leo Jin, Hai He, Yuanyuan School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab School of Information Technology Deakin University Australia
Federated learning (FL) enables multiple clients to collaboratively train an accurate global model while protecting clients’ data privacy. However, FL is susceptible to Byzantine attacks from malicious participants. ... 详细信息
来源: 评论
Hardware-Based Address-Centric Acceleration of Key-Value Store
Hardware-Based Address-Centric Acceleration of Key-Value Sto...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Chencheng Ye Yuanchao Xu Xipeng Shen Xiaofei Liao Hai Jin Yan Solihin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China North Carolina State University Raleigh North Carolina USA Computer Science University of Central Florida Florida USA
Efficiently retrieving data is essential for key-value store applications. A major part of the retrieving time is on data addressing, that is, finding the location of the value in memory that corresponds to a key. Thi... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论