咨询与建议

限定检索结果

文献类型

  • 308 篇 会议
  • 129 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 198 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 49 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 24 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 18 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 力学(可授工学、理...
    • 8 篇 仪器科学与技术
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 核科学与技术
  • 116 篇 理学
    • 71 篇 数学
    • 25 篇 物理学
    • 24 篇 生物学
    • 19 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 5 篇 化学
  • 65 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 7 篇 农学
    • 7 篇 作物学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 16 篇 computational mo...
  • 15 篇 deep learning
  • 15 篇 training
  • 14 篇 benchmark testin...
  • 14 篇 algorithm design...
  • 14 篇 cloud computing
  • 13 篇 computer archite...
  • 12 篇 feature extracti...
  • 11 篇 servers
  • 10 篇 scalability
  • 10 篇 clustering algor...
  • 9 篇 task analysis
  • 9 篇 throughput
  • 9 篇 laboratories
  • 9 篇 distributed proc...
  • 9 篇 hardware
  • 9 篇 distributed data...
  • 8 篇 runtime
  • 8 篇 parallel process...
  • 8 篇 fault tolerance

机构

  • 134 篇 science and tech...
  • 51 篇 college of compu...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 10 篇 laboratory of di...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 7 篇 laboratory of so...
  • 7 篇 college of scien...
  • 6 篇 national laborat...
  • 6 篇 college of compu...

作者

  • 35 篇 liu jie
  • 32 篇 jie liu
  • 19 篇 yijie wang
  • 15 篇 zhigang luo
  • 15 篇 wang yijie
  • 15 篇 peng yuxing
  • 14 篇 qinglin wang
  • 13 篇 naiyang guan
  • 13 篇 zuocheng xing
  • 12 篇 wang huaimin
  • 11 篇 chen xinhai
  • 11 篇 chunye gong
  • 11 篇 kai lu
  • 10 篇 yuxing peng
  • 10 篇 huaimin wang
  • 10 篇 wang qinglin
  • 9 篇 dongsheng li
  • 9 篇 xiaodong wang
  • 9 篇 li dongsheng
  • 9 篇 xuhui huang

语言

  • 412 篇 英文
  • 25 篇 中文
  • 2 篇 其他
检索条件"机构=Science and Technology on Paralled and Distributed Processing Laboratory"
439 条 记 录,以下是61-70 订阅
排序:
A Fast Adversarial Sample Detection Approach for Industrial Internet-of-Things Applications
A Fast Adversarial Sample Detection Approach for Industrial ...
收藏 引用
International Workshop on Quality of Service
作者: Shigeng Zhang Yudong Li Shuxin Chen Xuan Li Jian Zhang School of Computer Science and Engineering Central South University College of Computer Science and Electronic Engineering Hunan University The Science and Technology on Parallel and Distributed Processing Laboratory (PDL) China
Adversarial attacks reveal the inherent vulnerability of deep neural networks, which face serious security issues for their security. Among them, the attack against the Deep Neural Network (DNN) application used in th...
来源: 评论
GNNRL-Smoothing: A Prior-Free Reinforcement Learning Model for Mesh Smoothing
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Zhichao C. Chen, Xinhai C. Gong, Chunye Y. Yang, Bo Deng, Liang Sun, Yufei F. Pang, Yufei F. Liu, Jie National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory China National University of Defense Technology Laboratory of Digitizing Software for Frontier Equipment China China Aerodynamics Research and Development Center China Nankai University College of Software China
Mesh smoothing methods can enhance mesh quality by eliminating distorted elements, leading to improved convergence in simulations. To balance the efficiency and robustness of traditional mesh smoothing process, previo... 详细信息
来源: 评论
DELTA: Dynamically Optimizing GPU Memory beyond Tensor Recomputation
arXiv
收藏 引用
arXiv 2022年
作者: Tang, Yu Wang, Chenyu Zhang, Yufan Liu, Yuliang Zhang, Xingcheng Qiao, Linbo Lai, Zhiquan Li, Dongsheng Science and Technology on Parallel and Distributed Processing Laboratory United States SenseTime Research Shanghai Artificial Intelligence Laboratory China
Training activations of deep neural networks occupy plenty of GPU memory, especially for large-scale deep neuralnetworks. However, the further development of deep neural networks is hampered by the limited GPU memory ... 详细信息
来源: 评论
Unsupervised Spatio-Temporal State Estimation for Fine-Grained Adaptive Anomaly Diagnosis of Industrial Cyber-Physical Systems
SSRN
收藏 引用
SSRN 2024年
作者: Sun, Haili Huang, Yan Han, Lansheng Fu, Cai Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China National Key Laboratory of Science and Technology on Multispectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS)... 详细信息
来源: 评论
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Haili Huang, Yan Han, Lansheng Fu, Cai Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China National Key Laboratory of Science and Technology on Multispectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS)... 详细信息
来源: 评论
Proposing an intelligent mesh smoothing method with graph neural networks
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Zhichao Chen, Xinhai Yan, Junjun Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology National University of Defense Technology Changsha410073 China
In CFD, mesh smoothing methods are commonly utilized to refine the mesh quality to achieve high-precision numerical simulations. Specifically, optimization-based smoothing is used for high-quality mesh smoothing, but ... 详细信息
来源: 评论
F3A: Fairness-Aware AI-Workloads Allocation Considering Multidimensional User Demands in JointCloud
F3A: Fairness-Aware AI-Workloads Allocation Considering Mult...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Jiacheng Yang Guodong Yi Fei Gao Peichang Shi Huaimin Wang National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Xiangjiang Lab Changsha China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha China
With the rapid growth of large language models, cloud computing has become an indispensable component of the AI industry. Cloud service providers(CSPs) are establishing AI data centers to service AI workloads. In the ... 详细信息
来源: 评论
WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples
WBA: A Warping-based Approach to Generating Imperceptible Ad...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chengyao Hua Shigeng Zhang Weiping Wang Zhankai Li Jian Zhang School of Computer Science and Engineering Central South University Changsha China Science and Technology on Parallel and Distributed Processing Laboratory (PDL)
The human can easily recognize the incongruous parts of an image, for example, perturbations unrelated to the image itself, but are poor at spotting the small geometric transformations. However, in terms of the robust... 详细信息
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features  10th
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Li, Ming Liu, Bo Xing, Guangsheng Wang, Xiaodong Wang, Zhihui College of Intelligence Science and Technology National University of Defence Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology Changsha410073 China
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论
High-performance Network Traffic Classification Based on Graph Neural Network
High-performance Network Traffic Classification Based on Gra...
收藏 引用
IEEE Information technology, Networking, Electronic and Automation Control Conference
作者: Bo Pang Yongquan Fu Siyuan Ren Yan Jia College of Computer Science and Technology Harbin Institute of Technology Shenzhen China National Key Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changesha China Peng Cheng Laboratory Shen Zhen China
Network traffic classification is crucial for network security and network management and is one of the most important network tasks. Current state-of-the-art traffic classifiers are based on deep learning models to a... 详细信息
来源: 评论