咨询与建议

限定检索结果

文献类型

  • 333 篇 会议
  • 140 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 282 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 54 篇 信息与通信工程
    • 32 篇 生物工程
    • 25 篇 电气工程
    • 21 篇 控制科学与工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 53 篇 数学
    • 35 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
  • 96 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 16 篇 法学
    • 9 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 24 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 15 篇 cloud computing
  • 14 篇 bandwidth
  • 13 篇 semantics
  • 11 篇 servers
  • 11 篇 virtualization
  • 10 篇 deep neural netw...
  • 10 篇 feature extracti...
  • 9 篇 memory managemen...
  • 9 篇 computer archite...
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 computer science
  • 8 篇 operating system...
  • 8 篇 software enginee...
  • 8 篇 mapreduce
  • 8 篇 machine learning
  • 8 篇 privacy

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 53 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 15 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...

作者

  • 211 篇 jin hai
  • 191 篇 hai jin
  • 42 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 31 篇 deqing zou
  • 29 篇 zou deqing
  • 25 篇 wu song
  • 24 篇 shi xuanhua
  • 21 篇 song wu
  • 19 篇 hu shengshan
  • 17 篇 haikun liu
  • 14 篇 jiang xiao
  • 14 篇 ran zheng
  • 13 篇 zhang leo yu
  • 13 篇 yu zhang
  • 12 篇 xia xie
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui
  • 11 篇 zhang hongyu

语言

  • 458 篇 英文
  • 17 篇 其他
  • 6 篇 中文
检索条件"机构=Services Computing Technology and System Lab. Cluster and Grid Computing Lab."
480 条 记 录,以下是171-180 订阅
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
Temporal Knowledge Graph Reasoning via Time-Distributed Representation Learning
Temporal Knowledge Graph Reasoning via Time-Distributed Repr...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Kangzheng Liu Feng Zhao Guandong Xu Xianzhi Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Temporal knowledge graph (TKG) reasoning has attracted significant attention. Recent approaches for modeling historical information have led to great advances. However, the problems of time variability and unseen enti... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
mVulPreter: A Multi-Granularity Vulnerability Detection system With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-lab.l Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-lab.l indiscriminate poisoning attacks add invisible perturbations to correctly lab.led training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
FlashWalker: An In-Storage Accelerator for Graph Random Walks
FlashWalker: An In-Storage Accelerator for Graph Random Walk...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Fuping Niu Jianhui Yue Jiangqiu Shen Xiaofei Liao Haikun Liu Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science Michigan Technological University Houghton Michigan USA
Graph random walk is widely used in the graph processing as it is a fundamental component in graph analysis, ranging from vertices ranking to the graph embedding. Different from traditional graph processing workload, ... 详细信息
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collab.ratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
A Hybrid Memory Architecture Supporting Fine-Grained Data Migration
SSRN
收藏 引用
SSRN 2022年
作者: Chi, Ye Yue, Jianhui Liao, Xiaofei Liu, Haikun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Computer Science Michigan Technological University HoughtonMI United States
We propose Mocha, a non-hierarchical caching architecture that organizes DRAM and NVM in a flat address space physically, but manages DRAM/NVM in a cache/memory hierarchy in this paper. Since the commercial NVM device... 详细信息
来源: 评论