咨询与建议

限定检索结果

文献类型

  • 152 篇 会议
  • 98 篇 期刊文献

馆藏范围

  • 250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 144 篇 工学
    • 93 篇 计算机科学与技术...
    • 71 篇 软件工程
    • 40 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 12 篇 航空宇航科学与技...
    • 9 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 7 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 建筑学
  • 66 篇 理学
    • 36 篇 数学
    • 23 篇 生物学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 35 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 农学

主题

  • 9 篇 training
  • 7 篇 electroencephalo...
  • 7 篇 feature extracti...
  • 7 篇 mobile communica...
  • 6 篇 tools
  • 5 篇 software systems
  • 5 篇 bandwidth
  • 5 篇 optimization
  • 5 篇 servers
  • 5 篇 semantics
  • 5 篇 hardware
  • 5 篇 accuracy
  • 4 篇 linux
  • 4 篇 deep learning
  • 4 篇 deep neural netw...
  • 4 篇 software enginee...
  • 4 篇 predictive model...
  • 4 篇 visualization
  • 4 篇 sentiment analys...
  • 4 篇 prediction algor...

机构

  • 22 篇 school of softwa...
  • 21 篇 school of cyber ...
  • 19 篇 school of comput...
  • 18 篇 hubei key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 16 篇 services computi...
  • 15 篇 cluster and grid...
  • 13 篇 school of inform...
  • 12 篇 college of compu...
  • 11 篇 state key labora...
  • 9 篇 cas center for e...
  • 9 篇 tianjin key labo...
  • 9 篇 national enginee...
  • 8 篇 gansu provincial...
  • 7 篇 department of co...
  • 6 篇 national mobile ...
  • 6 篇 joint research c...
  • 6 篇 engineering rese...
  • 5 篇 engineering rese...

作者

  • 16 篇 hu shengshan
  • 16 篇 li minghui
  • 11 篇 zhang leo yu
  • 11 篇 jin hai
  • 10 篇 zhou ziqi
  • 8 篇 hai jin
  • 8 篇 cheol-hoon lee
  • 7 篇 bin hu
  • 7 篇 wan wei
  • 7 篇 wang xianlong
  • 6 篇 minghui li
  • 6 篇 gang zhou
  • 6 篇 do-hyung kim
  • 6 篇 shengshan hu
  • 5 篇 hu bin
  • 5 篇 qinglin zhao
  • 5 篇 xiao yingyuan
  • 5 篇 zhang hangtao
  • 5 篇 sun-ja kim
  • 4 篇 deng yongqiang

语言

  • 223 篇 英文
  • 18 篇 其他
  • 9 篇 中文
检索条件"机构=Software and System Engineering Research Laboratory"
250 条 记 录,以下是41-50 订阅
排序:
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature  39
Breaking Barriers in Physical-World Adversarial Examples: Im...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model's in... 详细信息
来源: 评论
Review of the State-of-the-Art of Data Gloves  8
Review of the State-of-the-Art of Data Gloves
收藏 引用
8th IEEE International Symposium on Smart Electronic systems, iSES 2022
作者: Pan, Mingzhang Tang, Yingzhe Li, Hongqi Guangxi Key Laboratory of Manufacturing System & Advanced Manufacturing Technology School of Mechanical Engineering Guangxi University Nanning530004 China Brain-Controlled Intelligent Systems Laboratory School of Software Northwestern Polytechnical University Xi'an710072 China Yangtze River Delta Research Institute of NPU Taicang215400 China
Human-machine interaction has been the focus of recent research, with data gloves as one of the approaches gaining popularity for their high accuracy and convenience. This paper summarizes the latest research status o... 详细信息
来源: 评论
Analytical Models for QoT Estimations in Super-C and Super-C + L Bands Optical Transmission systems
Analytical Models for QoT Estimations in Super-C and Super-C...
收藏 引用
2023 Conference on Lasers and Electro-Optics, CLEO 2023
作者: Yan, Baoluo Sun, Yijun Zhou, Ziwen Liu, Hong Wang, Hongya Huan, Chen Zhao, Zhiyong Feng, Lipeng Zhang, Anxu Feng, Zhenhua Shi, Hu WDM System Department Wireline Product R&D Institute ZTE Corp. Beijing100029 China State Key Laboratory of Mobile Network and Mobile Multimedia Technology 518055 China School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China School of Optical and Electronic Information Wuhan National Laboratory for Optoelectronics Optics Valley Laboratory Huazhong University of Science and Technology Wuhan China China Telecom Research Institute Beijing102209 China
We propose a novel physical model-based QoT estimation with achieved OSNR estimation error 1.5 dB in primary paths and OSNR prediction error 1.76 dB in unestablished lightpaths for both super-C bands and super-C+L ban... 详细信息
来源: 评论
TPE-H2MWD:an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第8期24卷 1169-1180页
作者: Xiuli CHAI Xiuhui CHEN Yakun MA Fang ZUO Zhihua GAN Yushu ZHANG School of Artificial Intelligence Henan Engineering Research Center for Industrial Internet of ThingsHenan UniversityZhengzhou450046China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China School of Software Intelligent Data Processing Engineering Research Center of Henan ProvinceInstitute of Intelligent Network SystemHenan UniversityKaifeng475004China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing211106China
With the substantial increase in image transmission,the demand for image security is ***-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noi... 详细信息
来源: 评论