咨询与建议

限定检索结果

文献类型

  • 191 篇 会议
  • 67 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 260 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 93 篇 工学
    • 73 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 12 篇 信息与通信工程
    • 12 篇 生物工程
    • 9 篇 电气工程
    • 9 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 5 篇 机械工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 化学工程与技术
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 动力工程及工程热...
    • 2 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 31 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 3 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 系统科学
  • 31 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 8 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 5 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 64 篇 grid computing
  • 28 篇 peer to peer com...
  • 26 篇 virtual machinin...
  • 18 篇 resource managem...
  • 16 篇 computer science
  • 16 篇 computer archite...
  • 16 篇 bandwidth
  • 15 篇 application soft...
  • 15 篇 servers
  • 15 篇 computers
  • 14 篇 kernel
  • 14 篇 web services
  • 13 篇 monitoring
  • 13 篇 protocols
  • 13 篇 distributed comp...
  • 12 篇 scalability
  • 12 篇 virtual machine ...
  • 12 篇 hardware
  • 12 篇 cloud computing
  • 12 篇 delay

机构

  • 53 篇 services computi...
  • 47 篇 cluster and grid...
  • 40 篇 school of comput...
  • 35 篇 school of cyber ...
  • 25 篇 national enginee...
  • 25 篇 cluster and grid...
  • 23 篇 hubei key labora...
  • 23 篇 hubei engineerin...
  • 22 篇 services computi...
  • 16 篇 school of softwa...
  • 14 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 9 篇 huazhong univers...
  • 7 篇 cluster and grid...
  • 7 篇 cluster and grid...
  • 7 篇 jinyinhu laborat...
  • 6 篇 zhejiang lab
  • 5 篇 services computi...

作者

  • 171 篇 hai jin
  • 51 篇 jin hai
  • 30 篇 deqing zou
  • 26 篇 xiaofei liao
  • 25 篇 song wu
  • 16 篇 hu shengshan
  • 13 篇 xuanhua shi
  • 12 篇 qin zhang
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 ran zheng
  • 9 篇 xia xie
  • 9 篇 long zheng
  • 9 篇 金海
  • 9 篇 li qi
  • 8 篇 hanhua chen
  • 8 篇 pingpeng yuan
  • 8 篇 zou deqing
  • 7 篇 kan hu

语言

  • 243 篇 英文
  • 11 篇 中文
  • 6 篇 其他
检索条件"机构=Cluster and Grid Computing Laboratory"
260 条 记 录,以下是191-200 订阅
排序:
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer Science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Cross-links matter for link prediction: rethinking the debiased GNN from a data perspective  23
Cross-links matter for link prediction: rethinking the debia...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zihan Luo Hong Huang Jianxun Lian Xiran Song Xing Xie Hai Jin National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Microsoft Research Asia Beijing China
Recently, the bias-related issues in GNN-based link prediction have raised widely spread concerns. In this paper, we emphasize the bias on links across different node clusters, which we call cross-links, after conside...
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
A Distributed Workflow Management Approach in CGSP
A Distributed Workflow Management Approach in CGSP
收藏 引用
International Conference on grid and Cooperative computing (GCC)
作者: Haifeng Ou Xiaowu Chen Bin Cai Haijun Cao The Key Laboratory of Virtual Reality Technology Ministry of Education School of Computer Science and Engineering Beihang University Beijing China South China University of Technology Guangzhou China Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
Workflow management technologies play a very important role in constructing grid application environment by automating service composition and execution. With the fast spread of grid technology, workflow management sy... 详细信息
来源: 评论
Fed-AugMix: Balancing Privacy and Utility via Data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Haoyang Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Gradient leakage attacks pose a significant threat to the privacy guarantees of federated learning. While distortion-based protection mechanisms are commonly employed to mitigate this issue, they often lead to notable... 详细信息
来源: 评论
AFaVS: Accurate Yet Fast Version Switching for Graph Processing Systems
AFaVS: Accurate Yet Fast Version Switching for Graph Process...
收藏 引用
International Conference on Data Engineering
作者: Long Zheng Xiangyu Ye Haifeng Liu Qinggang Wang Yu Huang Chuangyi Gui Pengcheng Yao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China School of Computer Science and Engineering UNSW Sydney Australia
Multi-version graph processing has been widely used to solve many real-world problems. The process of the multi-version graph processing typically includes: (1) a history graph version switching at a specific time and...
来源: 评论
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems
Integrating Attribute and Status Constraint into the RBAC Mo...
收藏 引用
International Conference on Future Generation Communication and Networking (FGCN)
作者: Deqing Zou Jong Hyuk Park Tai-hoon Kim Xueguang Chen Cluster and Grid Computing Laboratory & Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Engineering Kyungnam University Masan Gyeongsangnam South Korea Hannam University South Korea Department of Control Science and Engineering Huazhong University of Science and Technology China
It now becomes a trend to implement the interconnections between resources as well as services in ubiquitous systems. Attribute-based authorization mechanisms, protocols and systems are gaining in popularity, such as ... 详细信息
来源: 评论
HRTC: hybrid resource information service architecture based on GMA
HRTC: hybrid resource information service architecture based...
收藏 引用
IEEE International Conference on e-Business Engineering (ICEBE)
作者: Hongbo Zou Hai Jin Zongfen Han Xuanhua Shi Hanhua Chen Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China National Key Lab of Electronic Measurement Technology The 41st Research Institute China Electronics Technology Group Corporation Qingdao China
Resource information service, as a key component of grid, is the basis of the resource allocation, resource performance evaluation and prediction. The validity of the resource information service directly influences t... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论