咨询与建议

限定检索结果

文献类型

  • 463 篇 期刊文献
  • 401 篇 会议

馆藏范围

  • 864 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 539 篇 工学
    • 373 篇 计算机科学与技术...
    • 294 篇 软件工程
    • 108 篇 信息与通信工程
    • 69 篇 生物工程
    • 64 篇 电气工程
    • 55 篇 控制科学与工程
    • 47 篇 电子科学与技术(可...
    • 41 篇 机械工程
    • 38 篇 生物医学工程(可授...
    • 30 篇 光学工程
    • 25 篇 交通运输工程
    • 21 篇 化学工程与技术
    • 20 篇 动力工程及工程热...
    • 19 篇 仪器科学与技术
    • 18 篇 材料科学与工程(可...
  • 269 篇 理学
    • 114 篇 数学
    • 88 篇 生物学
    • 65 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 28 篇 化学
    • 21 篇 系统科学
  • 137 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 58 篇 医学
    • 50 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 17 篇 公共卫生与预防医...
  • 34 篇 法学
    • 25 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 5 篇 文学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 25 篇 semantics
  • 20 篇 computational mo...
  • 18 篇 deep learning
  • 17 篇 machine learning
  • 15 篇 training
  • 14 篇 memory managemen...
  • 14 篇 feature extracti...
  • 12 篇 graph neural net...
  • 12 篇 predictive model...
  • 12 篇 blockchain
  • 11 篇 deep neural netw...
  • 11 篇 throughput
  • 10 篇 scalability
  • 10 篇 computer archite...
  • 10 篇 federated learni...
  • 10 篇 accuracy
  • 9 篇 optimization
  • 9 篇 data models
  • 8 篇 parallel process...
  • 8 篇 big data

机构

  • 100 篇 national enginee...
  • 62 篇 school of comput...
  • 58 篇 hubei key labora...
  • 57 篇 school of cyber ...
  • 37 篇 national enginee...
  • 34 篇 huazhong univers...
  • 31 篇 hubei engineerin...
  • 28 篇 services computi...
  • 27 篇 hubei key labora...
  • 26 篇 cluster and grid...
  • 22 篇 school of softwa...
  • 20 篇 zhejiang lab
  • 17 篇 school of inform...
  • 14 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 national enginee...
  • 12 篇 university of ch...
  • 12 篇 huazhong univers...
  • 12 篇 jinyinhu laborat...
  • 11 篇 national enginee...

作者

  • 123 篇 jin hai
  • 121 篇 hai jin
  • 42 篇 xiaofei liao
  • 26 篇 liao xiaofei
  • 24 篇 hu shengshan
  • 22 篇 long zheng
  • 20 篇 haikun liu
  • 20 篇 zhou pan
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 15 篇 deqing zou
  • 15 篇 yu huang
  • 13 篇 wan yao
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 zhang hongyu
  • 12 篇 shi xuanhua
  • 12 篇 zhou ziqi
  • 12 篇 liu haikun

语言

  • 806 篇 英文
  • 43 篇 其他
  • 18 篇 中文
检索条件"机构=National Engineering Research Center for Big Data Technology and System Lab"
864 条 记 录,以下是131-140 订阅
排序:
AccelES: Accelerating Top-K SpMV for Embedding Similarity via Low-bit Pruning
AccelES: Accelerating Top-K SpMV for Embedding Similarity vi...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Jiaqi Zhai Xuanhua Shi Kaiyi Huang Chencheng Ye Weifang Hu Bingsheng He Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore
In the realm of recommendation systems, achieving real-time performance in embedding similarity tasks is often hindered by the limitations of traditional Top-K sparse matrix-vector multiplication (SpMV) methods, which... 详细信息
来源: 评论
SC-GNN: A Communication-Efficient Semantic Compression for Distributed Training of GNNs  24
SC-GNN: A Communication-Efficient Semantic Compression for D...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Wang, Jihe Wu, Ying Wang, Danghui School of Computer Science Northwestern Polytechnical University Xi'an China Engineering Research Center of Embedded System Integration Ministry of Education Northwestern Polytechnical University Xi'an China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical University Xi'an China
Training big graph neural networks (GNNs) in distributed systems is quite time-consuming mainly because of the ubiquitous aggregate operations that involve a large amount of cross-partition communication for collectin... 详细信息
来源: 评论
Cloud and IoT Cybersecurity Applied to Environmental Science in Critical national Infrastructure
Cloud and IoT Cybersecurity Applied to Environmental Science...
收藏 引用
2023 International Conference on Intelligent Education and Intelligent research, IEIR 2023
作者: Tipping, Josh Withana, Chandana Elchouemi, Amr Xiong, Feng Western Sydney University-City Campus Australia American Public University System United States Central China Normal University National Engineering Research Center of Educational Big Data Wuhan China
Significant innovation, particularly in environmental technology, is taking place on a global basis, due to the extensive focus on the environmental impact of industry. Technological innovators increasingly rely on ke... 详细信息
来源: 评论
Reveal training performance mystery between Tensor Flow and PyTorch in the single GPU environment
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 147-163页
作者: Hulin DAI Xuan PENG Xuanhua SHI Ligang HE Qian XIONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabSchool of Computer Science and Technology Huazhong University of Science and Technology Department of Computer Science University of Warwick
Deep learning has gained tremendous success in various fields while training deep neural networks(DNNs) is very compute-intensive, which results in numerous deep learning frameworks that aim to offer better usability ... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
A Real-time Demonstration of Bidirectional Multiformat/Rate-adjustable Integrated Laser Communication/Ranging for Satellite Communication
A Real-time Demonstration of Bidirectional Multiformat/Rate-...
收藏 引用
2024 Conference on Lasers and Electro-Optics, CLEO 2024
作者: Wang, Yizhou Wang, Yuanxiang Luo, Zhen Zhong, Linsheng Zou, Yang Ao, Xueyuan Liu, Jiale Fan, Feng Li, Xiaoliang Dai, Xiaoxiao Yang, Qi Liu, Deming National Engineering Laboratory for Next Generation Internet Access System School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Beijing Research Institute of Telemetry Beijing100094 China Jinyinhu Laboratory Wuhan430040 China
A multi-format/rate-adjustable integrated laser communication/ranging system is proposed, achieving adjustable rates between 0.625-10Gbit/s. Real-time experiment shows that at 1e-4 BER the ranging error is only 0.29% ... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Towards Demystifying Android Adware: dataset and Payload Location  39
Towards Demystifying Android Adware: Dataset and Payload Loc...
收藏 引用
39th ACM/IEEE International Conference on Automated Software engineering Workshops, ASEW 2024
作者: Wang, Chao Liu, Tianming Zhao, Yanjie Zhang, Lin Du, Xiaoning Li, Li Wang, Haoyu Monash University Clayton Australia Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China The National Computer Emergency Response Beijing China Beihang University Beijing China
Adware represents a pervasive threat in the mobile ecosystem, yet its inherent characteristics have been largely overlooked by previous research. This work takes a crucial step towards demystifying Android adware. We ... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论