咨询与建议

限定检索结果

文献类型

  • 33 篇 会议
  • 30 篇 期刊文献

馆藏范围

  • 63 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 33 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 9 篇 生物工程
    • 8 篇 控制科学与工程
    • 7 篇 信息与通信工程
    • 6 篇 网络空间安全
    • 3 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 15 篇 理学
    • 9 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 4 篇 法学
    • 4 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 6 篇 deep neural netw...
  • 4 篇 deep learning
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 open source soft...
  • 2 篇 scalability
  • 2 篇 access control
  • 2 篇 查询处理
  • 2 篇 computational mo...
  • 2 篇 codes
  • 2 篇 detectors
  • 2 篇 training
  • 2 篇 adaptation model...
  • 1 篇 software systems
  • 1 篇 object detection
  • 1 篇 fault diagnosis
  • 1 篇 http
  • 1 篇 sensitivity
  • 1 篇 evasion detectio...
  • 1 篇 bamboo

机构

  • 39 篇 school of cyber ...
  • 34 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 cluster and grid...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 hubei engineerin...
  • 18 篇 school of softwa...
  • 16 篇 school of inform...
  • 8 篇 jinyinhu laborat...
  • 6 篇 huazhong univers...
  • 5 篇 national enginee...
  • 5 篇 national enginee...
  • 4 篇 jin yinhu labora...
  • 4 篇 school of comput...
  • 4 篇 nanyang technolo...
  • 4 篇 national enginee...
  • 4 篇 school of cyber ...
  • 3 篇 hubei engineerin...
  • 3 篇 institute for ne...

作者

  • 32 篇 jin hai
  • 19 篇 hai jin
  • 18 篇 hu shengshan
  • 13 篇 zhang leo yu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 9 篇 wan wei
  • 7 篇 zou deqing
  • 7 篇 deqing zou
  • 7 篇 shengshan hu
  • 7 篇 wang xianlong
  • 6 篇 minghui li
  • 6 篇 zhang hangtao
  • 5 篇 yao dezhong
  • 5 篇 leo yu zhang
  • 5 篇 zhang yechao
  • 4 篇 song yufei
  • 4 篇 liu wei
  • 4 篇 ming wen
  • 4 篇 wang yichen

