咨询与建议

限定检索结果

文献类型

  • 152 篇 会议
  • 98 篇 期刊文献

馆藏范围

  • 250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 144 篇 工学
    • 93 篇 计算机科学与技术...
    • 71 篇 软件工程
    • 40 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 12 篇 航空宇航科学与技...
    • 9 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 7 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 建筑学
  • 66 篇 理学
    • 36 篇 数学
    • 23 篇 生物学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 35 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 农学

主题

  • 9 篇 training
  • 7 篇 electroencephalo...
  • 7 篇 feature extracti...
  • 7 篇 mobile communica...
  • 6 篇 tools
  • 5 篇 software systems
  • 5 篇 bandwidth
  • 5 篇 optimization
  • 5 篇 servers
  • 5 篇 semantics
  • 5 篇 hardware
  • 5 篇 accuracy
  • 4 篇 linux
  • 4 篇 deep learning
  • 4 篇 deep neural netw...
  • 4 篇 software enginee...
  • 4 篇 predictive model...
  • 4 篇 visualization
  • 4 篇 sentiment analys...
  • 4 篇 prediction algor...

机构

  • 22 篇 school of softwa...
  • 21 篇 school of cyber ...
  • 19 篇 school of comput...
  • 18 篇 hubei key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 16 篇 services computi...
  • 15 篇 cluster and grid...
  • 13 篇 school of inform...
  • 12 篇 college of compu...
  • 11 篇 state key labora...
  • 9 篇 cas center for e...
  • 9 篇 tianjin key labo...
  • 9 篇 national enginee...
  • 8 篇 gansu provincial...
  • 7 篇 department of co...
  • 6 篇 national mobile ...
  • 6 篇 joint research c...
  • 6 篇 engineering rese...
  • 5 篇 engineering rese...

作者

  • 16 篇 hu shengshan
  • 16 篇 li minghui
  • 11 篇 zhang leo yu
  • 11 篇 jin hai
  • 10 篇 zhou ziqi
  • 8 篇 hai jin
  • 8 篇 cheol-hoon lee
  • 7 篇 bin hu
  • 7 篇 wan wei
  • 7 篇 wang xianlong
  • 6 篇 minghui li
  • 6 篇 gang zhou
  • 6 篇 do-hyung kim
  • 6 篇 shengshan hu
  • 5 篇 hu bin
  • 5 篇 qinglin zhao
  • 5 篇 xiao yingyuan
  • 5 篇 zhang hangtao
  • 5 篇 sun-ja kim
  • 4 篇 deng yongqiang

语言

  • 223 篇 英文
  • 18 篇 其他
  • 9 篇 中文
检索条件"机构=Software and System Engineering Research Laboratory"
250 条 记 录,以下是81-90 订阅
排序:
Towards Distractibility Induced trust Management Using BlockChain for Edge Computing
Towards Distractibility Induced trust Management Using Block...
收藏 引用
International Conference on Image, Vision and Intelligent systems, ICIVIS 2021
作者: Yang, Haochen Wang, Guanghui Dong, Lifeng He, Xin School of Software Henan University Kaifeng China Henan Provincial Engineering Research Center of Intelligent Data Processing Kaifeng China Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University Kaifeng China Institute of Intelligent Network System Henan University Kaifeng China Henan Jiuyu Tenglong Information Engineering Co. Ltd. Zhengzhou China
Edge computing solves massive data processing problems by utilizing the storage and computing functions of edge devices. Due to the openness of edge computing, distracted devices inevitably participate in edge computi... 详细信息
来源: 评论
The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论
Distributionally Robust Optimization for Computation Offloading in Aerial Access Networks
Distributionally Robust Optimization for Computation Offload...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Guanwang Jiang Ziye Jia Lijun He Chao Dong Qihui Wu Zhu Han Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China School of Software Northwestern Polytechnical University Xi’an China Department of Electrical and Computer Engineering University of Houston Houston TX USA
With the rapid increment of multiple users for data offloading and computation, it is challenging to guarantee the quality of service (QoS) in remote areas. To deal with the challenge, it is promising to combine aeria... 详细信息
来源: 评论
Determination of chloride concentrations in cement paste with terahertz time-domain spectroscopy(THz-TDS)
Determination of chloride concentrations in cement paste wit...
收藏 引用
IEEE International Conference on Plasma Science (ICOPS)
作者: H. Zhai Y. Qiu L. Gong R. Dan W. Liu L. Hu X. Li Y. Hang F. Shi Y. Li Department of Microelectronics School of Electronic and InformationEngineering Key Laboratory of Micro-Nano Electronics and System Integration of Xi’an City Xi’an Jiaotong University Xi’an China Faculty of Electronic and Information Engineering Key Laboratory of Physical Electronics and Devices Ministry of Education Xi’an Jiaotong University Xi’an China School of Software Engineering Xi’an Jiaotong University Xi’an China Suzhou Nuclear Power Research Institute Suzhou Nuclear Power Research Institute Suzhou China
Cement is a crucial building material. As the service life of a building progresses, erosion can cause changes in the structure and components of the cement, posing a significant safety risk. Therefore, testing the qu... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Gaussian Decay Function-based Improved Moment Matching for Ocular Artifacts Removal
Gaussian Decay Function-based Improved Moment Matching for O...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Jiang, Hua Shi, Qiuxia Liu, Siying Zhang, Jiuying Zhao, Qinglin Hu, Bin Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering China Lanzhou University Key Laboratory of Special Functional Materials and Structural Design Ministry of Education Lanzhou China CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences China Joint Research Center for Cognitive Neurosensor Technology of Lanzhou University Institute of Semiconductors Chinese Academy of Sciences China Engineering Research Center of Open Source Software and Real-Time System Lanzhou University Ministry of Education China
Electroencephalogram (EEG) equipped with high time resolution that distracted by incoherent brain sources which including ocular artifacts (OAs) generating by blinks is of great significance. Therefore, these OAs got ... 详细信息
来源: 评论
Att-TCN: An Advertising Attribution Method Based on Temporal Convolutional Network with Attention Mechanism
Att-TCN: An Advertising Attribution Method Based on Temporal...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Bowen Xie Yi Sun Zhaowen Lin Baoquan Ma School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Technologies Beijing China National Computer System Engineering Research Institute of China Beijing China National Engineering Laboratory for Industry Control System Information Security Technology Beijing China
Advertising attribution is an effective method to measure the effect of various advertisements in the era of Internet advertising. It enables scientific tracking back and refined operation of advertising by quantitati... 详细信息
来源: 评论
Characterization of antioxidant concentration using terahertz time-domain spectroscopy (THz-TDS) in Ethylene-Vinyl-Acetate-Copolymer (EVA)
Characterization of antioxidant concentration using terahert...
收藏 引用
IEEE International Conference on Plasma Science (ICOPS)
作者: L. Gong Y. Qiu H. Zhai R. Dan Y. Dang Y. Hang F. Shi Y. Zhai L. Hu W. Liu X. Li Y. Li Faculty of Electronic and Information Engineering Key Laboratory of Physical Electronics and Devices Ministry of Education Xi’an Jiaotong University Xi’an China Department of Microelectronics School of Electronic and Information Engineering Key Laboratory of Micro-Nano Electronics and System Integration of Xi’an City Xi’an Jiaotong University Xi’an China School of Software Engineering Xi’an Jiaotong University Xi’an China China Guangdong Nuclear Power Suzhou Nuclear Power Research Institute Suzhou China
Ethylene-vinyl acetate copolymer (EVA) is a significant material for sealing and insulation with crucial applications in the nuclear power industry. As the service life increases, aerobic conditions induce an oxidatio... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论