咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 68 篇 期刊文献

馆藏范围

  • 237 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 97 篇 工学
    • 73 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 网络空间安全
    • 8 篇 电气工程
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control
  • 7 篇 linux

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 huazhong univers...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 126 篇 hai jin
  • 44 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 11 篇 xuanhua shi
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 ran zheng
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 long zheng
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 221 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Laboratory of Services Computing Technology and System"
237 条 记 录,以下是11-20 订阅
排序:
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
MeG2: In-Memory Acceleration for Genome Graphs Analysis  23
MeG2: In-Memory Acceleration for Genome Graphs Analysis
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Yu Huang Long Zheng Haifeng Liu Zhuoran Zhou Dan Chen Pengcheng Yao Qinggang Wang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China and Zhejiang Lab Hangzhou China National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
Genome graphs analysis has emerged as an effective means to enable mapping DNA fragments (known as reads) to the reference genome. It replaces the traditional linear reference with a graph-based representation to augm...
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
A Survey of Non-Volatile Main Memory Technologies:State-of-the-Arts,Practices,and Future Directions
收藏 引用
Journal of Computer Science & technology 2021年 第1期36卷 4-32页
作者: Hai-Kun Liu Di Chen Hai Jin Xiao-Fei Liao Binsheng He Kan Hu Yu Zhang National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan 430074China Cluster and Grid Computing Laboratory Huazhong University of Science and TechnologyWuhan 430074China School of Computing Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Computing National University of SingaporeSingapore 117418Singapore
Non-Volatile Main Memories (NVMMs) have recently emerged as a promising technology for future memory systems. Generally, NVMMs have many desirable properties such as high density, byte-addressability, non-volatility, ... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated Data Centers
收藏 引用
Journal of Computer Science & technology 2021年 第5期36卷 1051-1070页
作者: Yu-Wei Wu Qing-Gang Wang Long Zheng Xiao-Fei Liao Hai Jin Wen-Bin Jiang Ran Zheng Kan Hu National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
With the rapid growth of real-world graphs,the size of which can easily exceed the on-chip(board)storage capacity of an accelerator,processing large-scale graphs on a single Field Programmable Gate Array(FPGA)becomes ... 详细信息
来源: 评论
X-Stream: A Flexible, Adaptive Video Transformer for Privacy-Preserving Video Stream Analytics
X-Stream: A Flexible, Adaptive Video Transformer for Privacy...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Dou Feng Lin Wang Shutong Chen Lingching Tung Fangming Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Paderborn University Germany National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Guangxi University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Peng Cheng Laboratory China
Video stream analytics (VSA) systems fuel many exciting applications that facilitate people’s lives, but also raise critical concerns about exposing too much individuals’ privacy. To alleviate these concerns, variou... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论