咨询与建议

限定检索结果

文献类型

  • 1,767 篇 期刊文献
  • 1,316 篇 会议
  • 20 册 图书

馆藏范围

  • 3,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,123 篇 工学
    • 1,530 篇 计算机科学与技术...
    • 1,200 篇 软件工程
    • 461 篇 信息与通信工程
    • 295 篇 生物工程
    • 280 篇 电气工程
    • 262 篇 控制科学与工程
    • 240 篇 光学工程
    • 220 篇 电子科学与技术(可...
    • 214 篇 生物医学工程(可授...
    • 111 篇 机械工程
    • 104 篇 化学工程与技术
    • 100 篇 仪器科学与技术
    • 70 篇 材料科学与工程(可...
    • 66 篇 网络空间安全
    • 58 篇 动力工程及工程热...
  • 1,239 篇 理学
    • 523 篇 数学
    • 485 篇 物理学
    • 324 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 159 篇 化学
    • 87 篇 系统科学
    • 56 篇 地球物理学
  • 499 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 202 篇 医学
    • 174 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 75 篇 公共卫生与预防医...
  • 86 篇 法学
    • 65 篇 社会学
  • 42 篇 农学
  • 39 篇 经济学
  • 31 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学
  • 3 篇 军事学

主题

  • 82 篇 deep learning
  • 77 篇 semantics
  • 77 篇 feature extracti...
  • 68 篇 machine learning
  • 67 篇 computational mo...
  • 58 篇 training
  • 42 篇 federated learni...
  • 42 篇 accuracy
  • 39 篇 data models
  • 38 篇 deep neural netw...
  • 36 篇 graph neural net...
  • 35 篇 artificial intel...
  • 33 篇 computer science
  • 32 篇 image segmentati...
  • 31 篇 data mining
  • 30 篇 convolution
  • 30 篇 servers
  • 30 篇 predictive model...
  • 29 篇 optimization
  • 28 篇 cloud computing

机构

  • 103 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 44 篇 infn sezione di ...
  • 44 篇 north-west unive...
  • 44 篇 université de st...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 42 篇 university of ch...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 national centre ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 39 篇 dipartimento di ...

作者

  • 81 篇 hai jin
  • 77 篇 jin hai
  • 44 篇 chen a.
  • 44 篇 benoit d.m.
  • 44 篇 ferrara g.
  • 44 篇 ardid m.
  • 44 篇 calvo d.
  • 44 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,750 篇 英文
  • 317 篇 其他
  • 41 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3103 条 记 录,以下是381-390 订阅
排序:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Fed-AugMix: Balancing Privacy and Utility via Data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Haoyang Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Gradient leakage attacks pose a significant threat to the privacy guarantees of federated learning. While distortion-based protection mechanisms are commonly employed to mitigate this issue, they often lead to notable... 详细信息
来源: 评论
RAHP: A Redundancy-aware Accelerator for High-performance Hypergraph Neural Network
RAHP: A Redundancy-aware Accelerator for High-performance Hy...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Hui Yu Yu Zhang Ligang He Yingqi Zhao Xintao Li Ruida Xin Jin Zhao Xiaofei Liao Haikun Liu Bingsheng He Hai Jin National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Warwick United Kingdom National University of Singapore Singapore
Hypergraph Neural Network (HyperGNN) has emerged as a potent methodology for dissecting intricate multilateral connections among various entities. Current software/hardware solutions leverage a sequential execution mo... 详细信息
来源: 评论
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Reducing Data Redundancy
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Red...
收藏 引用
International Conference on Distributed computing Systems
作者: Xiaohai Dai Yifan Zhou Jiang Xiao Feng Cheng Xia Xie Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
To overcome the scaling and performance limitations, the Directed Acyclic Graph (DAG) is utilized as the underlying storage model of blockchain systems, which enables concurrent transaction processing and confirmation...
来源: 评论
Content Based Automated File Organization Using Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 1927-1942页
作者: Syed Ali Raza Sagheer Abbas Taher M.Ghazal Muhammad Adnan Khan Munir Ahmad Hussam Al Hamadi School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Department of Computer Science GC University LahorePakistan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangorMalaysia School of Information Technology Skyline University CollegeUniversity City SharjahSharjah1797UAE Riphah School of Computing&Innovation Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan Department of Software Pattern Recognition and Machine Learning LabGachon UniversitySeongnam13120GyeonggidoKorea Cyber-Physical Systems Khalifa UniversityAbu Dhabi127788UAE
In the world of big data,it’s quite a task to organize different files based on their *** with heterogeneous data and keeping a record of every single file stored in any folder is one of the biggest problems encounte... 详细信息
来源: 评论
A Scalable, Efficient, and Robust Dynamic Memory Management Library for HLS-based FPGAs
A Scalable, Efficient, and Robust Dynamic Memory Management ...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Qinggang Wang Long Zheng Zhaozeng An Shuyi Xiong Runze Wang Yu Huang Pengcheng Yao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Nowadays, high-level synthesis (HLS) has gained prominence for FPGA-based architecture prototyping, enhancing productivity significantly. Despite this advancement, HLS tools are impeded by a critical drawback: they la...
来源: 评论
Memory-Guided Contrastive and Triplet Separation for Weakly-Supervised Disease Detection
Memory-Guided Contrastive and Triplet Separation for Weakly-...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: She, Jinwen Li, Qiong Ma, Andy J. Sun Yat-sen University Cancer Center Guangzhou China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Ministry of Education Guangdong Province Key Laboratory of Information Security Technology Key Laboratory of Machine Intelligence and Advanced Computing China
Weakly-supervised disease detection has the great potential to alleviate the time-consuming and labor-intensive burden of manual annotations in instance level. While existing methods extract normality prototypes encod... 详细信息
来源: 评论