咨询与建议

限定检索结果

文献类型

  • 409 篇 会议
  • 193 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 609 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 333 篇 计算机科学与技术...
    • 232 篇 软件工程
    • 58 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 37 篇 生物工程
    • 27 篇 电气工程
    • 21 篇 电子科学与技术(可...
    • 17 篇 机械工程
    • 17 篇 动力工程及工程热...
    • 17 篇 网络空间安全
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 8 篇 化学工程与技术
    • 8 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 6 篇 土木工程
    • 6 篇 安全科学与工程
    • 5 篇 材料科学与工程(可...
  • 133 篇 理学
    • 78 篇 数学
    • 40 篇 生物学
    • 17 篇 系统科学
    • 15 篇 统计学(可授理学、...
    • 13 篇 化学
    • 11 篇 物理学
  • 121 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
  • 4 篇 文学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 40 篇 grid computing
  • 27 篇 computational mo...
  • 20 篇 scalability
  • 19 篇 computer archite...
  • 19 篇 virtual machinin...
  • 17 篇 bandwidth
  • 17 篇 servers
  • 15 篇 computer science
  • 15 篇 virtualization
  • 14 篇 cloud computing
  • 13 篇 memory managemen...
  • 13 篇 semantics
  • 12 篇 costs
  • 12 篇 hardware
  • 11 篇 operating system...
  • 11 篇 deep neural netw...
  • 11 篇 feature extracti...
  • 10 篇 resource managem...
  • 10 篇 computers
  • 10 篇 machine learning

机构

  • 102 篇 national enginee...
  • 70 篇 services computi...
  • 63 篇 school of comput...
  • 48 篇 school of cyber ...
  • 32 篇 national enginee...
  • 30 篇 cluster and grid...
  • 28 篇 services computi...
  • 28 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 25 篇 hubei key labora...
  • 22 篇 cluster and grid...
  • 20 篇 school of softwa...
  • 16 篇 school of inform...
  • 14 篇 cluster and grid...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 9 篇 department of co...

作者

  • 244 篇 hai jin
  • 225 篇 jin hai
  • 62 篇 xiaofei liao
  • 46 篇 liao xiaofei
  • 35 篇 deqing zou
  • 28 篇 zou deqing
  • 26 篇 song wu
  • 24 篇 wu song
  • 23 篇 haikun liu
  • 22 篇 shi xuanhua
  • 21 篇 long zheng
  • 21 篇 hu shengshan
  • 18 篇 yu zhang
  • 16 篇 xuanhua shi
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 15 篇 ran zheng
  • 14 篇 yuan pingpeng
  • 14 篇 wan yao
  • 14 篇 zhang leo yu

语言

  • 524 篇 英文
  • 79 篇 其他
  • 7 篇 中文
检索条件"机构=Service Computing Technology and System Lab/Cluster and Grid Computing Lab"
609 条 记 录,以下是61-70 订阅
排序:
mVulPreter: A Multi-Granularity Vulnerability Detection system With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论
SumPA: Efficient Pattern-Centric Graph Mining with Pattern Abstraction  21
SumPA: Efficient Pattern-Centric Graph Mining with Pattern A...
收藏 引用
Proceedings of the 30th International Conference on Parallel Architectures and Compilation Techniques
作者: Chuangyi Gui Xiaofei Liao Long Zheng Pengcheng Yao Qinggang Wang Hai Jin National Engineering Research Center for Big Data Technology and System/Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Graph mining aims to explore interesting structural information of a graph. Pattern-centric systems typically transform a generic-purpose graph mining problem into a series of subgraph matching problems for high perfo... 详细信息
来源: 评论
PipeEdge: A Trusted Pipelining Collaborative Edge Training based on Blockchain  23
PipeEdge: A Trusted Pipelining Collaborative Edge Training b...
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Yuan, Liang He, Qiang Chen, Feifei Dou, Ruihan Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Mathematics University of Waterloo Canada National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Powered by the massive data generated by the blossom of mobile and Web-of-Things (WoT) devices, Deep Neural Networks (DNNs) have developed both in accuracy and size in recent years. Conventional cloud-based DNN traini... 详细信息
来源: 评论
MeG2: In-Memory Acceleration for Genome Graphs Analysis  23
MeG2: In-Memory Acceleration for Genome Graphs Analysis
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Yu Huang Long Zheng Haifeng Liu Zhuoran Zhou Dan Chen Pengcheng Yao Qinggang Wang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China and Zhejiang Lab Hangzhou China National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
Genome graphs analysis has emerged as an effective means to enable mapping DNA fragments (known as reads) to the reference genome. It replaces the traditional linear reference with a graph-based representation to augm...
来源: 评论
xGCN: An Extreme Graph Convolutional Network for Large-scale Social Link Prediction  23
xGCN: An Extreme Graph Convolutional Network for Large-scale...
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Song, Xiran Lian, Jianxun Huang, Hong Luo, Zihan Zhou, Wei Lin, Xue Wu, Mingqi Li, Chaozhuo Xie, Xing Jin, Hai Huazhong University of Science and Technology Wuhan China Microsoft Research Asia Beijing China Microsoft Gaming Redmond United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Graph neural networks (GNNs) have seen widespread usage across multiple real-world applications, yet in transductive learning, they still face challenges in accuracy, efficiency, and scalability, due to the extensive ... 详细信息
来源: 评论
Demystifying Ethereum account diversity:observations,models and analysis
收藏 引用
Frontiers of Computer Science 2022年 第4期16卷 119-130页
作者: Chaofan Wang Xiaohai Dai Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin Clusters and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Centre for Distributed and High Performance Computing School of Information TechnologiesThe University of SydneyCamperdownNew South Wales2006Australia
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart *** massive accounts can be divided into diverse categories,such as miners,toke... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors  39
NumbOD: A Spatial-Frequency Fusion Attack Against Object Det...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature  39
Breaking Barriers in Physical-World Adversarial Examples: Im...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model's in... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Resource abstraction and data placement for distributed hybrid memory pool
收藏 引用
Frontiers of Computer Science 2021年 第3期15卷 47-57页
作者: Tingting CHEN Haikun LIU Xiaofei LIAO Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Gluster and Grid Computing LabSchool of Gomputing Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Emerging byte-addressable non-volatile memory(NVM)technologies offer higher density and lower cost than DRAM,at the expense of lower performance and limited write *** have been many studies on hybrid NVM/DRAM memory m... 详细信息
来源: 评论