咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 67 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 153 篇 工学
    • 127 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 49 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 20 篇 电气工程
    • 18 篇 生物工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 化学工程与技术
    • 8 篇 动力工程及工程热...
    • 8 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 交通运输工程
  • 72 篇 理学
    • 42 篇 数学
    • 20 篇 生物学
    • 12 篇 物理学
    • 11 篇 化学
    • 8 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 54 篇 管理学
    • 33 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 8 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 8 篇 software enginee...
  • 7 篇 semantics
  • 7 篇 web services
  • 7 篇 training
  • 4 篇 linux
  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 machine learning
  • 4 篇 software
  • 3 篇 computer science
  • 3 篇 software systems
  • 3 篇 knowledge engine...
  • 3 篇 reliability
  • 3 篇 deep learning
  • 3 篇 operating system...
  • 3 篇 electronic mail
  • 3 篇 quality of servi...
  • 3 篇 energy consumpti...
  • 3 篇 costs
  • 3 篇 topology

机构

  • 19 篇 school of comput...
  • 18 篇 school of softwa...
  • 18 篇 school of cyber ...
  • 17 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...
  • 14 篇 cluster and grid...
  • 11 篇 school of inform...
  • 9 篇 state key lab. o...
  • 5 篇 national enginee...
  • 4 篇 college of compu...
  • 4 篇 school of big da...
  • 4 篇 dept. of compute...
  • 4 篇 national univers...
  • 4 篇 state key lab of...
  • 4 篇 national enginee...
  • 4 篇 system and softw...
  • 4 篇 school of electr...
  • 4 篇 system and softw...

作者

  • 13 篇 hu shengshan
  • 13 篇 jin hai
  • 13 篇 li minghui
  • 11 篇 baik doo-kwon
  • 11 篇 hai jin
  • 9 篇 zhang leo yu
  • 9 篇 lee cheol-hoon
  • 7 篇 zhou ziqi
  • 6 篇 jonckers viviane
  • 6 篇 wan wei
  • 6 篇 vanderperren wim
  • 6 篇 minghui li
  • 6 篇 d'hondt maja
  • 6 篇 shengshan hu
  • 5 篇 lee jae-woo
  • 5 篇 wang xianlong
  • 4 篇 wan yao
  • 4 篇 xue lulu
  • 4 篇 leo yu zhang
  • 4 篇 kim do-hyung

语言

  • 206 篇 英文
  • 7 篇 中文
  • 5 篇 其他
  • 1 篇 德文
检索条件"机构=System and Software Engineering Lab"
219 条 记 录,以下是31-40 订阅
排序:
CPL-SLAM: Centralized Collaborative Multi-Robot Visual-Inertial SLAM Using Point-and-Line Features
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Xin Wen, Shuhuan Liu, Huaping Richard Yu, F. Yanshan University Engineering Research Center The Ministry of Education for Intelligent Control System and Intelligent Equipment Key Lab of Intelligent Rehabilitation and Neuroregulation in Hebei Province Department of Key Lab of Industrial Computer Control Engineering of Hebei Province Qinhuangdao066004 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Shenzhen University College of Computer Science and Software Engineering China Carleton University Canada
Traditional visual-inertial SLAM (Simultaneous Localization and Mapping) systems predominantly rely on feature point matching from a single robot to realize the robot pose estimation and environment map construction. ... 详细信息
来源: 评论
RGB-D Fusion Network for Glass Segmentation
SSRN
收藏 引用
SSRN 2024年
作者: Tao, Tao Yang, Jianfeng Xiao, Jinsheng Zheng, Hong Wang, Hanfang School of Electronic information Wuhan University Wuhan China Lab. of Industrial IoT System Wuhan China Wuhan Vocational College of Software and Engineering Wuhan Open University Wuhan China Guangdong University of Technology China
Due to the optical properties of glass materials, most glass appears transparent in RGB images. However, in depth images, different acquisition methods make glass visible. Therefore, Therefore, using RGB-D dual-channe... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on software engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
A Lightweight CNN-Based Pothole Detection Model for Embedded systems Using Knowledge Distillation  21
A Lightweight CNN-Based Pothole Detection Model for Embedded...
收藏 引用
21st International Conference on New Trends in Intelligent software Methodologies, Tools and Techniques, SoMeT 2022
作者: Musa, Aminu Hassan, Mohammed Hamada, Mohamed Kakudi, Habeebah Adamu Amin, Md. Faizul Ibne Watanobe, Yutaka Department of Computer Science Federal University Dutse Nigeria Faculty of Computer Sci. & Info. Technology Bayero University Kano Nigeria Software Engineering Lab University of Aizu Japan Graduate School of Computer Science University of Aizu Japan Division of Information System University of Aizu Japan
Recent breakthroughs in computer vision have led to the invention of several intelligent systems in different sectors. In transportation, this advancement led to the possibility of proposing autonomous vehicles. This ... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
A Dynamic Load Balancing Algorithm for Stable Pushing of Docker Images in Nginx
A Dynamic Load Balancing Algorithm for Stable Pushing of Doc...
收藏 引用
International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)
作者: Hajie Xi Song Hu He Zhang Shuang Zhang Jingnong Weng Jian Huang School of Computer Science and Engineering Beihang University Beijing China State Key Lab of Transportation System Research Institute of Highway Ministry of Transport Beijing China Transportation Comprehensive Enforcement Corps Beijing China School of Software Beihang University Beijing China
With the rapid development of artificial intelligence, a wide variety of deep learning models have emerged across various fields. Nevertheless, the quality of these models varies significantly, making the effective ev... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论