咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 166 篇 期刊文献

馆藏范围

  • 373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 198 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 41 篇 信息与通信工程
    • 32 篇 生物工程
    • 29 篇 控制科学与工程
    • 25 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 13 篇 机械工程
    • 13 篇 动力工程及工程热...
    • 9 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 5 篇 安全科学与工程
  • 90 篇 理学
    • 50 篇 数学
    • 35 篇 生物学
    • 12 篇 化学
    • 10 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 8 篇 系统科学
  • 66 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 22 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 15 篇 computational mo...
  • 13 篇 semantics
  • 12 篇 training
  • 11 篇 deep learning
  • 11 篇 memory managemen...
  • 11 篇 machine learning
  • 10 篇 deep neural netw...
  • 9 篇 feature extracti...
  • 8 篇 parallel process...
  • 8 篇 scalability
  • 7 篇 task analysis
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 bandwidth
  • 6 篇 optimization
  • 6 篇 codes

机构

  • 102 篇 national enginee...
  • 60 篇 school of comput...
  • 53 篇 school of cyber ...
  • 38 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 17 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 10 篇 jinyinhu laborat...
  • 9 篇 school of comput...
  • 9 篇 national enginee...
  • 8 篇 school of comput...
  • 7 篇 national enginee...
  • 7 篇 national enginee...

作者

  • 138 篇 hai jin
  • 136 篇 jin hai
  • 44 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 24 篇 liao xiaofei
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 zou deqing
  • 19 篇 deqing zou
  • 17 篇 zhang leo yu
  • 16 篇 shi xuanhua
  • 15 篇 yu zhang
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 wan yao
  • 13 篇 jiang xiao
  • 12 篇 zhang hongyu
  • 12 篇 wan wei
  • 12 篇 pengcheng yao

语言

  • 287 篇 英文
  • 82 篇 其他
  • 5 篇 中文
检索条件"机构=Services Computing Technology and System Lab/Big Data Technology"
373 条 记 录,以下是31-40 订阅
排序:
Anole: A Lightweight and Verifiable Learned-Based Index for Time Range Query on Blockchain systems  28th
Anole: A Lightweight and Verifiable Learned-Based Index for...
收藏 引用
28th International Conference on database systems for Advanced Applications, DASFAA 2023
作者: Chang, Jian Li, Binhong Xiao, Jiang Lin, Licheng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Time range query is essential to facilitate a wide range of blockchain applications such as data provenance in the supply chain. Existing blockchain systems adopt the storage-consuming tree-based index structure for b... 详细信息
来源: 评论
Maverick: Personalized Edge-Assisted Federated Learning with Contrastive Training  25
Maverick: Personalized Edge-Assisted Federated Learning with...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Wang, Kaibin He, Qiang Dong, Zeqian Chen, Rui He, Chuan Chua, Caslon Chen, Feifei Yang, Yun Swinburne University of Technology Melbourne Australia Huazhong University of Science and Technology Wuhan China Deakin University Melbourne Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In an edge-assisted federated learning (FL) system, edge servers aggregate the local models from the clients within their coverage areas to produce intermediate models for the production of the global model. This sign... 详细信息
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of Computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Optimizing the Copy-on-Write Mechanism of Docker by Dynamic Prefetching
收藏 引用
Tsinghua Science and technology 2021年 第3期26卷 266-274页
作者: Yan Jiang Wei Liu Xuanhua Shi Weizhong Qiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHuazhong University of Science and TechnologyWuhan 430074China
Docker,as a mainstream container solution,adopts the Copy-on-Write(CoW)mechanism in its storage *** mechanism satisfies the need of different containers to share the same ***,when a single container performs operation... 详细信息
来源: 评论
Towards High-throughput and Low-latency Billion-scale Vector Search via CPU/GPU Collaborative Filtering and Re-ranking  23
Towards High-throughput and Low-latency Billion-scale Vector...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Tian, Bing Liu, Haikun Tang, Yuhang Xiao, Shihai Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Xuecang Zhu, Junhua Zhang, Yu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd. China
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure. Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy ... 详细信息
来源: 评论
RETIA: Relation-Entity Twin-Interact Aggregation for Temporal Knowledge Graph Extrapolation  39
RETIA: Relation-Entity Twin-Interact Aggregation for Tempora...
收藏 引用
39th IEEE International Conference on data Engineering, ICDE 2023
作者: Liu, Kangzheng Zhao, Feng Xu, Guandong Wang, Xianzhi Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China University of Technology Sydney Data Science and Machine Intelligence Lab Sydney Australia
Temporal knowledge graph (TKG) extrapolation aims to predict future unknown events (facts) based on historical information, and has attracted considerable attention due to its great practical significance. Accurate re... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors  39
NumbOD: A Spatial-Frequency Fusion Attack Against Object Det...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature  39
Breaking Barriers in Physical-World Adversarial Examples: Im...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model's in... 详细信息
来源: 评论
An Efficient Graph Accelerator with Distributed On-Chip Memory Hierarchy  22nd
An Efficient Graph Accelerator with Distributed On-Chip Mem...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Zheng, Ran Jiang, Yingxin Wang, Yibo Su, Yongbo Zheng, Long Yao, Pengcheng Liao, Xiaofei Jin, Hai National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
Graph processing has evolved and expanded swiftly with artificial intelligence and big data technology. High-Bandwidth Memory (HBM), which delivers terabyte-level memory bandwidth, has opened up new development possib... 详细信息
来源: 评论