咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 166 篇 期刊文献

馆藏范围

  • 380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 240 篇 工学
    • 206 篇 计算机科学与技术...
    • 147 篇 软件工程
    • 41 篇 信息与通信工程
    • 32 篇 生物工程
    • 30 篇 控制科学与工程
    • 26 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 仪器科学与技术
    • 4 篇 安全科学与工程
  • 94 篇 理学
    • 50 篇 数学
    • 35 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
    • 10 篇 统计学(可授理学、...
    • 9 篇 物理学
  • 70 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 15 篇 computational mo...
  • 13 篇 semantics
  • 12 篇 memory managemen...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 deep neural netw...
  • 9 篇 machine learning
  • 8 篇 parallel process...
  • 8 篇 scalability
  • 8 篇 feature extracti...
  • 7 篇 task analysis
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency
  • 7 篇 privacy
  • 6 篇 bandwidth
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 graph neural net...

机构

  • 103 篇 national enginee...
  • 59 篇 school of comput...
  • 54 篇 school of cyber ...
  • 38 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 9 篇 school of comput...
  • 9 篇 jinyinhu laborat...
  • 8 篇 school of comput...
  • 7 篇 national enginee...
  • 7 篇 nanyang technolo...

作者

  • 142 篇 jin hai
  • 138 篇 hai jin
  • 44 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 zhang leo yu
  • 15 篇 shi xuanhua
  • 15 篇 yu zhang
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan yao
  • 12 篇 wan wei
  • 12 篇 pengcheng yao

语言

  • 338 篇 英文
  • 38 篇 其他
  • 5 篇 中文
检索条件"机构=Services Computing Technology and System Lab/Big Data Technology"
380 条 记 录,以下是231-240 订阅
排序:
Accelerating Backward Aggregation in GCN Training with Execution Path Preparing on GPUs
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Shaoxian Shao, Zhiyuan Yang, Ci Liao, Xiaofei Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
The emerging Graph Convolutional Network (GCN) has been widely used in many domains, where it is important to improve the efficiencies of applications by accelerating GCN trainings. Due to the sparsity nature and expl... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
When the Metaverse Meets Carbon Neutrality: Ongoing Efforts and Directions
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Fangming Pei, Qiangyu Chen, Shutong Yuan, Yongjie Wang, Lin Mühlhäuser, Max Huazhong University of Science and Technology Peng Cheng Laboratory China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab The School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China VU Amsterdam Netherlands TU Darmstadt Germany The Telecooperation Lab TU Darmstadt Germany
The metaverse has recently gained increasing attention from the public. It builds up a virtual world where we can live as a new role regardless of the role we play in the physical world. However, building and operatin... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Cross-links matter for link prediction: rethinking the debiased GNN from a data perspective  23
Cross-links matter for link prediction: rethinking the debia...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing systems
作者: Zihan Luo Hong Huang Jianxun Lian Xiran Song Xing Xie Hai Jin National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Microsoft Research Asia Beijing China
Recently, the bias-related issues in GNN-based link prediction have raised widely spread concerns. In this paper, we emphasize the bias on links across different node clusters, which we call cross-links, after conside...
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection
arXiv
收藏 引用
arXiv 2022年
作者: Wan, Wei Hu, Shengshan Lu, Jianrong Yu Zhang, Leo Jin, Hai He, Yuanyuan School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab School of Information Technology Deakin University Australia
Federated learning (FL) enables multiple clients to collaboratively train an accurate global model while protecting clients’ data privacy. However, FL is susceptible to Byzantine attacks from malicious participants. ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
DeepGATGO: A Hierarchical Pretraining-Based Graph-Attention Model for Automatic Protein Function Prediction
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zihao Jiang, Changkun Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Lab for Big Data System Computing Technology Shenzhen University Shenzhen China
Automatic protein function prediction (AFP) is classified as a large-scale multi-label classification problem aimed at automating protein enrichment analysis to eliminate the current reliance on labor-intensive wet-la... 详细信息
来源: 评论