咨询与建议

限定检索结果

文献类型

  • 184 篇 会议
  • 90 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 139 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 31 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 生物工程
    • 13 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 8 篇 电气工程
    • 6 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
  • 67 篇 理学
    • 34 篇 数学
    • 21 篇 生物学
    • 9 篇 物理学
    • 9 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
  • 46 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 3 篇 临床医学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 9 篇 deep neural netw...
  • 9 篇 feature extracti...
  • 9 篇 training
  • 7 篇 semantics
  • 6 篇 deep learning
  • 6 篇 computational mo...
  • 6 篇 accuracy
  • 6 篇 data models
  • 5 篇 conferences
  • 5 篇 scalability
  • 5 篇 anomaly detectio...
  • 5 篇 neural networks
  • 5 篇 costs
  • 5 篇 distributed proc...
  • 5 篇 machine learning
  • 4 篇 object detection
  • 4 篇 self-supervised ...
  • 4 篇 performance eval...
  • 4 篇 cyberspace
  • 4 篇 robustness

机构

  • 37 篇 school of cyber ...
  • 34 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 22 篇 national key lab...
  • 17 篇 school of softwa...
  • 15 篇 college of compu...
  • 15 篇 school of inform...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 9 篇 school of comput...
  • 9 篇 national key lab...
  • 8 篇 jinyinhu laborat...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 key laboratory o...

作者

  • 26 篇 jin hai
  • 21 篇 hai jin
  • 17 篇 hu shengshan
  • 14 篇 wang yijie
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 wan wei
  • 9 篇 li dongsheng
  • 8 篇 huaimin wang
  • 7 篇 dongsheng li
  • 7 篇 xu wu
  • 7 篇 deqing zou
  • 7 篇 shengshan hu
  • 6 篇 peichang shi
  • 6 篇 dou yong
  • 6 篇 wang wei
  • 6 篇 minghui li
  • 6 篇 lai zhiquan

语言

  • 241 篇 英文
  • 19 篇 其他
  • 16 篇 中文
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing School of Computer"
276 条 记 录,以下是71-80 订阅
排序:
RoSAS: Deep Semi-supervised Anomaly Detection with Contamination-resilient Continuous Supervision
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Hongzuo Wang, Yijie Pang, Guansong Jian, Songlei Liu, Ning Wang, Yongjun National Key Laboratory of Parallel and Distributed Computing China College of Computer National University of Defense Technology Hunan Changsha410073 China School of Computing and Information Systems Singapore Management University Singapore178902 Singapore College of Information and Communications National University of Defense Technology Hubei Wuhan430010 China
Semi-supervised anomaly detection methods leverage a few anomaly examples to yield drastically improved performance compared to unsupervised models. However, they still suffer from two limitations: 1) unlabeled anomal... 详细信息
来源: 评论
Graphcs: Graph-Based Client Selection for Heterogeneity in Federated Learning
SSRN
收藏 引用
SSRN 2022年
作者: Chang, Tao Li, Li Wu, MeiHan Yu, Wei Wang, Xiaodong Xu, ChengZhong Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology China State Key Laboratory of Internet of Things for Smart City University of Macau China
Federated Learning coordinates many mobile devices to train an artificial intelligence model while preserving data privacy collaboratively. Mobile devices are usually equipped with totally different hardware configura... 详细信息
来源: 评论
A multidimensional approach of evaluating developers  2020
A multidimensional approach of evaluating developers
收藏 引用
2nd International Conference on Big Data Engineering, BDE 2020
作者: Zhang, Changqiang Chen, Ming Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology China
In this paper, we propose an approach to assess the ability of developers based on their behavior data from OSS. Specifically, we classify developers' ability into code ability, project management ability, and soc... 详细信息
来源: 评论
Conservative Q-Learning for Mechanical Ventilation Treatment Using Diagnose Transformer-Encoder
Conservative Q-Learning for Mechanical Ventilation Treatment...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yuyu Yuan Jinsheng Shi Jincui Yang Chenlong Li Yuang Cai Baoyu Tang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China
The application of artificial intelligence to mechanical ventilation has garnered significant attention, especially with the advancement of deep reinforcement learning. Mechanical ventilation is a medical procedure us...
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
A Physics and Data-Driven Hybrid PINNs Intelligent computing Method for Nuclear Engineering Simulation
A Physics and Data-Driven Hybrid PINNs Intelligent Computing...
收藏 引用
Electronic Information Engineering and computer Science (EIECS), 2021 International Conference on
作者: Yufei Xie Wenlin Wang Guohua Wu Yang Yu Ping An Zibin Sun Haichuan Zhang Shengfeng Luo Yue Li School of Automation Wuhan University of Technology Wuhan China Sino-German College of Intelligent Manufacturing Shenzhen Technology University Shenzhen China Nuclear Power Institute of China Chengdu China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha China
In the field of nuclear energy, the Loss of Coolant Accident (LOCA) is recognized as one of the most severe types of nuclear reactor accidents, characterized by its complex physical processes and potentially catastrop... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
SATMask: Spatial Attention Transform Mask for Dense Instance Segmentation  7
SATMask: Spatial Attention Transform Mask for Dense Instance...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Mao, Quanzhong Sun, Lijuan Wu, Jingchen Gao, Yutong Wu, Xu Qiu, Lirong Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service China Bupt School of Cyberspace Security Bupt School of Computer Science National Pilot Software Engineering School Beijing Jiaotong University Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library China
There are often dense objects in the images processed by instance segmentation, but too dense objects will cause the problem that the objects are difficult to segment. Most of the current dense instance segmentation m... 详细信息
来源: 评论
FCloudless: A Performance-Aware Collaborative Mechanism for JointCloud Serverless
FCloudless: A Performance-Aware Collaborative Mechanism for ...
收藏 引用
IEEE International Conference on Joint Cloud computing (JCC)
作者: Jianfei Liu Huaimin Wang Peichang Shi Yaojie Li Penghui Ma Guodong Yi National Key Laboratory of Parallel and Distributed Computing College of Computer Science National University of Defense Technology Changsha 410073 China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha 410073 China Xiangjiang Lab Changsha 410073 China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha 410073 China
As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to c...
来源: 评论