咨询与建议

限定检索结果

文献类型

  • 196 篇 会议
  • 90 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 291 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 140 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 29 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 19 篇 生物工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 7 篇 网络空间安全
    • 5 篇 材料科学与工程(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 66 篇 理学
    • 38 篇 数学
    • 19 篇 生物学
    • 8 篇 化学
    • 8 篇 系统科学
    • 7 篇 物理学
    • 5 篇 统计学(可授理学、...
  • 36 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 12 篇 图书情报与档案管...
  • 10 篇 法学
    • 7 篇 社会学
    • 3 篇 法学
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 distributed comp...
  • 25 篇 computer science
  • 18 篇 computational mo...
  • 17 篇 concurrent compu...
  • 15 篇 resource managem...
  • 12 篇 quality of servi...
  • 11 篇 computer archite...
  • 10 篇 machine learning
  • 9 篇 grid computing
  • 8 篇 application soft...
  • 8 篇 processor schedu...
  • 8 篇 computer network...
  • 7 篇 parallel algorit...
  • 7 篇 deep learning
  • 7 篇 deep neural netw...
  • 6 篇 time factors
  • 6 篇 interference
  • 6 篇 feature extracti...
  • 6 篇 high performance...
  • 6 篇 testing

机构

  • 38 篇 school of cyber ...
  • 36 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 17 篇 parallel and dis...
  • 15 篇 school of inform...
  • 8 篇 jinyinhu laborat...
  • 7 篇 centre for paral...
  • 7 篇 national enginee...
  • 7 篇 science and tech...
  • 6 篇 huazhong univers...
  • 6 篇 center for paral...
  • 5 篇 parallel and dis...
  • 5 篇 department of co...
  • 5 篇 parallel and dis...
  • 5 篇 school of cyber ...

作者

  • 30 篇 jin hai
  • 22 篇 hai jin
  • 18 篇 li kuan-ching
  • 18 篇 yang chao-tung
  • 17 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 12 篇 albert y. zomaya
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 11 篇 cai wentong
  • 10 篇 zomaya albert y.
  • 10 篇 wan wei
  • 8 篇 zahir tari
  • 7 篇 deqing zou
  • 7 篇 wentong cai
  • 7 篇 shengshan hu
  • 6 篇 javid taheri
  • 6 篇 minghui li
  • 6 篇 dehne f
  • 6 篇 dandamudi sivara...

语言

  • 278 篇 英文
  • 11 篇 其他
  • 2 篇 中文
检索条件"机构=Parallel and Distributed Computing Center School of Computer Science"
291 条 记 录,以下是31-40 订阅
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Graceful Performance Degradation in Apache Storm  21st
Graceful Performance Degradation in Apache Storm
收藏 引用
21st International Conference on parallel and distributed computing, Applications, and Technologies, PDCAT 2020
作者: HoseinyFarahabady, Mohammad Reza Taheri, Javid Zomaya, Albert Y. Tari, Zahir School of Computer Science Center for Distributed and High Performance Computing The University of Sydney SydneyNSW Australia Department of Mathematics and Computer Science Karlstad University Karlstad Sweden School of Science RMIT University MelbourneVIC Australia
The concept of stream data processing is becoming challenging in most business sectors where try to improve their operational efficiency by deriving valuable information from unstructured, yet, contentiously generated... 详细信息
来源: 评论
Smart Contract Data Monitoring and Visualization
Smart Contract Data Monitoring and Visualization
收藏 引用
IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
作者: Seng Kuang Yap Zhongli Dong Mark Toohey Young Choon Lee Albert Y. Zomaya Aglive Research Geelong VIC Australia Center for Distributed and High Performance Computing School of Computer Science The University of Sydney NSW Australia University of Nicosia Cyprus School of Computing Macquarie University Sydney NSW Australia
Blockchain technology has attracted significant industry, academic, and governmental attention since its emerged in 2008. Blockchain use cases are now being explored by traditional, transaction-oriented businesses in ...
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
A Deep Belief Networks Intrusion Detection Method Based on Generative Adversarial Networks
A Deep Belief Networks Intrusion Detection Method Based on G...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Zezhang Zheng Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing School of Computer Electronics and Information Guangxi University (Guangxi University) Nanning China
In response to the substantial threat that Internet attacks pose to data center network security, researchers have proposed several deep learning-based methods for detecting network intrusions. However, while algorith... 详细信息
来源: 评论
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsourced Taxis
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsou...
收藏 引用
International Conference on Data Engineering
作者: Junhui Gao Qianru Wang Xin Zhang Juan Shi Xiang Zhao Qingye Han Yan Pan School of Computer Science Northwestern Polytechnical University School of Computer Science and Technology Xidian University National Key Laboratory of Information Systems Engineering National University of Defense Technology Air Force Engineering University Laboratory for Big Data and Decision National University of Defense Technology School of Management Science and Real Estate Chongqing University National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology
Instant delivery has become a fundamental service in people's daily lives. Different from the traditional express service, the instant delivery has a strict shipping time constraint after being ordered. However, t... 详细信息
来源: 评论
NaFV-Net: An Adversarial Four-view Network for Mammogram Classification  39
NaFV-Net: An Adversarial Four-view Network for Mammogram Cla...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Lu, Feng Hou, Yuxiang Li, Wei Yang, Xiangying Zheng, Haibo Luo, Wenxi Chen, Leqing Cao, Yuyang Liao, Xiaofei Zhang, Yu Yang, Fan Zomaya, Albert Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Australia-China Joint Research Centre for Energy Informatics and Demand Response Technologies Centre for Distributed and High Performance Computing School of Computer Science University of Sydney Australia Tongji Hospital Tongji Medical College Huazhong University of Science and Technology China
Breast cancer remains a leading cause of mortality among women, with millions of new cases diagnosed annually. Early detection through screening is crucial. Using neural networks to improve the accuracy of breast canc... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Towards a Deep Learning Pain-Level Detection Deployment at UAE for Patient-Centric-Pain Management and Diagnosis Support: Framework and Performance Evaluation
收藏 引用
Procedia computer science 2023年 220卷 339-347页
作者: Leila Ismail Muhammad Danish Waseem Clouds and Distributed Computing and Systems (CLOUDS) Lab School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Australia. Intelligent Distributed Computing and Systems (INDUCE) Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University UAE. National Water and Energy Center United Arab Emirates University UAE.
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论