咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 70 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 241 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 75 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 电气工程
    • 9 篇 网络空间安全
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 9 篇 operating system...
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 huazhong univers...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 134 篇 hai jin
  • 45 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 12 篇 xuanhua shi
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 10 篇 ran zheng
  • 9 篇 long zheng
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 225 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Services Computing Technology and System Laboratory"
241 条 记 录,以下是201-210 订阅
排序:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
Survey on overcoming free riding in peer-to-peer networks
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2008年 第1期31卷 1-15页
作者: Yu, Yi-Jiao Jin, Hai Key Laboratory of Services Computing Technology and System Huazhong University of Science and Technology Wuhan 430074 China Key Laboratory of Cluster and Grid Computing of Hubei Province Huazhong University of Science and Technology Wuhan 430074 China
Since the first report of free riding on Gnutella in 2000, large amounts of network measurement results show that free riding is prevalent in almost all Peer-to-Peer (P2P) networks, which reduces the robustness, avail... 详细信息
来源: 评论
Winning at the Starting Line: Joint Network Selection and Service Placement for Mobile Edge computing
Winning at the Starting Line: Joint Network Selection and Se...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Bin Gao Zhi Zhou Fangming Liu Fei Xu Key Laboratory of Services Computing Technology and System Huazhong University of Science and Technology China School of Data and Computer Science Sun Yat-Sen University Guangzhou China School of Computer Science and Software Engineering East China Normal University Shanghai China
Mobile Edge computing (MEC) is an emerging computing paradigm in which computational capabilities are pushed from the central cloud to the network edges. However, preserving the satisfactory quality-of-service (QoS) f... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
On-edge multi-task transfer learning: Model and practice with data-driven task allocation
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Zimu Chen, Qiong Hu, Chuang Wang, Dan Liu, Fangming The National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The Edge Cloud Innovation Lab. Technical Innovation Department Cloud BU Huawei Technologies Co. Ltd. Shenzhen China The Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong Hong Kong
On edge devices, data scarcity occurs as a common problem where transfer learning serves as a widely-suggested remedy. Nevertheless, transfer learning imposes heavy computation burden to the resource-constrained edge ... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论