咨询与建议

限定检索结果

文献类型

  • 371 篇 会议
  • 158 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 308 篇 工学
    • 256 篇 计算机科学与技术...
    • 199 篇 软件工程
    • 50 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 36 篇 生物工程
    • 23 篇 电子科学与技术(可...
    • 22 篇 机械工程
    • 14 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 126 篇 理学
    • 74 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 98 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 laboratories
  • 14 篇 training
  • 13 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 deep neural netw...
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...
  • 11 篇 national key lab...

作者

  • 25 篇 jin hai
  • 23 篇 wang huaimin
  • 22 篇 li dongsheng
  • 19 篇 hai jin
  • 18 篇 hu shengshan
  • 18 篇 wang yijie
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 14 篇 zhang leo yu
  • 13 篇 ding bo
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin
  • 9 篇 dou yong

语言

  • 497 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=The National Key Laboratory of Parallel and Distributed Computing"
531 条 记 录,以下是131-140 订阅
排序:
MTD: Multi-Timestep Detector for Delayed Streaming Perception
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Yihui Chen, Ningjiang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University Education Department of Guangxi Zhuang Autonomous Region Nanning China
Autonomous driving systems require real-time environmental perception to ensure user safety and experience. Streaming perception is a task of reporting the current state of the world, which is used to evaluate the del... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Deep Isolation Forest for Anomaly Detection
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Hongzuo Pang, Guansong Wang, Yijie Wang, Yongjun The College of Computer National University of Defense Technology Changsha410073 China The Science and Technology on Parallel and Distributed Processing Laboratory China The School of Computing and Information Systems Singapore Management University 178902 Singapore
Isolation forest (iForest) has been emerging as arguably the most popular anomaly detector in recent years due to its general effectiveness across different benchmarks and strong scalability. Nevertheless, its linear ... 详细信息
来源: 评论
Accelerate Graph Neural Network Training by Reusing Batch Data on GPUs
Accelerate Graph Neural Network Training by Reusing Batch Da...
收藏 引用
IEEE International Conference on Performance, computing and Communications (IPCCC)
作者: Zhejiang Ran Zhiquan Lai Lizhi Zhang Dongsheng Li National Key Laboratory of Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
With the increasing adoption of graph neural networks (GNNs) in the graph-based deep learning community, various graph programming frameworks and models have been developed to improve the productivity of GNNs. The cur... 详细信息
来源: 评论
A Deep Belief Networks Intrusion Detection Method Based on Generative Adversarial Networks
A Deep Belief Networks Intrusion Detection Method Based on G...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Zezhang Zheng Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing School of Computer Electronics and Information Guangxi University (Guangxi University) Nanning China
In response to the substantial threat that Internet attacks pose to data center network security, researchers have proposed several deep learning-based methods for detecting network intrusions. However, while algorith... 详细信息
来源: 评论
SATMask: Spatial Attention Transform Mask for Dense Instance Segmentation  7
SATMask: Spatial Attention Transform Mask for Dense Instance...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Mao, Quanzhong Sun, Lijuan Wu, Jingchen Gao, Yutong Wu, Xu Qiu, Lirong Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service China Bupt School of Cyberspace Security Bupt School of Computer Science National Pilot Software Engineering School Beijing Jiaotong University Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library China
There are often dense objects in the images processed by instance segmentation, but too dense objects will cause the problem that the objects are difficult to segment. Most of the current dense instance segmentation m... 详细信息
来源: 评论
Knowledge Distillation with Source-free Unsupervised Domain Adaptation for BERT Model Compression
Knowledge Distillation with Source-free Unsupervised Domain ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jing Tian Juan Chen Ning Jiang Chen Lin Bai Suqun Huang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Education Department of Guangxi Zhuang Autonomous Region Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Nanning China
The pre-training language model BERT has brought significant performance improvements to a series of natural language processing tasks, but due to the large scale of the model, it is difficult to be applied in many pr...
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer Science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Efficient distributed parallel Aligning Reads and Reference Genome with Many Repetitive Subsequences Using Compact de Bruijn Graph
Efficient Distributed Parallel Aligning Reads and Reference ...
收藏 引用
International Symposium on parallel Architectures, Algorithms and Programming (PAAP)
作者: Yao Li Cheng Zhong Danyang Chen Jinxiong Zhang Mengxiao Yin Key Laboratory of Parallel School of Computer Electronics and Information Distributed Computing Technology in Guangxi Universities Guangxi University Nanning China
A large number of reads generated by the next generation sequencing platform will contain many repetitive subsequences. Effective localizing and identifying genomic regions containing repetitive subsequences will cont... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论