咨询与建议

限定检索结果

文献类型

  • 196 篇 会议
  • 90 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 291 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 140 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 29 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 19 篇 生物工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 7 篇 网络空间安全
    • 5 篇 材料科学与工程(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 66 篇 理学
    • 38 篇 数学
    • 19 篇 生物学
    • 8 篇 化学
    • 8 篇 系统科学
    • 7 篇 物理学
    • 5 篇 统计学(可授理学、...
  • 36 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 12 篇 图书情报与档案管...
  • 10 篇 法学
    • 7 篇 社会学
    • 3 篇 法学
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 distributed comp...
  • 25 篇 computer science
  • 18 篇 computational mo...
  • 17 篇 concurrent compu...
  • 15 篇 resource managem...
  • 12 篇 quality of servi...
  • 11 篇 computer archite...
  • 10 篇 machine learning
  • 9 篇 grid computing
  • 8 篇 application soft...
  • 8 篇 processor schedu...
  • 8 篇 computer network...
  • 7 篇 parallel algorit...
  • 7 篇 deep learning
  • 7 篇 deep neural netw...
  • 6 篇 time factors
  • 6 篇 interference
  • 6 篇 feature extracti...
  • 6 篇 high performance...
  • 6 篇 testing

机构

  • 38 篇 school of cyber ...
  • 36 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 17 篇 parallel and dis...
  • 15 篇 school of inform...
  • 8 篇 jinyinhu laborat...
  • 7 篇 centre for paral...
  • 7 篇 national enginee...
  • 7 篇 science and tech...
  • 6 篇 huazhong univers...
  • 6 篇 center for paral...
  • 5 篇 parallel and dis...
  • 5 篇 department of co...
  • 5 篇 parallel and dis...
  • 5 篇 school of cyber ...

作者

  • 30 篇 jin hai
  • 22 篇 hai jin
  • 18 篇 li kuan-ching
  • 18 篇 yang chao-tung
  • 17 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 12 篇 albert y. zomaya
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 11 篇 cai wentong
  • 10 篇 zomaya albert y.
  • 10 篇 wan wei
  • 8 篇 zahir tari
  • 7 篇 deqing zou
  • 7 篇 wentong cai
  • 7 篇 shengshan hu
  • 6 篇 javid taheri
  • 6 篇 minghui li
  • 6 篇 dehne f
  • 6 篇 dandamudi sivara...

语言

  • 278 篇 英文
  • 11 篇 其他
  • 2 篇 中文
检索条件"机构=Parallel and Distributed Computing Center School of Computer Science"
291 条 记 录,以下是71-80 订阅
排序:
LTKT: Knowledge Tracing Based on Positive and Negative Learning Transfers
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Jia Tang, Rongrong Lv, Pin Yu, Minghe Yu, Ge Chen, Enhong School of Computer Electronics and Information Guangxi University GuangXi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing Education Department of Guangxi Zhuang Autonomous Region Guangxi530004 China Northeastern University Shenyang110819 China University of Science and Technology of China Hefei230088 China
Knowledge Tracing (KT) is a critical but challenging problem for many educational applications. As an essential part of educational psychology, the propagated influence among pedagogical concepts (i.e., learning trans... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
EDDNet: An Efficient and Accurate Defect Detection Network for the Industrial Edge Environment
EDDNet: An Efficient and Accurate Defect Detection Network f...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Runbing Qin Ningjiang Chen Yihui Huang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Guangxi Colleges and Universities Key Laboratory of Parallel and Distributed Computing Nanning China
Defect detection aims to locate the accurate position of defects in images, which is of great significance to quality inspection in the industrial product manufacturing. Currently, many defect detection methods rely o... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论