咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 166 篇 期刊文献

馆藏范围

  • 380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 240 篇 工学
    • 206 篇 计算机科学与技术...
    • 147 篇 软件工程
    • 41 篇 信息与通信工程
    • 32 篇 生物工程
    • 30 篇 控制科学与工程
    • 26 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 仪器科学与技术
    • 4 篇 安全科学与工程
  • 94 篇 理学
    • 50 篇 数学
    • 35 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
    • 10 篇 统计学(可授理学、...
    • 9 篇 物理学
  • 70 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 15 篇 computational mo...
  • 13 篇 semantics
  • 12 篇 memory managemen...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 deep neural netw...
  • 9 篇 machine learning
  • 8 篇 parallel process...
  • 8 篇 scalability
  • 8 篇 feature extracti...
  • 7 篇 task analysis
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency
  • 7 篇 privacy
  • 6 篇 bandwidth
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 graph neural net...

机构

  • 103 篇 national enginee...
  • 59 篇 school of comput...
  • 54 篇 school of cyber ...
  • 38 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 9 篇 school of comput...
  • 9 篇 jinyinhu laborat...
  • 8 篇 school of comput...
  • 7 篇 national enginee...
  • 7 篇 nanyang technolo...

作者

  • 142 篇 jin hai
  • 138 篇 hai jin
  • 44 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 zhang leo yu
  • 15 篇 shi xuanhua
  • 15 篇 yu zhang
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan yao
  • 12 篇 wan wei
  • 12 篇 pengcheng yao

语言

  • 338 篇 英文
  • 38 篇 其他
  • 5 篇 中文
检索条件"机构=Services Computing Technology and System Lab/Big Data Technology"
380 条 记 录,以下是261-270 订阅
排序:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean label
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhou, Ziqi Zhang, Yechao Zhang, Leo Yu Zheng, Yifeng He, Yuanyuan Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Information Technology Deakin University VIC3216 Australia School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security HUST Wuhan430074 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Due to its powerful feature learning capability and high efficiency, deep hashing has achieved great success in large-scale image retrieval. Meanwhile, extensive works have demonstrated that deep neural networks (DNNs... 详细信息
来源: 评论
Corrigendum to “Improved Algorithm for Permutation Testing” [Theoretical Computer Science 986 (2024) 114316]
收藏 引用
Theoretical Computer Science 2024年 999卷
作者: Xiaojin Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
来源: 评论
An autoencoder-like nonnegative matrix co-factorization for improved student cognitive modeling  24
An autoencoder-like nonnegative matrix co-factorization for ...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Shenbao Yu Yinghui Pan Yifeng Zeng Prashant Doshi Guoquan Liu Kim-Leng Poh Mingwei Lin College of Computer and Cyber Security Fujian Normal University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer and Information Sciences Northumbria University UK Intelligent Thought and Action Lab School of Computing University of Georgia Financial Technology Research Institute Fudan University China College of Design and Engineering National University of Singapore Singapore
Student cognitive modeling (SCM) is a fundamental task in intelligent education, with applications ranging from personalized learning to educational resource allocation. By exploiting students' response logs, SCM ...
来源: 评论
Vflh: A Following-the-Leader-History Based Algorithm for Adaptive Online Convex Optimization with Stochastic Constraints
SSRN
收藏 引用
SSRN 2022年
作者: Yang, Yifan Chen, Lin Zhou, Pan Ding, Xiaofeng Department of Computer Science University of California Santa BarbaraCA93106 United States National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430072 China
This paper considers online convex optimization (OCO) with generated i.i.d. stochastic constraints, where the distribution of environment is changing and the performance is measured by \textit{adaptive regret}. The st... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
Efficient COVID-19 detection using data mining algorithms: a comparison of basic and hybrid approaches
收藏 引用
Soft computing 2025年 第3期29卷 1437-1451页
作者: Saidi, Mohammad Gheibi, Mohammad Ghazikhani, Adel Lotfata, Aynaz Chahkandi, Benyamin Familsamavati, Sajad Behzadian, Kourosh Department of Computer Science Imam Reza International University Mashhad Iran MS of Software Engineering Information and Communication Technology Unit Mashhad Municipality Fire and Safety Services Organization Mashhad Iran Big Data Lab Imam Reza International University Mashhad Iran Institute for Nanomaterials Advanced Technologies and Innovation Technical University of Liberec Liberec46117 Czech Republic Tallinn10615 Estonia Department of Pathology Microbiology and Immunology School of Veterinary Medicine University of California Davis95616 United States Department of Urban and Regional Planning San Jose State University San Jose95192 United States Faculty of Civil and Environmental Engineering Gdansk University of Technology Narutowicza Street 11/12 80-233 Gdansk Poland Tecnologico de Monterrey Escuela de Ingeniería y Ciencias Monterrey Mexico School of Computing and Engineering University of West London London United Kingdom
Accurate and efficient diagnosis of COVID-19 remains a significant challenge due to the limitations of current detection methods, such as blood tests and chest scans, which can be time-consuming and error-prone. This ... 详细信息
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
DepGraph: A Dependency-Driven Accelerator for Efficient Iterative Graph Processing
DepGraph: A Dependency-Driven Accelerator for Efficient Iter...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Yu Zhang Xiaofei Liao Hai Jin Ligang He Bingsheng He Haikun Liu Lin Gu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China University of Warwick United Kingdom National University of Singapore Singapore
Many graph processing systems have been recently developed for many-core processors. However, for iterative graph processing, due to the dependencies between vertices' states, the propagations of new states of ver... 详细信息
来源: 评论