咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 167 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 310 篇 工学
    • 257 篇 计算机科学与技术...
    • 199 篇 软件工程
    • 47 篇 信息与通信工程
    • 36 篇 生物工程
    • 34 篇 控制科学与工程
    • 23 篇 机械工程
    • 21 篇 电子科学与技术(可...
    • 12 篇 电气工程
    • 10 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 127 篇 理学
    • 75 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 99 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 507 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
541 条 记 录,以下是451-460 订阅
排序:
Optimization approaches of organizing streams on imagine processor
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2008年 第7期31卷 1092-1100页
作者: Yang, Xue-Jun Zeng, Li-Fang Deng, Yu Tang, Yu-Hua National Key Laboratory of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China Jiangnan Remote Sensing Institute Shanghai 200072 China
Due to the characteristics of stream applications and the insufficiency of conventional processors when running stream programs, stream processors which support data-level parallelism become the research hotspot. This... 详细信息
来源: 评论
GREYONE: data flow sensitive fuzzing  20
GREYONE: data flow sensitive fuzzing
收藏 引用
Proceedings of the 29th USENIX Conference on Security Symposium
作者: Shuitao Gan Chao Zhang Peng Chen Bodong Zhao Xiaojun Qin Dong Wu Zuoning Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Institute for Network Science and Cyberspace Tsinghua University and Beijing National Research Center for Information Science and Technology ByteDance AI lab Institute for Network Science and Cyberspace Tsinghua University National Research Center of Parallel Computer Engineering and Technology
Data flow analysis (e.g., dynamic taint analysis) has proven to be useful for guiding fuzzers to explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is labor-intensive, inaccurate ...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
A Fault Classification Prediction Model Based on Loose-Type Wavelet Neural Network for Server Health Management
A Fault Classification Prediction Model Based on Loose-Type ...
收藏 引用
Cloud computing, Big Data Applications and Software Engineering (CBASE), International Conference on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Xiaoqi Lu Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China School of Computer Electronics and Information Guangxi University Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Nanning China
To prevent the serious impact on production efficiency caused by service interruption, data loss, and other issues resulting from server faults, this paper proposes a server fault prediction model named Wavelet Packet...
来源: 评论
A Deep Belief Networks Intrusion Detection Method Based on Generative Adversarial Networks
A Deep Belief Networks Intrusion Detection Method Based on G...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Zezhang Zheng Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing School of Computer Electronics and Information Guangxi University (Guangxi University) Nanning China
In response to the substantial threat that Internet attacks pose to data center network security, researchers have proposed several deep learning-based methods for detecting network intrusions. However, while algorith... 详细信息
来源: 评论
Deep reinforcement learning for combinatorial optimization: Covering salesman problems
arXiv
收藏 引用
arXiv 2021年
作者: Li, Kaiwen Zhang, Tao Wang, Rui Wang, Yuheng Han, Yi College of Systems Engineering National University of Defense Technology Changsha410073 China Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology HKL-MSI2T Changsha410073 China Graduate College National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha410073 China
This paper introduces a new deep learning approach to approximately solve the Covering Salesman Problem (CSP). In this approach, given the city locations of a CSP as input, a deep neural network model is designed to d... 详细信息
来源: 评论
Scalable unbiased sampling method based on multi-peer adaptive random walk
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2009年 第3期20卷 630-643页
作者: Fu, Yong-Quan Wang, Yi-Jie Zhou, Jing National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Staff Room of Computer Command Academy of the Corps of Engineers Xuzhou 221000 China
To deal with the scalable and fast unbiased sampling problems in unstructured P2P systems, a sampling method based on multi-peer adaptive random walk (SMARW) is proposed. In the method, based on the multi-peer random ... 详细信息
来源: 评论
A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Yuting Huang, Pei Cao, Juan Li, Jintao Lin, Yun Dong, Jin Song Ma, Feifei Zhang, Jian Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Beijing China National University of Singapore Singapore Laboratory of Parallel Software and Computational Science ISCAS Beijing China
Recent years have seen the wide application of NLP models in crucial areas such as finance, medical treatment, and news media, raising concerns of the model robustness and vulnerabilities. In this paper, we propose a ... 详细信息
来源: 评论
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded Logits for Few-Shot Text Classification
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yi Xu Jie Hu Zhiqiao Gao Jinpeng Chen School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China China Telecom Corporation Limited Research Institute Beijing China
Although the recent advances in pre-training language models have achieved great success and migrated annotation bottleneck for many tasks, the task-specific fine-tuning for text classification still requires thousand... 详细信息
来源: 评论