咨询与建议

限定检索结果

文献类型

  • 39 篇 会议
  • 30 篇 期刊文献

馆藏范围

  • 69 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 33 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 11 篇 生物工程
    • 8 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 4 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 12 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 1 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 法学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 6 篇 deep neural netw...
  • 4 篇 machine learning
  • 3 篇 scalability
  • 3 篇 computer archite...
  • 3 篇 containers
  • 3 篇 computational mo...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 2 篇 runtime
  • 2 篇 deep learning
  • 2 篇 resource managem...
  • 2 篇 monitoring
  • 2 篇 codes
  • 2 篇 detectors
  • 2 篇 training
  • 2 篇 adaptation model...
  • 1 篇 ciphertext
  • 1 篇 software systems
  • 1 篇 information syst...
  • 1 篇 maintenance engi...

机构

  • 35 篇 school of cyber ...
  • 32 篇 school of comput...
  • 25 篇 cluster and grid...
  • 24 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 hubei engineerin...
  • 22 篇 services computi...
  • 15 篇 school of softwa...
  • 14 篇 school of inform...
  • 12 篇 national enginee...
  • 7 篇 huazhong univers...
  • 7 篇 jinyinhu laborat...
  • 5 篇 national enginee...
  • 4 篇 jin yinhu labora...
  • 4 篇 school of comput...
  • 4 篇 nanyang technolo...
  • 4 篇 national enginee...
  • 4 篇 school of cyber ...
  • 3 篇 institute for ne...
  • 3 篇 school of inform...

作者

  • 32 篇 jin hai
  • 26 篇 hai jin
  • 16 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 7 篇 zou deqing
  • 7 篇 wan wei
  • 7 篇 deqing zou
  • 7 篇 wang xianlong
  • 5 篇 zhang hangtao
  • 5 篇 shengshan hu
  • 5 篇 zhang yechao
  • 4 篇 yao dezhong
  • 4 篇 leo yu zhang
  • 4 篇 minghui li
  • 4 篇 liu wei
  • 4 篇 ming wen
  • 4 篇 xu peng
  • 3 篇 yueming wu

语言

  • 66 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Key Lab of Cluster and Grid Computing"
69 条 记 录,以下是21-30 订阅
排序:
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
HRTC: hybrid resource information service architecture based on GMA
HRTC: hybrid resource information service architecture based...
收藏 引用
IEEE International Conference on e-Business Engineering (ICEBE)
作者: Hongbo Zou Hai Jin Zongfen Han Xuanhua Shi Hanhua Chen Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China National Key Lab of Electronic Measurement Technology The 41st Research Institute China Electronics Technology Group Corporation Qingdao China
Resource information service, as a key component of grid, is the basis of the resource allocation, resource performance evaluation and prediction. The validity of the resource information service directly influences t... 详细信息
来源: 评论
Energy Saving Strategy of Power System cluster Based on Container Virtualization
Energy Saving Strategy of Power System Cluster Based on Cont...
收藏 引用
IEEE Asia Power and Energy Engineering Conference (APEEC)
作者: Ran Zheng Hao Wang Hai Jin Dechao Xu Yong Chen Xiaomeng Li Yufei Rao Zhenan Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Power Grid Safety and Energy Conservation China Electric Power Research Institute Haidian District Beijing China State Grid Henan Electric Power Company Electric Power Research Institute Zhengzhou China
With the continuous development of power grids, the scale of supercomputing clusters has also gradually increased to carry a large number of power system simulation calculations, and the problem of high energy consump...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Jobgrid: Chinese College Graduates Employment Information grid System
JobGrid: Chinese College Graduates Employment Information Gr...
收藏 引用
Chinagrid Annual Conference (Chinagrid)
作者: Feng Zhao Bin Zhou Xiaoxing Sun Hai Jin Song Wu School of Computer Science and Technology Huazhong University of Science & Technology Wuhan China Cluster and Grid Computing Lab Wuhan China The State Key Laboratory of Virtual Reality Technology and Systems Beijing China School of Computer Science and Engineering Beihang University Beijing China
This paper proposes a realistic data grid system named Jobgrid to construct information platform for Chinese college graduates employment, which supports centralized transaction processing to ensure consistent, effect... 详细信息
来源: 评论
Sledge: Towards Efficient Live Migration of Docker Containers
Sledge: Towards Efficient Live Migration of Docker Container...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Bo Xu Song Wu Jiang Xiao Hai Jin Yingxi Zhang Guoqiang Shi Tingyu Lin Jia Rao Li Yi Jizhong Jiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Intelligent Manufacturing System Technology Beijing China The University of Texas at Arlington Arlington TX USA Alibaba Cloud Computing Co. Ltd. Hangzhou China
Modern large-scale cloud platforms require live migration technique on Docker containers with stateful workload to support load balancing, host maintenance, and Quality of Service (QoS) improvement. Efficient and scal... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论