咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 288 篇 期刊文献

馆藏范围

  • 627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 327 篇 计算机科学与技术...
    • 244 篇 软件工程
    • 67 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 53 篇 生物工程
    • 51 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 19 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
    • 7 篇 建筑学
  • 178 篇 理学
    • 91 篇 数学
    • 60 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 108 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 18 篇 医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 23 篇 training
  • 21 篇 feature extracti...
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 15 篇 deep learning
  • 14 篇 machine learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 12 篇 accuracy
  • 12 篇 data models
  • 11 篇 deep neural netw...
  • 11 篇 contrastive lear...
  • 11 篇 predictive model...
  • 10 篇 reinforcement le...
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 robustness
  • 8 篇 parallel process...

机构

  • 149 篇 national enginee...
  • 103 篇 national enginee...
  • 82 篇 college of compu...
  • 63 篇 school of comput...
  • 54 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 30 篇 shenzhen univers...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 computer vision ...
  • 12 篇 national enginee...

作者

  • 134 篇 jin hai
  • 126 篇 hai jin
  • 44 篇 shen linlin
  • 43 篇 xiaofei liao
  • 29 篇 liao xiaofei
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 wang jinbao
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui

语言

  • 537 篇 英文
  • 86 篇 其他
  • 6 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
627 条 记 录,以下是541-550 订阅
排序:
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
A Locality-Aware Energy-Efficient Accelerator for Graph Mining Applications
A Locality-Aware Energy-Efficient Accelerator for Graph Mini...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Pengcheng Yao Long Zheng Zhen Zeng Yu Huang Chuangyi Gui Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering UNSW Sydney Australia
Graph mining is becoming increasingly important due to the ever-increasing demands on analyzing complex structures in graphs. Existing graph accelerators typically hold most of the randomly-accessed data in an on-chip... 详细信息
来源: 评论
Efficient Hardware-Assisted Crash Consistency in Encrypted Persistent Memory
Efficient Hardware-Assisted Crash Consistency in Encrypted P...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Zhan Zhang Jianhui Yue Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China Computer Science Department Michigan Technological University Houghton Michigan
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure data recoverability and data confidentiality. The enforcement of these two goals does not only put more burden on pr... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论
Group-wise Inhibition based Feature Regularization for Robust Classification
Group-wise Inhibition based Feature Regularization for Robus...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Haozhe Liu Haoqian Wu Weicheng Xie Feng Liu Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
The convolutional neural network (CNN) is vulnerable to degraded images with even very small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most... 详细信息
来源: 评论
Deep learning-based forgery attack on document images
arXiv
收藏 引用
arXiv 2021年
作者: Zhao, Lin Chen, Changsheng Huang, Jiwu the Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
With the ongoing popularization of online services, the digital document images have been used in various applications. Meanwhile, there have emerged some deep learning-based text editing algorithms which alter the te... 详细信息
来源: 评论
On-edge multi-task transfer learning: Model and practice with data-driven task allocation
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Zimu Chen, Qiong Hu, Chuang Wang, Dan Liu, Fangming The National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The Edge Cloud Innovation Lab. Technical Innovation Department Cloud BU Huawei Technologies Co. Ltd. Shenzhen China The Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong Hong Kong
On edge devices, data scarcity occurs as a common problem where transfer learning serves as a widely-suggested remedy. Nevertheless, transfer learning imposes heavy computation burden to the resource-constrained edge ... 详细信息
来源: 评论
DINOv2-powered Few-Shot Semantic Segmentation: A Unified Framework via Cross-Model Distillation and 4D Correlation Mining
arXiv
收藏 引用
arXiv 2025年
作者: Zhuo, Wei Tang, Zhiyue Xue, Wufeng Ding, Hao Shen, Linlin School of Artificial Intelligence Shenzhen University Shenzhen518060 China National Engineering Laboratory of Big Data System Computing Technology Shenzhen University China School of Biomedical Engineering Shenzhen University Medical School Shenzhen University China School of Computer Science and Software Engineering Shenzhen University China
Few-shot semantic segmentation has gained increasing interest due to its generalization capability, i.e., segmenting pixels of novel classes requiring only a few annotated images. Prior work has focused on meta-learni... 详细信息
来源: 评论
Shattered chain of trust: understanding security risks in cross-cloud IoT access delegation  20
Shattered chain of trust: understanding security risks in cr...
收藏 引用
Proceedings of the 29th USENIX Conference on Security Symposium
作者: Bin Yuan Yan Jia Luyi Xing Dongfang Zhao XiaoFeng Wang Deqing Zou Hai Jin Yuqing Zhang School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center and Indiana University Bloomington and Shenzhen Huazhong University of Science and Technology Research Institute China School of Cyber Engineering Xidian University China and National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and Indiana University Bloomington Indiana University Bloomington School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center Huazhong Univ. of Sci. & Tech. China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and School of Cyber Engineering Xidian University China
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by th...
来源: 评论
Finedge: A Dynamic Cost-Efficient Edge Resource Management Platform for NFV Network
Finedge: A Dynamic Cost-Efficient Edge Resource Management P...
收藏 引用
International Workshop on Quality of Service
作者: Miao Li Qixia Zhang Fangming Liu National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
With the evolution of network function virtualization (NFV) and edge computing, software-based network functions (NFs) can be deployed on closer-to-end-user edge servers to support a broad range of new services with h... 详细信息
来源: 评论