咨询与建议

限定检索结果

文献类型

  • 277 篇 会议
  • 134 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 418 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 244 篇 工学
    • 218 篇 计算机科学与技术...
    • 153 篇 软件工程
    • 40 篇 信息与通信工程
    • 29 篇 生物工程
    • 20 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 17 篇 控制科学与工程
    • 15 篇 网络空间安全
    • 11 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 8 篇 交通运输工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 建筑学
  • 89 篇 理学
    • 47 篇 数学
    • 31 篇 生物学
    • 13 篇 系统科学
    • 10 篇 化学
    • 9 篇 统计学(可授理学、...
    • 7 篇 物理学
  • 69 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 5 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 4 篇 医学
  • 2 篇 农学
  • 1 篇 军事学

主题

  • 21 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 14 篇 bandwidth
  • 13 篇 cloud computing
  • 12 篇 semantics
  • 11 篇 servers
  • 10 篇 deep neural netw...
  • 10 篇 computer archite...
  • 10 篇 feature extracti...
  • 10 篇 data models
  • 9 篇 computer science
  • 9 篇 operating system...
  • 9 篇 memory managemen...
  • 9 篇 virtual machinin...
  • 9 篇 training
  • 8 篇 throughput
  • 8 篇 software enginee...
  • 8 篇 machine learning
  • 8 篇 virtualization

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 53 篇 school of comput...
  • 44 篇 school of cyber ...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 15 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 9 篇 school of comput...
  • 8 篇 cluster and grid...
  • 8 篇 jinyinhu laborat...

作者

  • 184 篇 hai jin
  • 165 篇 jin hai
  • 42 篇 xiaofei liao
  • 31 篇 deqing zou
  • 31 篇 liao xiaofei
  • 23 篇 zou deqing
  • 20 篇 song wu
  • 19 篇 hu shengshan
  • 18 篇 haikun liu
  • 18 篇 shi xuanhua
  • 17 篇 wu song
  • 14 篇 jiang xiao
  • 13 篇 zhang leo yu
  • 13 篇 yu zhang
  • 13 篇 ran zheng
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui
  • 11 篇 xia xie
  • 11 篇 zhang hongyu

语言

  • 396 篇 英文
  • 17 篇 其他
  • 6 篇 中文
检索条件"机构=Cluster and Grid Computing Lab Services"
418 条 记 录,以下是161-170 订阅
排序:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
FlashWalker: An In-Storage Accelerator for Graph Random Walks
FlashWalker: An In-Storage Accelerator for Graph Random Walk...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Fuping Niu Jianhui Yue Jiangqiu Shen Xiaofei Liao Haikun Liu Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science Michigan Technological University Houghton Michigan USA
Graph random walk is widely used in the graph processing as it is a fundamental component in graph analysis, ranging from vertices ranking to the graph embedding. Different from traditional graph processing workload, ... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Optimal margin distribution machine for multi-instance learning  29
Optimal margin distribution machine for multi-instance learn...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Zhang, Teng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Multi-instance learning (MIL) is a celebrated learning framework where each example is represented as a bag of instances. An example is negative if it has no positive instances, and vice versa if at least one positive... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
A Hybrid Memory Architecture Supporting Fine-Grained Data Migration
SSRN
收藏 引用
SSRN 2022年
作者: Chi, Ye Yue, Jianhui Liao, Xiaofei Liu, Haikun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Computer Science Michigan Technological University HoughtonMI United States
We propose Mocha, a non-hierarchical caching architecture that organizes DRAM and NVM in a flat address space physically, but manages DRAM/NVM in a cache/memory hierarchy in this paper. Since the commercial NVM device... 详细信息
来源: 评论
ReSQM: Accelerating Database Operations Using ReRAM-Based Content Addressable Memory
ReSQM: Accelerating Database Operations Using ReRAM-Based Co...
收藏 引用
作者: Li, Huize Jin, Hai Zheng, Long Liao, Xiaofei National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The huge amount of data enforces great pressure on the processing efficiency of database systems. By leveraging the in-situ computing ability of emerging nonvolatile memory, processing-in-memory (PIM) technology shows... 详细信息
来源: 评论