咨询与建议

限定检索结果

文献类型

  • 414 篇 期刊文献
  • 129 篇 会议

馆藏范围

  • 543 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 353 篇 理学
    • 194 篇 数学
    • 147 篇 物理学
    • 54 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 50 篇 地球物理学
    • 39 篇 化学
    • 29 篇 生物学
    • 8 篇 大气科学
  • 321 篇 工学
    • 120 篇 计算机科学与技术...
    • 96 篇 软件工程
    • 63 篇 控制科学与工程
    • 49 篇 电气工程
    • 42 篇 力学(可授工学、理...
    • 39 篇 电子科学与技术(可...
    • 38 篇 动力工程及工程热...
    • 32 篇 信息与通信工程
    • 29 篇 化学工程与技术
    • 25 篇 仪器科学与技术
    • 22 篇 生物工程
    • 21 篇 材料科学与工程(可...
    • 16 篇 光学工程
    • 15 篇 机械工程
    • 15 篇 航空宇航科学与技...
    • 13 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 7 篇 核科学与技术
  • 40 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
  • 11 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 5 篇 法学
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 19 篇 cosmic rays
  • 18 篇 lattice-boltzman...
  • 14 篇 navier stokes eq...
  • 12 篇 gamma rays
  • 10 篇 stochastic syste...
  • 9 篇 finite differenc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 deep neural netw...
  • 6 篇 computational mo...
  • 5 篇 multiphase flows
  • 5 篇 dynamical system...
  • 5 篇 deep learning
  • 5 篇 cosmology
  • 5 篇 differential equ...
  • 5 篇 matrix algebra
  • 5 篇 machine learning
  • 5 篇 laplace transfor...
  • 5 篇 training
  • 4 篇 two phase flow

机构

  • 137 篇 school of mathem...
  • 133 篇 hubei key labora...
  • 71 篇 university of ch...
  • 66 篇 university of sc...
  • 65 篇 tianfu cosmic ra...
  • 65 篇 hebei normal uni...
  • 64 篇 state key labora...
  • 64 篇 yunnan observato...
  • 64 篇 school of physic...
  • 64 篇 center for astro...
  • 64 篇 national space s...
  • 64 篇 school of astron...
  • 63 篇 college of physi...
  • 62 篇 school of physic...
  • 62 篇 moscow institute...
  • 61 篇 key laboratory f...
  • 61 篇 institute of fro...
  • 59 篇 school of physic...
  • 57 篇 department of ph...
  • 57 篇 sun yat-sen univ...

作者

  • 62 篇 axikegu
  • 62 篇 danzengluobu
  • 55 篇 fang j.
  • 55 篇 feng c.f.
  • 55 篇 bastieri d.
  • 55 篇 jiang k.
  • 55 篇 kuleshov d.
  • 55 篇 liu d.
  • 55 篇 liu s.m.
  • 55 篇 huang d.h.
  • 55 篇 dai h.l.
  • 55 篇 guo y.q.
  • 55 篇 bao y.w.
  • 55 篇 hu h.b.
  • 55 篇 liu b.
  • 55 篇 liu h.d.
  • 55 篇 mao j.r.
  • 55 篇 fan y.z.
  • 55 篇 pattarakijwanich...
  • 54 篇 chen m.j.

语言

  • 500 篇 英文
  • 40 篇 其他
  • 2 篇 中文
检索条件"机构=Hubei Key Laboratory of Engineering Modeling and Science Computing"
543 条 记 录,以下是211-220 订阅
排序:
Matching extension and matching exclusion via the size or the spectral radius of graphs
arXiv
收藏 引用
arXiv 2023年
作者: Miao, Shujing Li, Shuchao Wei, Wei Hubei Key Laboratory of Mathematical Science Faculty of Mathematics and Statistics Central China Normal University Wuhan430079 China Center of Intelligent Computing and Applied Statistics School of Mathematics Physics and Statistics Shanghai University of Engineering Science Shanghai201620 China
A graph G is said to be k-extendable if every matching of size k in G can be extended to a perfect matching of G, where k is a positive integer. We say G is 1-excludable if for every edge e of G, there exists a perfec... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
The optimal displacement of immiscible two-phase fluids in a pore doublet
arXiv
收藏 引用
arXiv 2022年
作者: Shan, Fang Chai, Zhenhua Shi, Baochang Zhao, Meng School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Institute of Interdisciplinary Research for Mathematics and Applied Science Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China
The displacement of multiphase fluid flow in a pore doublet is a fundamental problem, and is also of importance in understanding of the transport mechanisms of multiphase flows in the porous media. During the displace... 详细信息
来源: 评论
Predicting Tertiary Lymphoid Structures in Head and Neck Contrast-Enhanced CT Images using a 3D CNN
Predicting Tertiary Lymphoid Structures in Head and Neck Con...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Ting Long Tingguan Sun Juan Liu Hua Chen Zhijun Sun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education & School of Cyber Science and Engineering Wuhan University Wuhan China State Key Laboratory of Oral & Maxillofacial Reconstruction and Regeneration & Key Laboratory of Oral Biomedicine Ministry of Education Hubei Key Laboratory of Stomatology & School & Hospital of Stomatology Wuhan University & Frontier Science Center for Immunology and Metabolism Wuhan University Wuhan China Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan China
Squamous cell carcinoma of the head and neck is currently the eighth most common cancer worldwide. In recent years, medical researchers have proposed a promising immune checkpoint blockade treatment to treat the disea...
来源: 评论
Linearly Implicit and High-Order Energy-Preserving Schemes for Highly Oscillatory Hamiltonian Systems
SSRN
收藏 引用
SSRN 2022年
作者: Li, Dongfang Li, Xiaoxi Zhang, Zhimin School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China Department of Mathematics Wayne State University DetroitMI48202 United States
In this paper, a family of novel energy-preserving schemes are presented for numerically solving highly oscillatory Hamiltonian systems. These schemes are constructed by using the relaxation idea in the extrapolated R... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
DeepSolo++: Let Transformer Decoder with Explicit Points Solo for Multilingual Text Spotting
arXiv
收藏 引用
arXiv 2023年
作者: Ye, Maoyuan Zhang, Jing Zhao, Shanshan Liu, Juhua Liu, Tongliang Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Computer Science Faculty of Engineering The University of Sydney Australia JD Explore Academy *** China College of Computing & Data Science Nanyang Technological University Singapore
End-to-end text spotting aims to integrate scene text detection and recognition into a unified framework. Dealing with the relationship between the two sub-tasks plays a pivotal role in designing effective spotters. A... 详细信息
来源: 评论
Hierarchical Reverse Games for the Resource Ecosystem in Cloud-Edge computing
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Pei, Manlin Wang, Chenyu Wang, Xia Zheng, Zhigao Huang, Jianhui Wang, Shengling Guo, Yufei School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Computer Science Georgia State University United States Beijing University of Technology School of Statistics and Data Science Faculty of Science Beijing China Institute of Artificial Intelligence School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Hubei Luojia Laboratory Wuhan University Wuhan China Chinese Academy of Sciences Institute of Computing Technology Beijing China Beijing Normal University School of Artificial Intelligence Beijing China George Washington University Department of Statistics United States
Edge computing has emerged as a killer technology for a hyper-connected world due to its distributed architecture and customer-proximity property. Combined edge nodes with the cloud data center, a cloud-edge computing... 详细信息
来源: 评论