咨询与建议

限定检索结果

文献类型

  • 389 篇 会议
  • 159 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 555 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 348 篇 工学
    • 311 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 60 篇 信息与通信工程
    • 34 篇 生物工程
    • 26 篇 电气工程
    • 25 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
  • 118 篇 理学
    • 62 篇 数学
    • 37 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 11 篇 统计学(可授理学、...
    • 10 篇 物理学
  • 114 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 43 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 38 篇 grid computing
  • 24 篇 computational mo...
  • 18 篇 bandwidth
  • 18 篇 servers
  • 17 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 13 篇 computer science
  • 13 篇 memory managemen...
  • 13 篇 semantics
  • 12 篇 virtualization
  • 11 篇 feature extracti...
  • 11 篇 virtual machinin...
  • 10 篇 operating system...
  • 10 篇 deep neural netw...
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 peer to peer com...
  • 9 篇 throughput
  • 9 篇 resource managem...

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 55 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 cluster and grid...
  • 28 篇 national enginee...
  • 28 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 huazhong univers...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 15 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 238 篇 hai jin
  • 237 篇 jin hai
  • 56 篇 xiaofei liao
  • 50 篇 liao xiaofei
  • 38 篇 deqing zou
  • 32 篇 zou deqing
  • 28 篇 song wu
  • 25 篇 wu song
  • 22 篇 haikun liu
  • 22 篇 shi xuanhua
  • 19 篇 hu shengshan
  • 17 篇 long zheng
  • 16 篇 yu zhang
  • 15 篇 ran zheng
  • 15 篇 xuanhua shi
  • 14 篇 jiang xiao
  • 14 篇 liu haikun
  • 13 篇 wan yao
  • 13 篇 zhang leo yu
  • 13 篇 jiang wenbin

语言

  • 528 篇 英文
  • 22 篇 其他
  • 6 篇 中文
检索条件"机构=Cluster and Grid Computing Lab"
555 条 记 录,以下是221-230 订阅
排序:
Vflh: A Following-the-Leader-History Based Algorithm for Adaptive Online Convex Optimization with Stochastic Constraints
SSRN
收藏 引用
SSRN 2022年
作者: Yang, Yifan Chen, Lin Zhou, Pan Ding, Xiaofeng Department of Computer Science University of California Santa BarbaraCA93106 United States National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430072 China
This paper considers online convex optimization (OCO) with generated i.i.d. stochastic constraints, where the distribution of environment is changing and the performance is measured by \textit{adaptive regret}. The st... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Yao He, Yang Bi, Zhangqian Zhang, Jianguo Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai Yu, Philip S. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Simon Fraser University Vancouver Canada School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Salesforce Research United States Chongqing University China University of New South Wales Australia University of Technology Sydney Australia University of Illinois at Chicago Chicago United States
Code intelligence leverages machine learning techniques to extract knowledge from extensive code corpora, with the aim of developing intelligent tools to improve the quality and productivity of computer programming. C... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
EdgeDis: Enabling Fast, Economical, and Reliable Data Dissemination for Mobile Edge computing
arXiv
收藏 引用
arXiv 2023年
作者: Li, Bo He, Qiang Chen, Feifei Lyu, Lingjuan Bouguettaya, Athman Yang, Yun The College of Arts Business Law Education and Information Technology Victoria University MelbourneVIC3122 Australia The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China The Department of Computing Technologies Swinburne University of Technology MelbourneVIC3122 Australia The School of Information Technology Deakin University Geelong Australia SONY AI Inc. Tokyo108-0075 Japan The School of Computer Science University of Sydney CamperdownNSW2006 Australia
Mobile edge computing (MEC) enables web data caching in close geographic proximity to end users. Popular data can be cached on edge servers located less than hundreds of meters away from end users. This ensures bounde... 详细信息
来源: 评论
Container-Based Customization Approach for Mobile Environments on Clouds  13th
Container-Based Customization Approach for Mobile Environmen...
收藏 引用
13th International Conference on Green, Pervasive, and Cloud computing, GPC 2018
作者: Hu, Jiahuan Wu, Song Jin, Hai Chen, Hanhua Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Recently, mobile cloud which utilizes the elastic resources of clouds to provide services for mobile applications, is becoming more and more popular. When building a mobile cloud platform (MCP), one of the most import... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论