咨询与建议

限定检索结果

文献类型

  • 482 篇 会议
  • 184 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 673 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 345 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 生物工程
    • 28 篇 控制科学与工程
    • 27 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 土木工程
  • 126 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 125 篇 理学
    • 67 篇 数学
    • 39 篇 生物学
    • 21 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 19 篇 法学
    • 12 篇 社会学
    • 7 篇 法学
  • 11 篇 经济学
    • 10 篇 应用经济学
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 4 篇 文学
  • 4 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 33 篇 virtual machinin...
  • 30 篇 servers
  • 27 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 25 篇 bandwidth
  • 23 篇 cloud computing
  • 22 篇 scalability
  • 22 篇 computer archite...
  • 20 篇 resource managem...
  • 20 篇 computers
  • 19 篇 kernel
  • 19 篇 hardware
  • 18 篇 protocols
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 15 篇 memory managemen...
  • 15 篇 costs
  • 15 篇 semantics

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 45 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 zhejiang lab
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...

作者

  • 332 篇 hai jin
  • 240 篇 jin hai
  • 83 篇 xiaofei liao
  • 55 篇 deqing zou
  • 51 篇 liao xiaofei
  • 40 篇 song wu
  • 32 篇 zou deqing
  • 27 篇 shi xuanhua
  • 27 篇 wu song
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 25 篇 xuanhua shi
  • 22 篇 ran zheng
  • 19 篇 qin zhang
  • 19 篇 hu shengshan
  • 17 篇 xia xie
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 638 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Cluster and Grid Computing Lab Services Computing Technology"
673 条 记 录,以下是621-630 订阅
排序:
MR-COF:A Genetic MapReduce Configuration Optimization Framework
MR-COF:A Genetic MapReduce Configuration Optimization Framew...
收藏 引用
The 7th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP2015(2015年第七届国际并行体系结构,算法和编程研讨会)
作者: Chao Liu Deze Zeng Hong Yao Chengyu Hu Xuesong Yan Yuanyuan Fan China Services Computing Technology and System Lab and Cluster and GridComputing Lab Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Intelligent Geo-Information Processing China University of GeosciencesWuhan 430074China
Hadoop/MapReduce has emerged as a de facto programming framework to explore cloud-computing *** has many configuration parameters,some of which are crucial to the performance of MapReduce *** practice,these parameters... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
VulCNN: An Image-inspired Scalable Vulnerability Detection System
VulCNN: An Image-inspired Scalable Vulnerability Detection S...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Yueming Wu Deqing Zou Shihan Dou Wei Yang Duo Xu Hai Jin Huazhong University of Science and Technology China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering HUST Wuhan China Services Computing Technology and System Lab National Engineering Research Center for Big Data Technology and System HUST Wuhan China Fudan University China University of Texas at Dallas United States Cluster and Grid Computing Lab School of Computer Science and Technology HUST Wuhan China
Since deep learning (DL) can automatically learn features from source code, it has been widely used to detect source code vulnerability. To achieve scalable vulnerability scanning, some prior studies intend to process... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论