咨询与建议

限定检索结果

文献类型

  • 184 篇 会议
  • 90 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 139 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 31 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 生物工程
    • 13 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 8 篇 电气工程
    • 6 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
  • 67 篇 理学
    • 34 篇 数学
    • 21 篇 生物学
    • 9 篇 物理学
    • 9 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
  • 46 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 3 篇 临床医学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 9 篇 deep neural netw...
  • 9 篇 feature extracti...
  • 9 篇 training
  • 7 篇 semantics
  • 6 篇 deep learning
  • 6 篇 computational mo...
  • 6 篇 accuracy
  • 6 篇 data models
  • 5 篇 conferences
  • 5 篇 scalability
  • 5 篇 anomaly detectio...
  • 5 篇 neural networks
  • 5 篇 costs
  • 5 篇 distributed proc...
  • 5 篇 machine learning
  • 4 篇 object detection
  • 4 篇 self-supervised ...
  • 4 篇 performance eval...
  • 4 篇 cyberspace
  • 4 篇 robustness

机构

  • 37 篇 school of cyber ...
  • 34 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 22 篇 national key lab...
  • 17 篇 school of softwa...
  • 15 篇 college of compu...
  • 15 篇 school of inform...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 9 篇 school of comput...
  • 9 篇 national key lab...
  • 8 篇 jinyinhu laborat...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 key laboratory o...

作者

  • 26 篇 jin hai
  • 21 篇 hai jin
  • 17 篇 hu shengshan
  • 14 篇 wang yijie
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 wan wei
  • 9 篇 li dongsheng
  • 8 篇 huaimin wang
  • 7 篇 dongsheng li
  • 7 篇 xu wu
  • 7 篇 deqing zou
  • 7 篇 shengshan hu
  • 6 篇 peichang shi
  • 6 篇 dou yong
  • 6 篇 wang wei
  • 6 篇 minghui li
  • 6 篇 lai zhiquan

语言

  • 241 篇 英文
  • 19 篇 其他
  • 16 篇 中文
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing School of Computer"
276 条 记 录,以下是151-160 订阅
排序:
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Research on Application of Heterogeneous Resonance Integral for Double Heterogeneous System
SSRN
收藏 引用
SSRN 2024年
作者: Qin, Shuai Zhang, Qian Wang, Kai Huang, Dong Li, Song Liang, Yuechao Laboratory for Advanced Nuclear Energy Theory and Applications Zhejiang Institute of Modern Physics Department of Physics Zhejiang University Zhejiang Hangzhou310027 China Zhejiang Institute of Modern Physics Department of Physics Zhejiang University Zhejiang Hangzhou310027 China School of Nuclear Science and Technology Xi’an Jiaotong University 28 West Xianning Road Shaanxi Xi’an710049 China College of Nuclear Science and Technology Naval University of Engineering Wuhan China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Hunan Changsha410073 China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Hunan Changsha410073 China
The Double Heterogeneous (DH) system, where fuel particles are randomly dispersed in the non-fissile matrix, is challenging for the reactor physics calculation. The Sanchez-Pomraning method accurately handles the DH s...
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Towards practical and massively parallel quantum computing emulation for quantum chemistry
arXiv
收藏 引用
arXiv 2023年
作者: Shang, Honghui Fan, Yi Shen, Li Guo, Chu Liu, Jie Duan, Xiaohui Li, Fang Li, Zhenyu Institute of Computing Technology Chinese Academy of Sciences Beijing China Hefei National Laboratory University of Science and Technology of China Hefei230088 China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics Synergetic Innovation Center for Quantum Effects and Applications Hunan Normal University Changsha410081 China School of Software Shandong University Jinan China National Research Center of Parallel Computer Engineering and Technology Beijing China
Quantum computing is moving beyond its early stage and seeking for commercial applications in chemical and biomedical sciences. In the current noisy intermediate-scale quantum computing era, quantum resource is too sc... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
An iterative sinogram metal artifact reducdion based on UNet
An iterative sinogram metal artifact reducdion based on UNet
收藏 引用
IEEE International Conference on Big Data
作者: Zichong An Xuemei Zhu Xiangling Fu Junqi Ma Chenyi Guo Zheng Zhang School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China The University Hospital of Beijing University of Posts and Telecommunications Beijing China Yofo Medical Technology Co. Ltd Beijing China Department of Electronic Enginerring Tsinghua University Beijing China School of Modern Post(School of Automation) Beijing University of Posts and Telecommunications Beijing China
In the practice of dentistry, oral dental CT images are frequently used to assist doctors in diagnosis. Filtered back projection (FBP) technique is widely employed in practice for the reconstruction of CT images obtai...
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论