咨询与建议

限定检索结果

文献类型

  • 417 篇 期刊文献
  • 120 篇 会议

馆藏范围

  • 537 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 理学
    • 193 篇 数学
    • 147 篇 物理学
    • 54 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 49 篇 地球物理学
    • 39 篇 化学
    • 29 篇 生物学
    • 8 篇 大气科学
  • 323 篇 工学
    • 121 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 61 篇 控制科学与工程
    • 54 篇 电气工程
    • 42 篇 力学(可授工学、理...
    • 39 篇 电子科学与技术(可...
    • 37 篇 动力工程及工程热...
    • 32 篇 信息与通信工程
    • 29 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 22 篇 生物工程
    • 20 篇 材料科学与工程(可...
    • 16 篇 光学工程
    • 15 篇 机械工程
    • 14 篇 航空宇航科学与技...
    • 13 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 7 篇 核科学与技术
  • 42 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 11 篇 医学
    • 10 篇 临床医学
  • 6 篇 经济学
  • 5 篇 法学
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 18 篇 lattice-boltzman...
  • 18 篇 cosmic rays
  • 14 篇 navier stokes eq...
  • 12 篇 gamma rays
  • 10 篇 stochastic syste...
  • 9 篇 finite differenc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 computational mo...
  • 5 篇 multiphase flows
  • 5 篇 dynamical system...
  • 5 篇 deep neural netw...
  • 5 篇 cosmology
  • 5 篇 differential equ...
  • 5 篇 matrix algebra
  • 5 篇 machine learning
  • 5 篇 laplace transfor...
  • 5 篇 training
  • 4 篇 two phase flow
  • 4 篇 deep learning

机构

  • 135 篇 school of mathem...
  • 131 篇 hubei key labora...
  • 71 篇 university of ch...
  • 65 篇 university of sc...
  • 64 篇 tianfu cosmic ra...
  • 64 篇 hebei normal uni...
  • 63 篇 state key labora...
  • 63 篇 yunnan observato...
  • 63 篇 school of physic...
  • 63 篇 center for astro...
  • 63 篇 national space s...
  • 63 篇 school of astron...
  • 62 篇 college of physi...
  • 61 篇 key laboratory f...
  • 61 篇 school of physic...
  • 61 篇 moscow institute...
  • 60 篇 institute of fro...
  • 59 篇 school of physic...
  • 56 篇 department of ph...
  • 56 篇 sun yat-sen univ...

作者

  • 62 篇 axikegu
  • 61 篇 danzengluobu
  • 54 篇 fang j.
  • 54 篇 feng c.f.
  • 54 篇 bastieri d.
  • 54 篇 jiang k.
  • 54 篇 kuleshov d.
  • 54 篇 liu d.
  • 54 篇 liu s.m.
  • 54 篇 huang d.h.
  • 54 篇 dai h.l.
  • 54 篇 guo y.q.
  • 54 篇 bao y.w.
  • 54 篇 hu h.b.
  • 54 篇 liu b.
  • 54 篇 liu h.d.
  • 54 篇 mao j.r.
  • 54 篇 fan y.z.
  • 54 篇 pattarakijwanich...
  • 53 篇 chen m.j.

语言

  • 504 篇 英文
  • 31 篇 其他
  • 2 篇 中文
检索条件"机构=Hubei Key Laboratory of Engineering Modeling and Science Computing"
537 条 记 录,以下是371-380 订阅
排序:
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Brain Functional Network Generation Using Distribution-Regularized Adversarial Graph Autoencoder with Transformer for Dementia Diagnosis
收藏 引用
Computer modeling in engineering & sciences 2023年 第12期137卷 2129-2147页
作者: Qiankun Zuo Junhua Hu Yudong Zhang Junren Pan Changhong Jing Xuhang Chen Xiaobo Meng Jin Hong School of Information Engineering Hubei University of EconomicsWuhan430205China State Key Laboratory of Simulation and Regulation of Water Cycle in River Basin China Institute of Water Resources and Hydropower ResearchBeijing100038China School of Computing and Mathematic Sciences University of LeicesterLeicesterLE17RHUK Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518055China Faculty of Science and Technology University of MacaoMacao999078China School of Geophysics Chengdu University of TechnologyChengdu610059China Laboratory of Artificial Intelligence and 3D Technologies for Cardiovascular Diseases Guangdong Provincial Key Laboratory of South China Structural Heart DiseaseGuangdong Provincial People’s Hospital(Guangdong Academy of Medical Sciences)Southern Medical UniversityGuangzhou519041China Medical Research Institute Guangdong Provincial People’s Hospital(Guangdong Academy of Medical Sciences)Southern Medical UniversityGuangzhou519041China
The topological connectivity information derived from the brain functional network can bring new insights for diagnosing and analyzing dementia *** brain functional network is suitable to bridge the correlation betwee... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Unconditionally optimal convergence of an energy-conserving and linearly implicit scheme for nonlinear wave equations
arXiv
收藏 引用
arXiv 2021年
作者: Cao, Waixiang Li, Dongfang Zhang, Zhimin School of Mathematical Sciences Beijing Normal University Beijing100875 China School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China Beijing Computational Science Research Center Beijing100193 China Department of Mathematics Wayne State University DetroitMI48202 United States
In this paper, we present and analyze an energy-conserving and linearly implicit scheme for solving the nonlinear wave equations. Optimal error estimates in time and superconvergent error estimates in space are establ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A note on the run length function for intermittent maps
arXiv
收藏 引用
arXiv 2018年
作者: Cui, Hongfei Fang, Lulu Zhang, Yiwei Wuhan Institute of Physics and Mathematics Chinese Academy of Sciences Wuhan430071 China Sun Yat-sen university Guangzhou510275 China School of Mathematics and Statistics Center for Mathematical Sciences Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Sciences and Technology Wuhan430074 China
We study the run length function for intermittent maps. In particular, we show that the longest consecutive zero digits (resp. one digits) having a time window of polynomial (resp. logarithmic) length. Our proof is re...
来源: 评论
Upper capacity entropy and packing entropy of saturated sets for amenable group actions
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Xiankun Zhang, Wenda Zhang, Yiwei College of Mathematics and Statistics Chongqing University Chongqing 401331 China College of Mathematics and Statistics Chongqing Jiaotong University Chongqing 400074 China School of Mathematics and Statistics Center for Mathematical Sciences Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Sciences and Technology Wuhan430074 China
Let (X, G) be a G-action topological system, where G is a countable infinite discrete amenable group and X a compact metric space. In this paper we study the upper capacity entropy and packing entropy for systems with... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论