咨询与建议

限定检索结果

文献类型

  • 116 篇 会议
  • 42 篇 期刊文献

馆藏范围

  • 158 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 123 篇 工学
    • 115 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 20 篇 信息与通信工程
    • 16 篇 生物工程
    • 12 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 4 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 轻工技术与工程
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
  • 54 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 45 篇 理学
    • 20 篇 生物学
    • 17 篇 数学
    • 7 篇 系统科学
    • 4 篇 物理学
    • 3 篇 化学
    • 2 篇 统计学(可授理学、...
  • 8 篇 法学
    • 6 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 7 篇 distributed comp...
  • 6 篇 deep neural netw...
  • 6 篇 grid computing
  • 4 篇 machine learning
  • 4 篇 virtualization
  • 4 篇 web services
  • 3 篇 scalability
  • 3 篇 computer archite...
  • 3 篇 containers
  • 3 篇 security of data
  • 3 篇 mapreduce
  • 3 篇 computational mo...
  • 3 篇 feature extracti...
  • 3 篇 peer to peer net...
  • 3 篇 open source soft...
  • 2 篇 runtime
  • 2 篇 deep learning
  • 2 篇 graphics process...
  • 2 篇 efficiency
  • 2 篇 resource managem...

机构

  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 cluster and grid...
  • 24 篇 cluster and grid...
  • 23 篇 hubei key labora...
  • 23 篇 national enginee...
  • 22 篇 hubei engineerin...
  • 21 篇 services computi...
  • 14 篇 school of softwa...
  • 13 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 cluster and grid...
  • 7 篇 huazhong univers...
  • 7 篇 services computi...
  • 7 篇 jinyinhu laborat...
  • 5 篇 national enginee...
  • 4 篇 services computi...
  • 4 篇 jin yinhu labora...
  • 4 篇 school of comput...
  • 4 篇 nanyang technolo...

作者

  • 89 篇 jin hai
  • 37 篇 hai jin
  • 17 篇 hu shengshan
  • 14 篇 zou deqing
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 shi xuanhua
  • 10 篇 liao xiaofei
  • 10 篇 wu song
  • 8 篇 deqing zou
  • 7 篇 wan wei
  • 7 篇 wang xianlong
  • 6 篇 zhang qin
  • 5 篇 yao dezhong
  • 5 篇 qiang weizhong
  • 5 篇 song wu
  • 5 篇 zhang hangtao
  • 5 篇 shengshan hu
  • 5 篇 zhang yechao

语言

  • 155 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Cluster and Grid Computing Key Lab."
158 条 记 录,以下是101-110 订阅
排序:
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
SMOG: Accelerating Subgraph Matching on GPUs
SMOG: Accelerating Subgraph Matching on GPUs
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Zhibin Wang Ziheng Meng Xue Li Xi Lin Long Zheng Chen Tian Sheng Zhong State Key Laboratory for Novel Software Technology Nanjing University Alibaba Group“ National Engineering Research Center for Big Data Technology and System/ Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Zhejiang Lab
Subgraph matching is a crucial problem in graph theory with diverse applications in fields, such as bioinformatics, social networks and recommendation systems. Accelerating subgraph matching can be greatly facilitated...
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
Variational Bayes for Federated Continual Learning
arXiv
收藏 引用
arXiv 2024年
作者: Yao, Dezhong Li, Sanmu Dai, Yutong Xu, Zhiqiang Hu, Shengshan Zhao, Peilin Sun, Lichao The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Lehigh University PA18015 United States Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Tencent AI Lab. Shenzhen China
Federated continual learning (FCL) has received increasing attention due to its potential in handling real-world streaming data, characterized by evolving data distributions and varying client classes over time. The c... 详细信息
来源: 评论
grid information integration scheme based on virtual client access mode
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) 2007年 第SUPPL. 2期35卷 8-11页
作者: Sun, Aobing Jin, Hai Zheng, Ran Zhang, Qin Services Computing Technology and System Key Lab. College of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Cluster and Grid Computing Key Lab. College of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
VCA (virtual client access) based grid information integration strategy is proposed in this paper that brings forward one efficient application framework with loosely coupled architecture. It encapsulates the virtual ... 详细信息
来源: 评论
Continual learning via inter-task synaptic mapping
arXiv
收藏 引用
arXiv 2021年
作者: Fubing, Mao Weiwei, Weng Pratama, Mahardhika Kien Yee, Edward Yapp National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore Singapore Institute of Manufacturing Technology A*Star Singapore Singapore
Learning from streaming tasks leads a model to catastrophically erase unique experiences it absorbs from previous episodes. While regularization techniques such as LWF, SI, EWC have proven themselves as an effective a... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
HRTC: hybrid resource information service architecture based on GMA
HRTC: hybrid resource information service architecture based...
收藏 引用
IEEE International Conference on e-Business Engineering (ICEBE)
作者: Hongbo Zou Hai Jin Zongfen Han Xuanhua Shi Hanhua Chen Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China National Key Lab of Electronic Measurement Technology The 41st Research Institute China Electronics Technology Group Corporation Qingdao China
Resource information service, as a key component of grid, is the basis of the resource allocation, resource performance evaluation and prediction. The validity of the resource information service directly influences t... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Ranking Sentences in Scientific Literatures
Ranking Sentences in Scientific Literatures
收藏 引用
International Conference on Semantics, Knowledge and grid (SKG)
作者: Jiao Tian Mengyun Cao Jin Liu Xiaoping Sun Zhuge Hai University of Chinese Academy of Sciences Beijing China Knowledge Grid Group CAS Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China Wuhan University CAS Key Lab. of Intell. Inf. Process. Institute of Computing Technology Chinese Academy of Sciences Beijing CN
Sentence ranking is one of the most important research issues in text analysis. It can be used in extracted textual summarization and information retrieval. Graph-based methods are a common way of ranking and extracti... 详细信息
来源: 评论