咨询与建议

限定检索结果

文献类型

  • 386 篇 会议
  • 159 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 552 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 348 篇 工学
    • 311 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 60 篇 信息与通信工程
    • 34 篇 生物工程
    • 26 篇 电气工程
    • 25 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
  • 118 篇 理学
    • 62 篇 数学
    • 37 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 11 篇 统计学(可授理学、...
    • 10 篇 物理学
  • 114 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 43 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 38 篇 grid computing
  • 24 篇 computational mo...
  • 18 篇 bandwidth
  • 18 篇 servers
  • 17 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 13 篇 computer science
  • 13 篇 memory managemen...
  • 13 篇 semantics
  • 12 篇 virtualization
  • 11 篇 feature extracti...
  • 11 篇 virtual machinin...
  • 10 篇 operating system...
  • 10 篇 deep neural netw...
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 peer to peer com...
  • 9 篇 throughput
  • 9 篇 resource managem...

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 55 篇 school of comput...
  • 43 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 cluster and grid...
  • 28 篇 national enginee...
  • 28 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 huazhong univers...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 17 篇 zhejiang lab
  • 16 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 237 篇 jin hai
  • 236 篇 hai jin
  • 56 篇 xiaofei liao
  • 50 篇 liao xiaofei
  • 38 篇 deqing zou
  • 32 篇 zou deqing
  • 28 篇 song wu
  • 25 篇 wu song
  • 22 篇 haikun liu
  • 22 篇 shi xuanhua
  • 19 篇 hu shengshan
  • 17 篇 long zheng
  • 16 篇 yu zhang
  • 15 篇 ran zheng
  • 15 篇 xuanhua shi
  • 14 篇 jiang xiao
  • 14 篇 liu haikun
  • 13 篇 wan yao
  • 13 篇 zhang leo yu
  • 13 篇 jiang wenbin

语言

  • 525 篇 英文
  • 22 篇 其他
  • 6 篇 中文
检索条件"机构=Cluster and Grid Computing Lab"
552 条 记 录,以下是171-180 订阅
排序:
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Network for Segmenting Pathology Lesion of the Focal Lymphocytic Sialadenitis
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Ne...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Hao Han Feng Lu Yanhan Deng Xiaofang Luo Hai Jin Wei Tu Xia Xie National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Tongji Hospital Tongji Medical College Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
In the medical realm, the pivotal role of pathological Whole Slide Images (WSIs) in detecting cancer, tracking disease progression, and evaluating treatment efficacy is indisputable. Nevertheless, the identification a...
来源: 评论
LOPO: An Out-of-order Layer Pulling Orchestration Strategy for Fast Microservice Startup
LOPO: An Out-of-order Layer Pulling Orchestration Strategy f...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Lin Gu Junhao Huang Shaoxing Huang Deze Zeng Bo Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science China University of Geosciences Wuhan China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Container based microservices have been widely applied to promote the cloud elasticity. The mainstream Docker containers are structured in layers, which are organized in stack with bottom-up dependency. To start a mic...
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
Temporal Knowledge Graph Reasoning via Time-Distributed Representation Learning
Temporal Knowledge Graph Reasoning via Time-Distributed Repr...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Kangzheng Liu Feng Zhao Guandong Xu Xianzhi Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Temporal knowledge graph (TKG) reasoning has attracted significant attention. Recent approaches for modeling historical information have led to great advances. However, the problems of time variability and unseen enti... 详细信息
来源: 评论
When the Metaverse Meets Carbon Neutrality: Ongoing Efforts and Directions
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Fangming Pei, Qiangyu Chen, Shutong Yuan, Yongjie Wang, Lin Mühlhäuser, Max Huazhong University of Science and Technology Peng Cheng Laboratory China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab The School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China VU Amsterdam Netherlands TU Darmstadt Germany The Telecooperation Lab TU Darmstadt Germany
The metaverse has recently gained increasing attention from the public. It builds up a virtual world where we can live as a new role regardless of the role we play in the physical world. However, building and operatin... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论