咨询与建议

限定检索结果

文献类型

  • 53 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 88 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 43 篇 计算机科学与技术...
    • 32 篇 软件工程
    • 16 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 9 篇 生物工程
    • 7 篇 电气工程
    • 3 篇 光学工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
  • 18 篇 理学
    • 9 篇 生物学
    • 8 篇 数学
    • 3 篇 物理学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 化学
  • 18 篇 管理学
    • 11 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 4 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 4 篇 linux
  • 4 篇 training
  • 3 篇 knowledge engine...
  • 3 篇 deep neural netw...
  • 3 篇 costs
  • 3 篇 software
  • 3 篇 open source soft...
  • 2 篇 software systems
  • 2 篇 water quality
  • 2 篇 application soft...
  • 2 篇 computer archite...
  • 2 篇 systems engineer...
  • 2 篇 convolution
  • 2 篇 yarn
  • 2 篇 codes
  • 2 篇 machine learning
  • 2 篇 embedded system
  • 2 篇 mobile communica...
  • 2 篇 embedded computi...
  • 2 篇 hardware

机构

  • 19 篇 school of comput...
  • 18 篇 school of softwa...
  • 18 篇 school of cyber ...
  • 17 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...
  • 14 篇 cluster and grid...
  • 11 篇 school of inform...
  • 5 篇 national enginee...
  • 4 篇 school of big da...
  • 4 篇 dept. of compute...
  • 3 篇 state key lab. o...
  • 3 篇 faculty of compu...
  • 3 篇 state key labora...
  • 3 篇 engineering rese...
  • 3 篇 distributed & em...
  • 2 篇 school of mathem...
  • 2 篇 school of comput...
  • 2 篇 department of ps...

作者

  • 13 篇 hu shengshan
  • 13 篇 jin hai
  • 13 篇 li minghui
  • 10 篇 hai jin
  • 9 篇 zhang leo yu
  • 7 篇 zhou ziqi
  • 6 篇 wan wei
  • 6 篇 minghui li
  • 6 篇 shengshan hu
  • 5 篇 lee cheol-hoon
  • 5 篇 wang xianlong
  • 4 篇 wan yao
  • 4 篇 xue lulu
  • 4 篇 leo yu zhang
  • 4 篇 kim do-hyung
  • 4 篇 liu wei
  • 4 篇 zhang hangtao
  • 4 篇 zhang yechao
  • 4 篇 qingguo zhou
  • 3 篇 lei zhou

语言

  • 80 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Software and System Engineering Research Lab"
88 条 记 录,以下是21-30 订阅
排序:
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Zhangqian Bi Yao Wan Zhaoyang Chu Yufei Hu Junyi Zhang Hongyu Zhang Guandong Xu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
SMOG: Accelerating Subgraph Matching on GPUs
SMOG: Accelerating Subgraph Matching on GPUs
收藏 引用
IEEE Conference on High Performance Extreme Computing (HPEC)
作者: Zhibin Wang Ziheng Meng Xue Li Xi Lin Long Zheng Chen Tian Sheng Zhong State Key Laboratory for Novel Software Technology Nanjing University Alibaba Group“ National Engineering Research Center for Big Data Technology and System/ Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Zhejiang Lab
Subgraph matching is a crucial problem in graph theory with diverse applications in fields, such as bioinformatics, social networks and recommendation systems. Accelerating subgraph matching can be greatly facilitated...
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
CPL-SLAM: Centralized Collaborative Multi-Robot Visual-Inertial SLAM Using Point-and-Line Features
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Xin Wen, Shuhuan Liu, Huaping Richard Yu, F. Yanshan University Engineering Research Center The Ministry of Education for Intelligent Control System and Intelligent Equipment Key Lab of Intelligent Rehabilitation and Neuroregulation in Hebei Province Department of Key Lab of Industrial Computer Control Engineering of Hebei Province Qinhuangdao066004 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Shenzhen University College of Computer Science and Software Engineering China Carleton University Canada
Traditional visual-inertial SLAM (Simultaneous Localization and Mapping) systems predominantly rely on feature point matching from a single robot to realize the robot pose estimation and environment map construction. ... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on software engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
A Dynamic Load Balancing Algorithm for Stable Pushing of Docker Images in Nginx
A Dynamic Load Balancing Algorithm for Stable Pushing of Doc...
收藏 引用
International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)
作者: Hajie Xi Song Hu He Zhang Shuang Zhang Jingnong Weng Jian Huang School of Computer Science and Engineering Beihang University Beijing China State Key Lab of Transportation System Research Institute of Highway Ministry of Transport Beijing China Transportation Comprehensive Enforcement Corps Beijing China School of Software Beihang University Beijing China
With the rapid development of artificial intelligence, a wide variety of deep learning models have emerged across various fields. Nevertheless, the quality of these models varies significantly, making the effective ev... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论