咨询与建议

限定检索结果

文献类型

  • 184 篇 会议
  • 90 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 139 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 31 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 生物工程
    • 13 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 8 篇 电气工程
    • 6 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
  • 67 篇 理学
    • 34 篇 数学
    • 21 篇 生物学
    • 9 篇 物理学
    • 9 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
  • 46 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 3 篇 临床医学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 9 篇 deep neural netw...
  • 9 篇 feature extracti...
  • 9 篇 training
  • 7 篇 semantics
  • 6 篇 deep learning
  • 6 篇 computational mo...
  • 6 篇 accuracy
  • 6 篇 data models
  • 5 篇 conferences
  • 5 篇 scalability
  • 5 篇 anomaly detectio...
  • 5 篇 neural networks
  • 5 篇 costs
  • 5 篇 distributed proc...
  • 5 篇 machine learning
  • 4 篇 object detection
  • 4 篇 self-supervised ...
  • 4 篇 performance eval...
  • 4 篇 cyberspace
  • 4 篇 robustness

机构

  • 37 篇 school of cyber ...
  • 34 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 22 篇 national key lab...
  • 17 篇 school of softwa...
  • 15 篇 college of compu...
  • 15 篇 school of inform...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 9 篇 school of comput...
  • 9 篇 national key lab...
  • 8 篇 jinyinhu laborat...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 key laboratory o...

作者

  • 26 篇 jin hai
  • 21 篇 hai jin
  • 17 篇 hu shengshan
  • 14 篇 wang yijie
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 wan wei
  • 9 篇 li dongsheng
  • 8 篇 huaimin wang
  • 7 篇 dongsheng li
  • 7 篇 xu wu
  • 7 篇 deqing zou
  • 7 篇 shengshan hu
  • 6 篇 peichang shi
  • 6 篇 dou yong
  • 6 篇 wang wei
  • 6 篇 minghui li
  • 6 篇 lai zhiquan

语言

  • 241 篇 英文
  • 19 篇 其他
  • 16 篇 中文
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing School of Computer"
276 条 记 录,以下是101-110 订阅
排序:
Efficient distributed parallel Aligning Reads and Reference Genome with Many Repetitive Subsequences Using Compact de Bruijn Graph
Efficient Distributed Parallel Aligning Reads and Reference ...
收藏 引用
International Symposium on parallel Architectures, Algorithms and Programming (PAAP)
作者: Yao Li Cheng Zhong Danyang Chen Jinxiong Zhang Mengxiao Yin Key Laboratory of Parallel School of Computer Electronics and Information Distributed Computing Technology in Guangxi Universities Guangxi University Nanning China
A large number of reads generated by the next generation sequencing platform will contain many repetitive subsequences. Effective localizing and identifying genomic regions containing repetitive subsequences will cont... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
科学研究的第五范式——以智能驱动的材料设计为例
收藏 引用
Engineering 2023年 第5期24卷 126-137,I0003,I0004页
作者: Can Leng Zhuo Tang Yi-Ge Zhou Zean Tian Wei-Qing Huang Jie Liu Keqin Li Kenli Li Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense TechnologyChangsha 410073China Laboratory of Software Engineering for Complex Systems National University of Defense TechnologyChangsha 410073China National Supercomputing Center in Changsha Changsha 410082China College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China Institute of Chemical Biology and Nanomedicine State Key Laboratory of Chemo/Biosensing and ChemometricsCollege of Chemistry and Chemical EngineeringHunan UniversityChangsha 410082China Department of Applied Physics School of Physics and ElectronicsHunan UniversityChangsha 410082China Department of Computer Science State University of New YorkNew PaltzNY 12561USA
科学正在进入一个新时代——第五范式——它被认为是知识整合到不同领域的主要特征,是基于无所不在的机器学习系统的计算社区中智能驱动的工作。在此,我们通过在天河一号超级计算机系统上构建的催化材料专门设计的典型平台案例,生动地... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
TNRAS: Tor Nodes Reliability Analysis Scheme  2021
TNRAS: Tor Nodes Reliability Analysis Scheme
收藏 引用
2021 the 11th International Conference on Communication and Network Security
作者: Wenzhen Zhang Tianbo Lu Zeyu Du School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China School of Computer Science (National Pilot Software Engineering School) School of Cyberspace Security Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China
With the rapid Internet development, the security attacks become more and more noteworthy that people have paid more concentration on personal privacy. The Onion Router (Tor), a distributed anonymous communication net... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
LTKT: Knowledge Tracing Based on Positive and Negative Learning Transfers
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Jia Tang, Rongrong Lv, Pin Yu, Minghe Yu, Ge Chen, Enhong School of Computer Electronics and Information Guangxi University GuangXi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing Education Department of Guangxi Zhuang Autonomous Region Guangxi530004 China Northeastern University Shenyang110819 China University of Science and Technology of China Hefei230088 China
Knowledge Tracing (KT) is a critical but challenging problem for many educational applications. As an essential part of educational psychology, the propagated influence among pedagogical concepts (i.e., learning trans... 详细信息
来源: 评论
EDDNet: An Efficient and Accurate Defect Detection Network for the Industrial Edge Environment
EDDNet: An Efficient and Accurate Defect Detection Network f...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Runbing Qin Ningjiang Chen Yihui Huang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Guangxi Colleges and Universities Key Laboratory of Parallel and Distributed Computing Nanning China
Defect detection aims to locate the accurate position of defects in images, which is of great significance to quality inspection in the industrial product manufacturing. Currently, many defect detection methods rely o... 详细信息
来源: 评论
A Complexity-Reduced Block-Selective Algebraic Multigrid Method for Implicitly Coupled Velocity-Pressure System on High Performance computers
SSRN
收藏 引用
SSRN 2023年
作者: Liang, Yuechao Guo, Xiao-Wei Li, Chao Yuan, Fan Song, Min Zhang, Qingyang Chen, Xinhai Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China School of Mathematics and Computational Sciences Xiangtan University Xiangtan411105 China College of Computer Science and Technology National University of Defense Technology Changsha410073 China
The implicitly coupled pressure-based algorithm is widely acknowledged for its superior convergence and robustness in solving incompressible flow problems. However, the increased expansion scale of equations and diffi... 详细信息
来源: 评论
Multi-Turn Jailbreaking Large Language Models via Attention Shifting  39
Multi-Turn Jailbreaking Large Language Models via Attention ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Du, Xiaohu Mo, Fan Wen, Ming Gu, Tu Zheng, Huadi Jin, Hai Shi, Jie School of Cyber Science and Engineering Huazhong University of Science and Technology (HUST) China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab School of Computer Science and Technology HUST China JinYinHu Laboratory China Huawei International China
Large Language Models (LLMs) have achieved significant performance in various natural language processing tasks but also pose safety and ethical threats, thus requiring red teaming and alignment processes to bolster t...
来源: 评论