咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 166 篇 期刊文献

馆藏范围

  • 380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 240 篇 工学
    • 206 篇 计算机科学与技术...
    • 147 篇 软件工程
    • 41 篇 信息与通信工程
    • 32 篇 生物工程
    • 30 篇 控制科学与工程
    • 26 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 仪器科学与技术
    • 4 篇 安全科学与工程
  • 94 篇 理学
    • 50 篇 数学
    • 35 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
    • 10 篇 统计学(可授理学、...
    • 9 篇 物理学
  • 70 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 15 篇 computational mo...
  • 13 篇 semantics
  • 12 篇 memory managemen...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 deep neural netw...
  • 9 篇 machine learning
  • 8 篇 parallel process...
  • 8 篇 scalability
  • 8 篇 feature extracti...
  • 7 篇 task analysis
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency
  • 7 篇 privacy
  • 6 篇 bandwidth
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 graph neural net...

机构

  • 103 篇 national enginee...
  • 59 篇 school of comput...
  • 54 篇 school of cyber ...
  • 38 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 9 篇 school of comput...
  • 9 篇 jinyinhu laborat...
  • 8 篇 school of comput...
  • 7 篇 national enginee...
  • 7 篇 nanyang technolo...

作者

  • 142 篇 jin hai
  • 138 篇 hai jin
  • 44 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 zhang leo yu
  • 15 篇 shi xuanhua
  • 15 篇 yu zhang
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan yao
  • 12 篇 wan wei
  • 12 篇 pengcheng yao

语言

  • 338 篇 英文
  • 38 篇 其他
  • 5 篇 中文
检索条件"机构=Services Computing Technology and System Lab/Big Data Technology"
380 条 记 录,以下是211-220 订阅
排序:
Graft: Efficient Inference Serving for Hybrid Deep Learning with SLO Guarantees via DNN Re-alignment
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Jing Wang, Lin Jin, Qirui Liu, Fangming The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in The School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China Paderborn University TU Darmstadt Germany Peng Cheng Laboratory Huazhong University of Science and Technology China
Deep neural networks (DNNs) have been widely adopted for various mobile inference tasks, yet their ever-increasing computational demands are hindering their deployment on resource-constrained mobile devices. Hybrid de... 详细信息
来源: 评论
Comprehensive Architecture Search for Deep Graph Neural Networks
收藏 引用
IEEE Transactions on big data 2025年
作者: Dong, Yukang Pan, Fanxing Gui, Yi Jiang, Wenbin Wan, Yao Zheng, Ran Jin, Hai National Engineering Research Center for Big Data Technology Huazhong University of Science and Technology Wuhan430074 China Huazhong University of Science and Technology Service Computing Technology and System Laboratory Wuhan430074 China Huazhong University of Science and Technology Cluster and Grid Computing Laboratory Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
In recent years, Neural Architecture Search (NAS) has emerged as a promising approach for automatically discovering superior model architectures for deep Graph Neural Networks (GNNs). Different methods have paid atten... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Towards high-throughput and low-latency billion-scale vector search via CPU/GPU collaborative filtering and re-ranking  25
Towards high-throughput and low-latency billion-scale vector...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Bing Tian Haikun Liu Yuhang Tang Shihai Xiao Zhuohui Duan Xiaofei Liao Hai Jin Xuecang Zhang Junhua Zhu Yu Zhang National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd Towards high-throughput and low-latency billion-scale vector search via CPU/GPU collaborative filtering and re-ranking
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure. Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy ...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
GIDN: A Lightweight Graph Inception Diffusion Network for High-efficient Link Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Zixiao Guo, Yuluo Zhao, Jin Zhang, Yu Yu, Hui Liao, Xiaofei Wang, Biao Yu, Ting National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
In this paper, we propose a Graph Inception Diffusion Networks(GIDN) model. This model generalizes graph diffusion in different feature spaces, and uses the inception module to avoid the large amount of computations c... 详细信息
来源: 评论
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Network for Segmenting Pathology Lesion of the Focal Lymphocytic Sialadenitis
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Ne...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Hao Han Feng Lu Yanhan Deng Xiaofang Luo Hai Jin Wei Tu Xia Xie National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Tongji Hospital Tongji Medical College Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
In the medical realm, the pivotal role of pathological Whole Slide Images (WSIs) in detecting cancer, tracking disease progression, and evaluating treatment efficacy is indisputable. Nevertheless, the identification a...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Towards Efficient data-Centric Robust Machine Learning with Noise-based Augmentation
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Xiaogeng Wang, Haoyu Zhang, Yechao Wu, Fangzhou Hu, Shengshan School Of Cyber Science And Engineering National Engineering Research Center For Big Data Technology And System Services Computing Technology And System Lab Hubei Engineering Research Center On Big Data Security Huazhong University Of Science And Technology Wuhan430074 China
The data-centric machine learning aims to find effective ways to build appropriate datasets which can improve the performance of AI models. In this paper, we mainly focus on designing an efficient data-centric scheme ... 详细信息
来源: 评论