咨询与建议

限定检索结果

文献类型

  • 381 篇 会议
  • 161 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 317 篇 工学
    • 263 篇 计算机科学与技术...
    • 201 篇 软件工程
    • 51 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 35 篇 生物工程
    • 23 篇 电子科学与技术(可...
    • 22 篇 机械工程
    • 14 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 7 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 7 篇 交通运输工程
    • 6 篇 土木工程
    • 6 篇 农业工程
  • 126 篇 理学
    • 75 篇 数学
    • 36 篇 生物学
    • 16 篇 物理学
    • 16 篇 化学
    • 16 篇 统计学(可授理学、...
    • 9 篇 系统科学
  • 98 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 14 篇 training
  • 13 篇 deep neural netw...
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 deep learning
  • 10 篇 programming
  • 10 篇 data models
  • 9 篇 scalability
  • 9 篇 costs
  • 9 篇 accuracy
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware

机构

  • 41 篇 school of cyber ...
  • 35 篇 college of compu...
  • 34 篇 school of comput...
  • 30 篇 national enginee...
  • 29 篇 national key lab...
  • 28 篇 hubei key labora...
  • 28 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 24 篇 national key lab...
  • 22 篇 national key lab...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 27 篇 jin hai
  • 23 篇 wang huaimin
  • 22 篇 li dongsheng
  • 21 篇 hai jin
  • 20 篇 hu shengshan
  • 18 篇 dongsheng li
  • 18 篇 huaimin wang
  • 17 篇 wang yijie
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 13 篇 ding bo
  • 13 篇 zhou ziqi
  • 11 篇 lai zhiquan
  • 10 篇 dou yong
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 wan wei
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang

语言

  • 473 篇 英文
  • 47 篇 其他
  • 24 篇 中文
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
544 条 记 录,以下是241-250 订阅
排序:
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
An iterative sinogram metal artifact reducdion based on UNet
An iterative sinogram metal artifact reducdion based on UNet
收藏 引用
IEEE International Conference on Big Data
作者: Zichong An Xuemei Zhu Xiangling Fu Junqi Ma Chenyi Guo Zheng Zhang School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China The University Hospital of Beijing University of Posts and Telecommunications Beijing China Yofo Medical Technology Co. Ltd Beijing China Department of Electronic Enginerring Tsinghua University Beijing China School of Modern Post(School of Automation) Beijing University of Posts and Telecommunications Beijing China
In the practice of dentistry, oral dental CT images are frequently used to assist doctors in diagnosis. Filtered back projection (FBP) technique is widely employed in practice for the reconstruction of CT images obtai...
来源: 评论
Towards to real world vehicle privacy protection: A new dataset and benchmark
收藏 引用
Pattern Recognition 2026年 169卷
作者: Jiayi Lin Chengming Zou Long Lan Yong Luo Yue Yu Yaowei Wang Wei Zeng Yonghong Tian School of Computer Science and Technology Wuhan University of Technology Wuhan 430070 Hubei China Hubei Key Laboratory of Transportation Internet of Things Technology Wuhan University of Technology Wuhan 430070 Hubei China Peng Cheng Laboratory Shenzhen 518000 Guangdong China State Key Laboratory of High Performance Computing National University of Defense Technology Changsha 410073 Hunan China School of Computer Science and Engineering Nanyang Technological University 639798 Singapore Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha 410073 Hunan China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
The vehicle privacy protection plays a vital role in releasing or sharing of traffic videos. License plate, as the identifiable mark of a vehicle, contains the most sensitive information for a vehicle. Therefore, mask...
来源: 评论
Improving unsupervised domain adaptation by reducing bi-level feature redundancy
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Mengzhu Zhang, Xiang Lan, Long Wang, Wei Tan, Huibin Luo, Zhigang Science and Technology on Parallel and Distributed Laboratory College of Computer National University of Defense Technology Changsha China Institute for Quantum State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China DUT-RU International School of Information Science & Engineering Dalian University of Technology DalianLiaoning116000 China Department of Science and Technology on Parallel and Distributed Processing National University of Defense Technology Changsha China
Reducing feature redundancy has shown beneficial effects for improving the accuracy of deep learning models, thus it is also indispensable for the models of unsupervised domain adaptation (UDA). Nevertheless, most rec... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology  33rd
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer T...
收藏 引用
33rd International Conference on Advanced Information Networking and Applications, AINA 2019
作者: Zheng, Li-ming Long, Wen-feng Liu, Yu-Jia Sun, Wei-dong Department of Message Communication Armed Police Officer Academy Chengdu China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Data distribution is a key technology for resources convergence and sharing in distributed environment. To better meet the requirement for real time data distribution in the dynamic network, a trace routing algorithm ... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data  2nd
Secure and Fast Decision Tree Evaluation on Outsourced Cloud...
收藏 引用
2nd International Conference on Machine Learning for Cyber Security, ML4CS 2019
作者: Liu, Lin Su, Jinshu Chen, Rongmao Chen, Jinrong Sun, Guangliang Li, Jie School of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China National University of Defense Technology Changsha China
Decision trees are famous machine learning classifiers which have been widely used in many areas, such as healthcare, text classification and remote diagnostics, etc. The service providers usually host a decision tree... 详细信息
来源: 评论
Deep reinforcement learning for combinatorial optimization: Covering salesman problems
arXiv
收藏 引用
arXiv 2021年
作者: Li, Kaiwen Zhang, Tao Wang, Rui Wang, Yuheng Han, Yi College of Systems Engineering National University of Defense Technology Changsha410073 China Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology HKL-MSI2T Changsha410073 China Graduate College National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha410073 China
This paper introduces a new deep learning approach to approximately solve the Covering Salesman Problem (CSP). In this approach, given the city locations of a CSP as input, a deep neural network model is designed to d... 详细信息
来源: 评论