咨询与建议

限定检索结果

文献类型

  • 116 篇 会议
  • 43 篇 期刊文献

馆藏范围

  • 159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 116 篇 计算机科学与技术...
    • 96 篇 软件工程
    • 20 篇 信息与通信工程
    • 16 篇 生物工程
    • 12 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 轻工技术与工程
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
  • 54 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 45 篇 理学
    • 20 篇 生物学
    • 17 篇 数学
    • 7 篇 系统科学
    • 4 篇 物理学
    • 3 篇 化学
    • 2 篇 统计学(可授理学、...
  • 8 篇 法学
    • 6 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 7 篇 distributed comp...
  • 6 篇 deep neural netw...
  • 6 篇 grid computing
  • 4 篇 machine learning
  • 4 篇 virtualization
  • 4 篇 web services
  • 3 篇 scalability
  • 3 篇 computer archite...
  • 3 篇 containers
  • 3 篇 security of data
  • 3 篇 mapreduce
  • 3 篇 computational mo...
  • 3 篇 feature extracti...
  • 3 篇 peer to peer net...
  • 3 篇 open source soft...
  • 2 篇 runtime
  • 2 篇 deep learning
  • 2 篇 graphics process...
  • 2 篇 efficiency
  • 2 篇 resource managem...

机构

  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 cluster and grid...
  • 24 篇 cluster and grid...
  • 23 篇 hubei key labora...
  • 23 篇 national enginee...
  • 22 篇 hubei engineerin...
  • 21 篇 services computi...
  • 14 篇 school of softwa...
  • 13 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 cluster and grid...
  • 7 篇 huazhong univers...
  • 7 篇 services computi...
  • 7 篇 jinyinhu laborat...
  • 5 篇 national enginee...
  • 4 篇 services computi...
  • 4 篇 jin yinhu labora...
  • 4 篇 school of comput...
  • 4 篇 nanyang technolo...

作者

  • 90 篇 jin hai
  • 39 篇 hai jin
  • 17 篇 hu shengshan
  • 14 篇 zou deqing
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 shi xuanhua
  • 10 篇 liao xiaofei
  • 10 篇 wu song
  • 8 篇 deqing zou
  • 7 篇 wan wei
  • 7 篇 wang xianlong
  • 6 篇 zhang qin
  • 5 篇 yao dezhong
  • 5 篇 weizhong qiang
  • 5 篇 qiang weizhong
  • 5 篇 song wu
  • 5 篇 zhang hangtao
  • 5 篇 shengshan hu

语言

  • 156 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Cluster and Grid Computing Key Lab."
159 条 记 录,以下是121-130 订阅
排序:
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
EdgeDis: Enabling Fast, Economical, and Reliable Data Dissemination for Mobile Edge computing
arXiv
收藏 引用
arXiv 2023年
作者: Li, Bo He, Qiang Chen, Feifei Lyu, Lingjuan Bouguettaya, Athman Yang, Yun The College of Arts Business Law Education and Information Technology Victoria University MelbourneVIC3122 Australia The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China The Department of Computing Technologies Swinburne University of Technology MelbourneVIC3122 Australia The School of Information Technology Deakin University Geelong Australia SONY AI Inc. Tokyo108-0075 Japan The School of Computer Science University of Sydney CamperdownNSW2006 Australia
Mobile edge computing (MEC) enables web data caching in close geographic proximity to end users. Popular data can be cached on edge servers located less than hundreds of meters away from end users. This ensures bounde... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论