咨询与建议

限定检索结果

文献类型

  • 416 篇 期刊文献
  • 130 篇 会议

馆藏范围

  • 546 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 353 篇 理学
    • 194 篇 数学
    • 147 篇 物理学
    • 54 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 50 篇 地球物理学
    • 39 篇 化学
    • 29 篇 生物学
    • 8 篇 大气科学
  • 324 篇 工学
    • 123 篇 计算机科学与技术...
    • 96 篇 软件工程
    • 66 篇 控制科学与工程
    • 49 篇 电气工程
    • 42 篇 力学(可授工学、理...
    • 39 篇 电子科学与技术(可...
    • 38 篇 动力工程及工程热...
    • 32 篇 信息与通信工程
    • 29 篇 化学工程与技术
    • 26 篇 仪器科学与技术
    • 22 篇 生物工程
    • 21 篇 材料科学与工程(可...
    • 16 篇 光学工程
    • 15 篇 机械工程
    • 15 篇 航空宇航科学与技...
    • 14 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 7 篇 核科学与技术
  • 41 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
  • 12 篇 医学
    • 11 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 5 篇 法学
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 19 篇 cosmic rays
  • 18 篇 lattice-boltzman...
  • 14 篇 navier stokes eq...
  • 12 篇 gamma rays
  • 10 篇 stochastic syste...
  • 9 篇 finite differenc...
  • 8 篇 feature extracti...
  • 7 篇 deep neural netw...
  • 7 篇 semantics
  • 6 篇 deep learning
  • 6 篇 computational mo...
  • 5 篇 multiphase flows
  • 5 篇 dynamical system...
  • 5 篇 cosmology
  • 5 篇 differential equ...
  • 5 篇 matrix algebra
  • 5 篇 machine learning
  • 5 篇 laplace transfor...
  • 5 篇 training
  • 4 篇 two phase flow

机构

  • 137 篇 school of mathem...
  • 133 篇 hubei key labora...
  • 71 篇 university of ch...
  • 66 篇 university of sc...
  • 65 篇 tianfu cosmic ra...
  • 65 篇 hebei normal uni...
  • 64 篇 state key labora...
  • 64 篇 yunnan observato...
  • 64 篇 school of physic...
  • 64 篇 center for astro...
  • 64 篇 national space s...
  • 64 篇 school of astron...
  • 63 篇 college of physi...
  • 62 篇 school of physic...
  • 62 篇 moscow institute...
  • 61 篇 key laboratory f...
  • 61 篇 institute of fro...
  • 59 篇 school of physic...
  • 57 篇 department of ph...
  • 57 篇 sun yat-sen univ...

作者

  • 62 篇 axikegu
  • 62 篇 danzengluobu
  • 55 篇 fang j.
  • 55 篇 feng c.f.
  • 55 篇 bastieri d.
  • 55 篇 jiang k.
  • 55 篇 kuleshov d.
  • 55 篇 liu d.
  • 55 篇 liu s.m.
  • 55 篇 huang d.h.
  • 55 篇 dai h.l.
  • 55 篇 guo y.q.
  • 55 篇 bao y.w.
  • 55 篇 hu h.b.
  • 55 篇 liu b.
  • 55 篇 liu h.d.
  • 55 篇 mao j.r.
  • 55 篇 fan y.z.
  • 55 篇 pattarakijwanich...
  • 54 篇 chen m.j.

语言

  • 497 篇 英文
  • 46 篇 其他
  • 2 篇 中文
检索条件"机构=Hubei Key Laboratory of Engineering Modeling and Science Computing"
546 条 记 录,以下是121-130 订阅
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
An efficient spectral method for the fractional Schrödinger equation on the real line
arXiv
收藏 引用
arXiv 2022年
作者: Shen, Mengxia Wang, Haiyong School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China
The fractional Schrödinger equation (FSE) on the real line arises in a broad range of physical settings and their numerical simulation is challenging due to the nonlocal nature and the power law decay of the solu... 详细信息
来源: 评论
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论
Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback
Lombard-VLD: Voice Liveness Detection Based on Human Auditor...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Hongcheng Zhu Zongkun Sun Yanzhen Ren Kun He Yongpeng Yan Zixuan Wang Wuyang Liu Yuhong Yang Weiping Tu School of Cyber Science and Engineering Wuhan University Wuhan China State Grid Wuhan Electric Power Supply Company Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan
Voice Liveness Detection (VLD) aims to protect speaker authentication from speech spoofing by determining whether speeches come from live speakers or loudspeakers. Previous methods mainly focus on their differences at... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
Consistent and conservative phase-field-based lattice Boltzmann method for incompressible two-phase flows
收藏 引用
Physical Review E 2022年 第2期106卷 025319-025319页
作者: Chengjie Zhan Zhenhua Chai Baochang Shi School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan 430074 China Institute of Interdisciplinary Research for Mathematics and Applied Science Huazhong University of Science and Technology Wuhan 430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan 430074 China
In this work, we consider a general consistent and conservative phase-field model for the incompressible two-phase flows. In this model, not only the Cahn-Hilliard or Allen-Cahn equation can be adopted, but also the m... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature  39
Breaking Barriers in Physical-World Adversarial Examples: Im...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model's in... 详细信息
来源: 评论
Diffuse-interface lattice Boltzmann modeling of charged particle transport in Poiseuille flow
收藏 引用
Physical Review E 2022年 第1期106卷 015306-015306页
作者: Jiao Liu Zhenhua Chai Baochang Shi School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan 430074 China Institute of Interdisciplinary Research for Mathematics and Applied Science Huazhong University of Science and Technology Wuhan 430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan 430074 China
In this paper, we developed a coupled diffuse-interface lattice Boltzmann method (DI-LBM) to study the transport of a charged particle in the Poiseuille flow, which is governed by the Navier-Stokes equations for fluid... 详细信息
来源: 评论