咨询与建议

限定检索结果

文献类型

  • 459 篇 期刊文献
  • 318 篇 会议

馆藏范围

  • 777 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 494 篇 工学
    • 359 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 98 篇 生物工程
    • 76 篇 信息与通信工程
    • 69 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 50 篇 电气工程
    • 46 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 化学工程与技术
    • 18 篇 机械工程
    • 16 篇 仪器科学与技术
    • 16 篇 安全科学与工程
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 网络空间安全
  • 302 篇 理学
    • 120 篇 生物学
    • 116 篇 数学
    • 92 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 29 篇 化学
    • 18 篇 地球物理学
    • 18 篇 系统科学
  • 115 篇 管理学
    • 61 篇 图书情报与档案管...
    • 59 篇 管理科学与工程(可...
    • 20 篇 工商管理
  • 62 篇 医学
    • 54 篇 临床医学
    • 52 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 15 篇 法学
  • 11 篇 农学
  • 9 篇 经济学
  • 7 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 26 篇 deep neural netw...
  • 26 篇 machine learning
  • 23 篇 semantics
  • 21 篇 deep learning
  • 18 篇 training
  • 16 篇 computational mo...
  • 12 篇 memory managemen...
  • 11 篇 task analysis
  • 11 篇 feature extracti...
  • 10 篇 data models
  • 8 篇 scalability
  • 8 篇 generative adver...
  • 8 篇 graph neural net...
  • 8 篇 predictive model...
  • 7 篇 parallel process...
  • 7 篇 magnetic resonan...
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency

机构

  • 102 篇 national enginee...
  • 56 篇 school of comput...
  • 51 篇 school of cyber ...
  • 36 篇 national enginee...
  • 31 篇 services computi...
  • 31 篇 hubei engineerin...
  • 28 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 21 篇 hiroshima astrop...
  • 21 篇 department of ph...
  • 19 篇 school of softwa...
  • 18 篇 university of ch...
  • 17 篇 department of ph...
  • 16 篇 berkeley institu...
  • 16 篇 secure computing...
  • 16 篇 zhejiang lab
  • 15 篇 department of ph...
  • 15 篇 physics division...
  • 15 篇 national energy ...

作者

  • 112 篇 hai jin
  • 109 篇 jin hai
  • 42 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 19 篇 liao xiaofei
  • 18 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 nachman benjamin
  • 16 篇 wu baoyuan
  • 15 篇 bastieri d.
  • 15 篇 green d.
  • 15 篇 orlando e.
  • 15 篇 lubrano p.
  • 15 篇 gargano f.
  • 15 篇 spinelli p.
  • 15 篇 kuss m.
  • 15 篇 mikuni vinicius
  • 15 篇 yu zhang

语言

  • 623 篇 英文
  • 149 篇 其他
  • 8 篇 中文
检索条件"机构=Cognitive Computing and Data Science Research Lab"
777 条 记 录,以下是271-280 订阅
排序:
TARGETED ATTACK AGAINST DEEP NEURAL NETWORKS VIA FLIPPING LIMITED WEIGHT BITS  9
TARGETED ATTACK AGAINST DEEP NEURAL NETWORKS VIA FLIPPING LI...
收藏 引用
9th International Conference on Learning Representations, ICLR 2021
作者: Bai, Jiawang Wu, Baoyuan Zhang, Yong Li, Yiming Li, Zhifeng Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University China PCL Research Center of Networks and Communications Peng Cheng Laboratory China School of Data Science The Chinese University of HongKong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China Tencent AI Lab
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ... 详细信息
来源: 评论
GraphFly: Efficient Asynchronous Streaming Graphs Processing via Dependency-Flow
GraphFly: Efficient Asynchronous Streaming Graphs Processing...
收藏 引用
Supercomputing Conference
作者: Dan Chen Chuangyi Gui Yi Zhang Hai Jin Long Zheng Yu Huang Xiaofei Liao National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Clusters and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
Existing streaming graph processing systems typically adopt two phases of refinement and recomputation to ensure the correctness of the incremental computation. However, severe redundant memory accesses exist due to t... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
SMOG: Accelerating Subgraph Matching on GPUs
SMOG: Accelerating Subgraph Matching on GPUs
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Zhibin Wang Ziheng Meng Xue Li Xi Lin Long Zheng Chen Tian Sheng Zhong State Key Laboratory for Novel Software Technology Nanjing University Alibaba Group“ National Engineering Research Center for Big Data Technology and System/ Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Zhejiang Lab
Subgraph matching is a crucial problem in graph theory with diverse applications in fields, such as bioinformatics, social networks and recommendation systems. Accelerating subgraph matching can be greatly facilitated...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Asymptotic Independence of the Sum and Maximum of Dependent Random Variables with Applications to High-Dimensional Tests
arXiv
收藏 引用
arXiv 2022年
作者: Feng, Long Jiang, Tiefeng Li, Xiaoyun Liu, Binghui School of Statistics and Data Science LPMC KLMDASR Nankai University China School of Statistics University of Minnesota United States Cognitive Computing Lab Baidu Research School of Mathematics and Statistics KLAS Northeast Normal University China
For a set of dependent random variables, without stationary or the strong mixing assumptions, we derive the asymptotic independence between their sums and maxima. Then we apply this result to high-dimensional testing ... 详细信息
来源: 评论
Fast point cloud generation with diffusion models in high energy physics
收藏 引用
Physical Review D 2023年 第3期108卷 036025-036025页
作者: Vinicius Mikuni Benjamin Nachman Mariel Pettee National Energy Research Scientific Computing Center Berkeley Lab Berkeley California 94720 USA Physics Division Lawrence Berkeley National Laboratory Berkeley California 94720 USA Berkeley Institute for Data Science University of California Berkeley California 94720 USA
Many particle physics datasets like those generated at colliders are described by continuous coordinates (in contrast to grid points like in an image), respect a number of symmetries (like permutation invariance), and... 详细信息
来源: 评论
Robust Zero Watermarking Algorithm for Medical Volume data Based on LBP  10th
Robust Zero Watermarking Algorithm for Medical Volume Data B...
收藏 引用
10th KES International Conference on Innovation in Medicine and Healthcare, KES-InMed 2022
作者: Liu, Wenyi Li, Jingbing Liu, Jing Ma, Jixin School of Information and Communication Engineering Hainan University Haikou570228 China Research Center for Healthcare Data Science Zhejiang Lab Hangzhou310058 China School of Computing and Mathematical Sciences University of Greenwich LondonSE10 9LS United Kingdom
With the gradual rise of telemedicine, a large number of images will be transmitted on the network during network consultation, which may cause privacy disclosure. How to more effectively ensure the information securi... 详细信息
来源: 评论
Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback
arXiv
收藏 引用
arXiv 2024年
作者: Bi, Zhangqian Wan, Yao Wang, Zheng Zhang, Hongyu Guan, Batu Lu, Fangxin Zhang, Zili Sui, Yulei Jin, Hai Shi, Xuanhua Huazhong University of Science and Technology China University of Leeds United Kingdom Chongqing University China Shanghai Jiao Tong University China University of New South Wales Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Large Language Models (LLMs) have shown remarkable progress in automated code generation. Yet, LLM-generated code may contain errors in API usage, class, data structure, or missing project-specific information. As muc... 详细信息
来源: 评论