咨询与建议

限定检索结果

文献类型

  • 96 篇 会议
  • 34 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 132 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 70 篇 工学
    • 56 篇 计算机科学与技术...
    • 40 篇 软件工程
    • 24 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 9 篇 电气工程
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 3 篇 光学工程
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 石油与天然气工程
    • 2 篇 轻工技术与工程
    • 1 篇 仪器科学与技术
  • 30 篇 理学
    • 22 篇 数学
    • 8 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 6 篇 系统科学
    • 5 篇 物理学
    • 3 篇 化学
    • 1 篇 大气科学
  • 25 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 法学
    • 3 篇 社会学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 29 篇 multimedia syste...
  • 13 篇 laboratories
  • 12 篇 information syst...
  • 12 篇 data mining
  • 10 篇 distributed comp...
  • 8 篇 computer science
  • 8 篇 content based re...
  • 8 篇 bandwidth
  • 8 篇 information retr...
  • 8 篇 streaming media
  • 7 篇 multimedia datab...
  • 7 篇 image retrieval
  • 7 篇 feature extracti...
  • 5 篇 real time system...
  • 5 篇 image segmentati...
  • 5 篇 feedback
  • 5 篇 quality of servi...
  • 5 篇 protocols
  • 5 篇 clustering algor...
  • 5 篇 delay

机构

  • 30 篇 department of el...
  • 25 篇 distributed mult...
  • 24 篇 department of el...
  • 19 篇 school of comput...
  • 19 篇 school of cyber ...
  • 18 篇 school of inform...
  • 17 篇 distributed mult...
  • 17 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of softwa...
  • 13 篇 cluster and grid...
  • 7 篇 distributed mult...
  • 5 篇 wuhan research i...
  • 5 篇 department of el...
  • 4 篇 hubei key labora...
  • 3 篇 distributed mult...
  • 3 篇 huazhong univers...
  • 3 篇 school of cyber ...

作者

  • 35 篇 shu-ching chen
  • 33 篇 mei-ling shyu
  • 26 篇 chen shu-ching
  • 25 篇 shyu mei-ling
  • 13 篇 hu shengshan
  • 13 篇 zhang leo yu
  • 12 篇 jin hai
  • 9 篇 chengcui zhang
  • 9 篇 zhou ziqi
  • 8 篇 wan wei
  • 8 篇 li minghui
  • 7 篇 zhang chengcui
  • 6 篇 leo yu zhang
  • 6 篇 hongli luo
  • 6 篇 hai jin
  • 6 篇 shengshan hu
  • 5 篇 minghui li
  • 5 篇 min chen
  • 5 篇 m.-l. shyu
  • 5 篇 wang xianlong

语言

  • 122 篇 英文
  • 10 篇 其他
检索条件"机构=Distributed Multimedia Information System Laboratory. School of Computer Science"
132 条 记 录,以下是1-10 订阅
排序:
FIMD: Fusion-Inspired Modality Distillation for Enhanced MRI Segmentation in Incomplete Multi-Modal Scenarios  24
FIMD: Fusion-Inspired Modality Distillation for Enhanced MRI...
收藏 引用
7th International Conference on Image and Graphics Processing, ICIGP 2024
作者: Yang, Rui Wang, Xiao Xu, Xin Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology China School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Provincial Key Laboratory of Multimedia and Network Communication Engineering Wuhan China
Magnetic Resonance Imaging (MRI) is an invaluable tool for brain tumor segmentation. However, in clinical practice, certain modalities might be unavailable, leading to potential performance degradation in prediction t... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
MBAPIS: Multi-Level Behavior Analysis Guided Program Interval Selection for Microarchitecture Studies  23
MBAPIS: Multi-Level Behavior Analysis Guided Program Interva...
收藏 引用
Proceedings of the 32nd International Conference on Parallel Architectures and Compilation Techniques
作者: Hongwei Cui Yujie Cui Honglan Zhan Shuhao Liang Xianhua Liu Chun Yang Xu Cheng Engineering Reserach Center of Microprocessor & System Ministry of Education School of Computer Science Peking University Beijing National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University Beijing
Understanding program behavior is crucial in computer architecture research, but the growing size of benchmarks makes analyzing and simulating entire programs increasingly challenging. In practice, researchers often s... 详细信息
来源: 评论
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment  21
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
收藏 引用
21st IEEE International Symposium on Parallel and distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Huang, Shuai Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business UIniversity Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on BigData Security Wuhan China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China
In this research, we tackled the complex task of aligning audio and lyrics content automatically. This task entails the precise matching of lyrics with the corresponding audio segments in songs, necessitating the coor... 详细信息
来源: 评论
MBAPIS: Multi-Level Behavior Analysis Guided Program Interval Selection for Microarchitecture Studies
MBAPIS: Multi-Level Behavior Analysis Guided Program Interva...
收藏 引用
International Conference on Parallel Architecture and Compilation Techniques (PACT)
作者: Hongwei Cui Yujie Cui Honglan Zhan Shuhao Liang Xianhua Liu Chun Yang Xu Cheng Engineering Reserach Center of Microprocessor & System Ministry of Education School of Computer Science Peking University Beijing National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University Beijing
Understanding program behavior is crucial in computer architecture research, but the growing size of benchmarks makes analyzing and simulating entire programs increasingly challenging. In practice, researchers often s...
来源: 评论
The Parables of the Mustard Seed and the Yeast: Extremely Low-Budget, High-Performance Nighttime Semantic Segmentation  39
The Parables of the Mustard Seed and the Yeast: Extremely Lo...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Shiqin Xu, Xin Chen, Haoyang Jiang, Kui Wang, Zheng School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China School of Computer Science and Technology Harbin Institute of Technology Harbin150001 China
Nighttime Semantic Segmentation (NSS) is essential to many cutting-edge vision applications. However, existing technologies overly rely on massive labeled data, whose annotation is time-consuming and laborious. In thi... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Ranking on Heterogeneous Manifold for Multimodal information Retrieval  21
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
21st IEEE International Symposium on Parallel and distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Wan, Xingshi Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science & Technology Wuhan China
In light of recent advancements in Internet of multimedia Things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论