咨询与建议

限定检索结果

文献类型

  • 378 篇 会议
  • 223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 324 篇 工学
    • 266 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 54 篇 信息与通信工程
    • 32 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 26 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 12 篇 光学工程
    • 12 篇 核科学与技术
    • 11 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 9 篇 安全科学与工程
    • 6 篇 仪器科学与技术
  • 148 篇 理学
    • 58 篇 数学
    • 53 篇 物理学
    • 35 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 10 篇 化学
  • 88 篇 管理学
    • 72 篇 管理科学与工程(可...
    • 25 篇 工商管理
    • 24 篇 图书情报与档案管...
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 文学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 49 篇 grid computing
  • 34 篇 virtual machinin...
  • 28 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 23 篇 resource managem...
  • 22 篇 servers
  • 21 篇 peer to peer com...
  • 20 篇 protocols
  • 19 篇 hardware
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 kernel
  • 14 篇 application soft...
  • 12 篇 benchmark testin...
  • 11 篇 access control
  • 11 篇 memory managemen...

机构

  • 102 篇 national enginee...
  • 64 篇 services computi...
  • 56 篇 school of comput...
  • 46 篇 services computi...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...
  • 38 篇 tomsk state univ...

作者

  • 249 篇 hai jin
  • 167 篇 jin hai
  • 57 篇 xiaofei liao
  • 34 篇 m. klein
  • 34 篇 deqing zou
  • 34 篇 liao xiaofei
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig

语言

  • 574 篇 英文
  • 23 篇 其他
  • 12 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer Science and Technology"
608 条 记 录,以下是481-490 订阅
排序:
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Vflh: A Following-the-Leader-History Based Algorithm for Adaptive Online Convex Optimization with Stochastic Constraints
SSRN
收藏 引用
SSRN 2022年
作者: Yang, Yifan Chen, Lin Zhou, Pan Ding, Xiaofeng Department of Computer Science University of California Santa BarbaraCA93106 United States National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430072 China
This paper considers online convex optimization (OCO) with generated i.i.d. stochastic constraints, where the distribution of environment is changing and the performance is measured by \textit{adaptive regret}. The st... 详细信息
来源: 评论
Clairvoyance: Intelligent route planning for electric buses based on urban big data
arXiv
收藏 引用
arXiv 2021年
作者: Lu, Xiangyong Ota, Kaoru Dong, Mianxiong Yu, Chen Jin, Hai Graduate School of Information Sciences Tohoku University Sendai Japan Serviecs Computing Technology and System Lab Big Data Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Information and Electronic Engineering Muroran Institute of Technology Hokkaido Muroran Japan
Nowadays many cities around the world have introduced electric buses to optimize urban traffic and reduce the local carbon emissions. In order to cut the carbon emissions and maximize the utility of electric buses, it... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Shared Incentive System for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-Encryption
Diabetes Mellitus Type 2 Data Sharing System Based on Blockc...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Zhenhui Lu Xia Xie Duoqiang Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
Medical data sharing can improve the quality of medical care and promote progress in the field of public health. However, medical data has high confidentiality and complexity. Taking the clinical diagnosis and treatme... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Sledge: Towards Efficient Live Migration of Docker Containers
Sledge: Towards Efficient Live Migration of Docker Container...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Bo Xu Song Wu Jiang Xiao Hai Jin Yingxi Zhang Guoqiang Shi Tingyu Lin Jia Rao Li Yi Jizhong Jiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Intelligent Manufacturing System Technology Beijing China The University of Texas at Arlington Arlington TX USA Alibaba Cloud Computing Co. Ltd. Hangzhou China
Modern large-scale cloud platforms require live migration technique on Docker containers with stateful workload to support load balancing, host maintenance, and Quality of Service (QoS) improvement. Efficient and scal... 详细信息
来源: 评论
From General to Specific: Tailoring Large Language Models for Personalized Healthcare
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Ruize Huang, Hong Zhou, Wei Yin, Kehan Zhao, Kai Zhao, Yun Huazhong University of Science and Technology Wuhan China Tongji Medical College China Hubei Maternity and Child Health Care Hospital China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The rapid development of large language models (LLMs) has transformed many industries, including healthcare. However, previous medical LLMs have largely focused on leveraging general medical knowledge to provide respo... 详细信息
来源: 评论