语言

  • 48 篇 英文
  • 8 篇 其他
  • 7 篇 中文
检索条件"机构=Cluster and Grid Computing Key Laboratory of Hubei Province"
63 条 记 录,以下是51-60 订阅
排序:
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Non-invasive biopsy diagnosis of diabetic kidney disease via deep learning applied to retinal images: a population-based study
收藏 引用
The Lancet Digital Health 2025年 第5期7卷 100868页
作者: Meng, Ziyao Guan, Zhouyu Yu, Shujie Wu, Yilan Zhao, Yaoning Shen, Jie Lim, Cynthia Ciwei Chen, Tingli Yang, Dawei Ran, An Ran He, Feng Hamzah, Haslina Singh, Sarkaaj Abd Raof, Anis Syazwani Lee-Boey, Jian Wen Samuel Lim, Soo-Kun Sun, Xufang Ge, Shuwang Xu, Gang Su, Hua Cheng, Yang Lu, Feng Liao, Xiaofei Jin, Hai Deng, Chenxin Ruan, Lei Zhang, Cuntai Wu, Chan Dai, Rongping Jin, Yixiao Wang, Wenxiao Li, Tingyao Liu, Ruhan Li, Jiajia Shu, Jia Lu, Yuwei Wang, Xiangning Wu, Qiang Qin, Yiming Tang, Jin Sheng, Xiaohua Jiao, Qiong Yang, Xiaokang Guo, Minyi McKay, Gareth J Hogg, Ruth E Liew, Gerald Chee, Evelyn Yi Lyn Hsu, Wynne Lee, Mong Li Szeto, Simon Luk, Andrea O Y Chan, Juliana C N Cheung, Carol Y Tan, Gavin Siew Wei Tham, Yih-Chung Cheng, Ching-Yu Sabanayagam, Charumathi Lim, Lee-Ling Jia, Weiping Li, Huating Sheng, Bin Wong, Tien Yin Shanghai Belt and Road International Joint Laboratory of Intelligent Prevention and Treatment for Metabolic Diseases Department of Computer Science and Engineering School of Electronic Information and Electrical Engineering Institute for Proactive Healthcare Shanghai Jiao Tong University Department of Endocrinology and Metabolism Shanghai Sixth People's Hospital Affiliated to Shanghai Jiao Tong University School of Medicine Shanghai Diabetes Institute Shanghai Clinical Centre for Diabetes Shanghai Key Laboratory of Diabetes Mellitus Shanghai China MOE Key Laboratory of AI School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Beijing Tsinghua Changgung Hospital Eye Center School of Clinical Medicine Tsinghua Medicine Tsinghua University Beijing China Medical Records and Statistics Office Shanghai Sixth People's Hospital Affiliated to Shanghai Jiao Tong University School of Medicine Shanghai China Department of Renal Medicine Singapore General Hospital SingHealth-Duke Academic Medical Centre Singapore Singapore Department of Ophthalmology Shanghai Health and Medical Center Wuxi China Department of Ophthalmology and Visual Sciences The Chinese University of Hong Kong Hong Kong Special Administrative Region China Singapore Eye Research Institute Singapore National Eye Centre Singapore Department of Medicine Faculty of Medicine Universiti Malaya Kuala Lumpur Malaysia Department of Ophthalmology Tongji Hospital Tongji Medical College Huazhong University of Science and Technology Hubei Wuhan China Department of Nephrology Tongji Hospital Tongji Medical College Huazhong University of Science and Technology Wuhan China Department of Nephrology Union Hospital Tongji Medical College Huazhong University of Science and Technology Wuhan China Department of Ophthalmology Union Hospital Tongji Medical College Huazhong University of Science and Technology Wuhan China National Engineering Research Centre for Big Dat
Background: Improving the accessibility of screening diabetic kidney disease (DKD) and differentiating isolated diabetic nephropathy from non-diabetic kidney disease (NDKD) are two major challenges in the field of dia... 详细信息
来源: 评论
SSEM: Secure, Scalable and Efficient Multi-Owner Data Sharing in Clouds
收藏 引用
China Communications 2016年 第8期13卷 231-243页
作者: Shungan Zhou Ruiying Du Jing Chen Hua Deng Jian Shen Huanguo Zhang The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School of Wuhan University Wuhan 430072 Hubei Province China State Grid Information and Communication Company of Hunan Electric Power Corp Changsha 410000 Hunan Province China
Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented... 详细信息
来源: 评论
MR-COF: A genetic MapReduce configuration optimization framework  15th
MR-COF: A genetic MapReduce configuration optimization frame...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Liu, Chao Zeng, Deze Yao, Hong Hu, Chengyu Yan, Xuesong Fan, Yuanyuan Hubei Key Laboratory of Intelligent Geo-Information Processing China University of Geosciences Wuhan430074 China China Services Computing Technology and System Lab and Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Hadoop/MapReduce has emerged as a de facto programming framework to explore cloud-computing resources. Hadoop has many configuration parameters, some of which are crucial to the performance of MapReduce jobs. In pract... 详细信息
来源: 评论
Automatic power-aware reconfiguration of processor resource in virtualized clusters
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第7期48卷 1123-1133页
作者: Jin, Hai Deng, Li Wu, Song Shi, Xuanhua Zhou, Like Key Laboratory of Services Computing Technology and System Huazhong University of Science and Technology Ministry of Education Wuhan 430074 China Key Laboratory of Cluster and Grid Computing of Hubei Province Huazhong University of Science and Technology Wuhan 430074 China
Virtualization provides significant benefits of system maintenance, load balancing, fault tolerance, and power-saving in clusters or data centers. It also enables dynamic reconfiguration of computing resource for appl... 详细信息
来源: 评论
Virtual machine VCPU scheduling in the multi-core environment: Issues and challenges
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第7期48卷 1216-1224页
作者: Jin, Hai Zhong, Alin Wu, Song Shi, Xuanhua Key Laboratory of Services Computing Technology and System Huazhong University of Science and Technology Ministry of Education Wuhan 430074 China Key Laboratory of Cluster and Grid Computing of Hubei Province Huazhong University of Science and Technology Wuhan 430074 China
The policies and mechanisms of VCPU (virtual CPU) scheduling in a virtual machine system are key factors to determine the system performance. Because the architecture of the software stack in the virtual machine syste... 详细信息
来源: 评论
高可扩展的RDF数据存储系统
高可扩展的RDF数据存储系统
收藏 引用
第29届中国数据库学术会议
作者: Yuan Pingpeng 袁平鹏 Liu Pu 刘谱 Zhang Wenya 张文娅 Wu Buwen 吴步文 Key Laboratory of Services Computing Technology and System(Huazhong University of Science and Technology) Ministry of Education Wuhan 430074 服务计算技术与系统教育部重点实验室(华中科技大学) 武汉430074 Key Laboratory of Cluster and Grid Computing of Hubei Province(Huazhong University of Science and Technology)Wuhan 430074 集群与网格计算湖北省重点实验室(华中科技大学) 武汉430074 School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 华中科技大学计算机科学与技术学院 武汉430074
由于资源描述框架(resource description framework,RDF)具有表达灵活、简洁等优点,已被接受为表达元数据及万维网上数据互联的规范.近年来,其数据量在以飞快的速度增长.相应地,要求存储RDF数据的系统应具有高扩展性.介绍了一个高可扩展... 详细信息
来源: 评论