咨询与建议

限定检索结果

文献类型

  • 31 篇 期刊文献
  • 16 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 11 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 2 篇 电气工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 轻工技术与工程
    • 1 篇 农业工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 12 篇 理学
    • 9 篇 物理学
    • 3 篇 生物学
    • 2 篇 数学
    • 1 篇 统计学(可授理学、...
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 2 篇 deep neural netw...
  • 2 篇 wireless communi...
  • 2 篇 wireless sensor ...
  • 2 篇 antennas
  • 2 篇 clustering algor...
  • 2 篇 mathematical mod...
  • 2 篇 robustness
  • 2 篇 training
  • 1 篇 vegetation mappi...
  • 1 篇 knowledge engine...
  • 1 篇 object detection
  • 1 篇 tone of news
  • 1 篇 substrates
  • 1 篇 sensitivity
  • 1 篇 entity
  • 1 篇 antenna radiatio...
  • 1 篇 throughput
  • 1 篇 node classificat...
  • 1 篇 portable compute...
  • 1 篇 titanium compoun...

机构

  • 14 篇 school of comput...
  • 13 篇 hubei key labora...
  • 13 篇 national enginee...
  • 13 篇 hubei engineerin...
  • 13 篇 school of cyber ...
  • 12 篇 services computi...
  • 12 篇 cluster and grid...
  • 12 篇 school of inform...
  • 9 篇 school of softwa...
  • 3 篇 school of comput...
  • 2 篇 embedded network...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 embedded computi...
  • 2 篇 faculty of infor...
  • 2 篇 embedded network...
  • 2 篇 embedded network...
  • 2 篇 hunan engineerin...
  • 2 篇 embedded network...
  • 2 篇 school of cyber ...

作者

  • 9 篇 hu shengshan
  • 9 篇 zhang leo yu
  • 8 篇 jin hai
  • 6 篇 wan wei
  • 6 篇 hai jin
  • 6 篇 zhou ziqi
  • 5 篇 li minghui
  • 4 篇 leo yu zhang
  • 4 篇 phaklen ehkan
  • 4 篇 shengshan hu
  • 4 篇 naimah yaakob
  • 3 篇 yao dezhong
  • 3 篇 r. b. ahmad
  • 3 篇 wei wan
  • 3 篇 a. zakaria
  • 3 篇 minghui li
  • 3 篇 l. m. kamarudin
  • 3 篇 zhang yechao
  • 3 篇 wang xianlong
  • 3 篇 mohd fareq abd m...

语言

  • 45 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Embedded Computing Research Cluster School of Computer and Communication Engineering"
47 条 记 录,以下是1-10 订阅
排序:
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer Science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Multi layer segmentation method for ophthalmic OCT images based on Gabor filtering  23
Multi layer segmentation method for ophthalmic OCT images ba...
收藏 引用
2023 International Conference on computer, Vision and Intelligent Technology, ICCVIT 2023
作者: Liu, Jiayike Li, Qingbo Liu, Ailin Liu, Dong Liu, Yang Zhang, Tianqiao School of Information and Communication Guilin University of Electronic Technology Guilin541000 China School of Computer and Artificial Intelligence Xiangnan University Chenzhou423000 China Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems Xiangnan University Chenzhou423000 China School of Life and Environmental Sciences Guilin University of Electronic Technology Guilin541000 China
Optical coherence tomography is a non-destructive optical signal acquisition and processing method for imaging surface tissue structure. OCT has become an important and innovative corneal measurement and diagnostic te... 详细信息
来源: 评论
Design and Application of Innovative cluster Education System Based on Artificial Intelligence Algorithm
Design and Application of Innovative Cluster Education Syste...
收藏 引用
2022 IEEE International Conference on Knowledge engineering and communication Systems, ICKES 2022
作者: Wei, Li Xie, Hui Ramachandra, A.C. School of Computer and Artificial Intelligence Xiangnan University Hunan Chenzhou China Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems Hunan Chenzhou423000 China Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India
After entering the Internet era, people are increasingly digitized and algorithmized. Technology platforms often use their technical advantages in data processing and algorithms to generate an implicit right of domina... 详细信息
来源: 评论
FedAA: A Reinforcement Learning Perspective on Adaptive Aggregation for Fair and Robust Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: He, Jialuo Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Microelectronics and Communication Engineering Chongqing University Chongqing400044 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Federated Learning (FL) has emerged as a promising approach for privacy-preserving model training across decentralized devices. However, it faces challenges such as statistical heterogeneity and susceptibility to adve... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论