咨询与建议

限定检索结果

文献类型

  • 376 篇 会议
  • 221 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 604 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 320 篇 工学
    • 263 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 50 篇 信息与通信工程
    • 32 篇 生物工程
    • 24 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 23 篇 控制科学与工程
    • 23 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 12 篇 光学工程
    • 12 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 7 篇 交通运输工程
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 144 篇 理学
    • 54 篇 数学
    • 53 篇 物理学
    • 35 篇 生物学
    • 12 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 化学
  • 85 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 26 篇 工商管理
    • 20 篇 图书情报与档案管...
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 文学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 49 篇 grid computing
  • 34 篇 virtual machinin...
  • 28 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 23 篇 resource managem...
  • 22 篇 servers
  • 21 篇 peer to peer com...
  • 20 篇 protocols
  • 19 篇 hardware
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 kernel
  • 14 篇 application soft...
  • 12 篇 benchmark testin...
  • 11 篇 access control
  • 11 篇 memory managemen...

机构

  • 100 篇 national enginee...
  • 64 篇 services computi...
  • 56 篇 school of comput...
  • 46 篇 services computi...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...
  • 38 篇 tomsk state univ...

作者

  • 243 篇 hai jin
  • 163 篇 jin hai
  • 57 篇 xiaofei liao
  • 34 篇 m. klein
  • 34 篇 deqing zou
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 r. ströhmer

语言

  • 572 篇 英文
  • 21 篇 其他
  • 12 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer Science and Technology"
604 条 记 录,以下是501-510 订阅
排序:
OCDB: REVISITING CAUSAL DISCOVERY WITH A COMPREHENSIVE BENCHMARK AND EVALUATION FRAMEWORK
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Wei Huang, Hong Zhang, Guowen Shi, Ruize Yin, Kehan Lin, Yuanyuan Liu, Bang Huazhong University of Science and Technology China DIRO Université de Montréal & Mila Canada CIFAR AI Chair Canada The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Large language models (LLMs) have excelled in various natural language processing tasks, but challenges in interpretability and trustworthiness persist, limiting their use in high-stakes fields. Causal discovery offer... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
Cache based feedback grid scheduling approach
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2006年 第11期17卷 2314-2323页
作者: Yuan, Ping-Peng Cao, Wen-Zhi Kuang, Ping Service Computing Technology and System Key Laboratory Wuhan 430074 China Cluster and Grid Computing Key Laboratory of Hubei Province Wuhan 430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
grid scheduling which aims at improving resource utilization and grid application performance is a key concern in grid. Currently, much research can be found about grid scheduling and some algorithms on it were propos... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhou, Ziqi Zhang, Yechao Zhang, Leo Yu Zheng, Yifeng He, Yuanyuan Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Information Technology Deakin University VIC3216 Australia School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security HUST Wuhan430074 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Due to its powerful feature learning capability and high efficiency, deep hashing has achieved great success in large-scale image retrieval. Meanwhile, extensive works have demonstrated that deep neural networks (DNNs... 详细信息
来源: 评论