咨询与建议

限定检索结果

文献类型

  • 31 篇 期刊文献
  • 28 篇 会议

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36 篇 工学
    • 31 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 9 篇 生物工程
    • 7 篇 信息与通信工程
    • 6 篇 网络空间安全
    • 5 篇 控制科学与工程
    • 4 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 14 篇 理学
    • 9 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 4 篇 法学
    • 4 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 5 篇 deep neural netw...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 open source soft...
  • 2 篇 scalability
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 查询处理
  • 2 篇 computational mo...
  • 2 篇 codes
  • 2 篇 detectors
  • 2 篇 training
  • 2 篇 adaptation model...
  • 1 篇 ciphertext
  • 1 篇 software systems
  • 1 篇 object detection
  • 1 篇 fault diagnosis
  • 1 篇 http
  • 1 篇 sensitivity
  • 1 篇 evasion detectio...

机构

  • 35 篇 school of cyber ...
  • 32 篇 school of comput...
  • 24 篇 national enginee...
  • 24 篇 cluster and grid...
  • 23 篇 hubei key labora...
  • 23 篇 hubei engineerin...
  • 22 篇 services computi...
  • 15 篇 school of softwa...
  • 14 篇 school of inform...
  • 7 篇 jinyinhu laborat...
  • 6 篇 huazhong univers...
  • 5 篇 national enginee...
  • 5 篇 national enginee...
  • 4 篇 jin yinhu labora...
  • 4 篇 school of comput...
  • 4 篇 nanyang technolo...
  • 4 篇 national enginee...
  • 4 篇 school of cyber ...
  • 3 篇 institute for ne...
  • 3 篇 key laboratory o...

作者

  • 31 篇 jin hai
  • 19 篇 hai jin
  • 16 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 7 篇 zou deqing
  • 7 篇 wan wei
  • 7 篇 deqing zou
  • 7 篇 wang xianlong
  • 5 篇 zhang hangtao
  • 5 篇 shengshan hu
  • 5 篇 zhang yechao
  • 4 篇 yao dezhong
  • 4 篇 leo yu zhang
  • 4 篇 minghui li
  • 4 篇 liu wei
  • 4 篇 ming wen
  • 4 篇 xu peng
  • 3 篇 yueming wu

语言

  • 51 篇 英文
  • 7 篇 中文
  • 1 篇 其他
检索条件"机构=Cluster and Grid Computing Key Laboratory of Hubei Province"
59 条 记 录,以下是1-10 订阅
排序:
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
SSEM: Secure, Scalable and Efficient Multi-Owner Data Sharing in Clouds
收藏 引用
China Communications 2016年 第8期13卷 231-243页
作者: Shungan Zhou Ruiying Du Jing Chen Hua Deng Jian Shen Huanguo Zhang The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School of Wuhan University Wuhan 430072 Hubei Province China State Grid Information and Communication Company of Hunan Electric Power Corp Changsha 410000 Hunan Province China
Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented... 详细信息
来源: 评论
Automatic power-aware reconfiguration of processor resource in virtualized clusters
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第7期48卷 1123-1133页
作者: Jin, Hai Deng, Li Wu, Song Shi, Xuanhua Zhou, Like Key Laboratory of Services Computing Technology and System Huazhong University of Science and Technology Ministry of Education Wuhan 430074 China Key Laboratory of Cluster and Grid Computing of Hubei Province Huazhong University of Science and Technology Wuhan 430074 China
Virtualization provides significant benefits of system maintenance, load balancing, fault tolerance, and power-saving in clusters or data centers. It also enables dynamic reconfiguration of computing resource for appl... 详细信息
来源: 评论
Virtual machine VCPU scheduling in the multi-core environment: Issues and challenges
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第7期48卷 1216-1224页
作者: Jin, Hai Zhong, Alin Wu, Song Shi, Xuanhua Key Laboratory of Services Computing Technology and System Huazhong University of Science and Technology Ministry of Education Wuhan 430074 China Key Laboratory of Cluster and Grid Computing of Hubei Province Huazhong University of Science and Technology Wuhan 430074 China
The policies and mechanisms of VCPU (virtual CPU) scheduling in a virtual machine system are key factors to determine the system performance. Because the architecture of the software stack in the virtual machine syste... 详细信息
来源: 评论
MR-COF: A genetic MapReduce configuration optimization framework  15th
MR-COF: A genetic MapReduce configuration optimization frame...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Liu, Chao Zeng, Deze Yao, Hong Hu, Chengyu Yan, Xuesong Fan, Yuanyuan Hubei Key Laboratory of Intelligent Geo-Information Processing China University of Geosciences Wuhan430074 China China Services Computing Technology and System Lab and Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Hadoop/MapReduce has emerged as a de facto programming framework to explore cloud-computing resources. Hadoop has many configuration parameters, some of which are crucial to the performance of MapReduce jobs. In pract... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论