咨询与建议

限定检索结果

文献类型

  • 411 篇 期刊文献
  • 120 篇 会议

馆藏范围

  • 531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 350 篇 理学
    • 193 篇 数学
    • 145 篇 物理学
    • 54 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 49 篇 地球物理学
    • 38 篇 化学
    • 29 篇 生物学
    • 8 篇 大气科学
  • 317 篇 工学
    • 118 篇 计算机科学与技术...
    • 97 篇 软件工程
    • 60 篇 控制科学与工程
    • 51 篇 电气工程
    • 41 篇 力学(可授工学、理...
    • 39 篇 电子科学与技术(可...
    • 37 篇 动力工程及工程热...
    • 32 篇 信息与通信工程
    • 29 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 22 篇 生物工程
    • 20 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 航空宇航科学与技...
    • 13 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 7 篇 核科学与技术
  • 40 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
  • 11 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 5 篇 法学
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 18 篇 lattice-boltzman...
  • 18 篇 cosmic rays
  • 14 篇 navier stokes eq...
  • 12 篇 gamma rays
  • 10 篇 stochastic syste...
  • 9 篇 finite differenc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 computational mo...
  • 5 篇 multiphase flows
  • 5 篇 dynamical system...
  • 5 篇 deep neural netw...
  • 5 篇 cosmology
  • 5 篇 differential equ...
  • 5 篇 matrix algebra
  • 5 篇 machine learning
  • 5 篇 laplace transfor...
  • 5 篇 training
  • 4 篇 two phase flow
  • 4 篇 deep learning

机构

  • 135 篇 school of mathem...
  • 131 篇 hubei key labora...
  • 71 篇 university of ch...
  • 65 篇 university of sc...
  • 64 篇 tianfu cosmic ra...
  • 64 篇 hebei normal uni...
  • 63 篇 state key labora...
  • 63 篇 yunnan observato...
  • 63 篇 school of physic...
  • 63 篇 center for astro...
  • 63 篇 national space s...
  • 63 篇 school of astron...
  • 62 篇 college of physi...
  • 61 篇 key laboratory f...
  • 61 篇 school of physic...
  • 61 篇 moscow institute...
  • 60 篇 institute of fro...
  • 59 篇 school of physic...
  • 56 篇 department of ph...
  • 56 篇 sun yat-sen univ...

作者

  • 62 篇 axikegu
  • 61 篇 danzengluobu
  • 54 篇 fang j.
  • 54 篇 feng c.f.
  • 54 篇 bastieri d.
  • 54 篇 jiang k.
  • 54 篇 kuleshov d.
  • 54 篇 liu d.
  • 54 篇 liu s.m.
  • 54 篇 huang d.h.
  • 54 篇 dai h.l.
  • 54 篇 guo y.q.
  • 54 篇 bao y.w.
  • 54 篇 hu h.b.
  • 54 篇 liu b.
  • 54 篇 liu h.d.
  • 54 篇 mao j.r.
  • 54 篇 fan y.z.
  • 54 篇 pattarakijwanich...
  • 53 篇 chen m.j.

语言

  • 499 篇 英文
  • 30 篇 其他
  • 2 篇 中文
检索条件"机构=Hubei Key Laboratory of Engineering Modeling and Science Computing"
531 条 记 录,以下是281-290 订阅
排序:
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
A lattice Boltzmann model for two-phase flow in porous media
arXiv
收藏 引用
arXiv 2018年
作者: Chai, Zhenhua Liang, Hong Du, Rui Shi, Baochang School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China State Key Laboratory of Coal Combustion Huazhong University of Science and Technology Wuhan430074 China Department of Physics Hangzhou Dianzi University Hangzhou310018 China School of Mathematics Southeast University Nanjing210096 China
In this paper, a lattice Boltzmann (LB) model with double distribution functions is proposed for two-phase flow in porous media where one distribution function is used for pressure governed by the Poisson equation, an... 详细信息
来源: 评论
Shape correspondence using anisotropic Chebyshev spectral CNNs
Shape correspondence using anisotropic Chebyshev spectral CN...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Qinsong Li Shengjun Liu Ling Hu Xinru Liu Institute of Engineering Modeling and Scientific Computing Central South University State Key Laboratory of High Performance Manufacturing Complex Central South University School of Mathematics and Computational Science Hunan First Normal University
Establishing correspondence between shapes is a very important and active research topic in many domains. Due to the powerful ability of deep learning on geometric data, lots of attractive results have been achieved b... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论