咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 158 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 534 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 257 篇 计算机科学与技术...
    • 199 篇 软件工程
    • 50 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 36 篇 生物工程
    • 23 篇 电子科学与技术(可...
    • 22 篇 机械工程
    • 14 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 126 篇 理学
    • 74 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 98 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 laboratories
  • 14 篇 training
  • 13 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 deep neural netw...
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 10 篇 data models
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 accuracy
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware

机构

  • 39 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 school of softwa...
  • 16 篇 national laborat...
  • 16 篇 school of inform...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...
  • 11 篇 national key lab...

作者

  • 25 篇 jin hai
  • 23 篇 wang huaimin
  • 22 篇 li dongsheng
  • 21 篇 hai jin
  • 18 篇 hu shengshan
  • 18 篇 wang yijie
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 14 篇 zhang leo yu
  • 13 篇 ding bo
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin
  • 9 篇 dou yong

语言

  • 500 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=The National Key Laboratory of Parallel and Distributed Computing"
534 条 记 录,以下是171-180 订阅
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Towards Accurate and Efficient Super Spreader Detection with Sketching
Towards Accurate and Efficient Super Spreader Detection with...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Shouyou Song Pu Wang Yangchun Li Nanyang Wang Wei Jiang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT Beijing China Chinese Academy of Cyberspace Studies Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing China School of Computer and Information Engineering Chuzhou University Anhui China
Super spreaders are the flow that have a large number of distinct connections (also called spread), which related with many threats to networks. Estimating flow spread is the crucial step in super spreader detection. ...
来源: 评论
CPCED: a container escape detection system based on CNI plugin
CPCED: a container escape detection system based on CNI plug...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yu Hao Xu Zhang Dongbin Wang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications National Engineering Research Center for Mobile Internet Security Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service Beijing China
Container escape detection is a critical research topic in the field of cloud security. Among the challenges faced in modern cloud security, the issue of container escape poses a significant threat due to its direct i... 详细信息
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
Violence Detection In Videos via Motion-Guided Global and Local Views
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Ning Su Lijuan Sun Yutong Gao Jingchen Wu Xu Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio...
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things
RBCP: A Reputation-based Blockchain Consensus Protocol for I...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Jiaze Shang Tianbo Lu Yingjie Cai Shuang Luo Zhaoxin Jin School of Computer Science (National Pilot Software Enginerring School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
The application of blockchain in the Internet of Things (IoT) solves the problem of centralization, enables data interaction of IoT nodes in untrusted environments. However, most of the blockchain consensus protocols ... 详细信息
来源: 评论
Excitement Surfeited Turns to Errors: Deep Learning Testing Framework Based on Excitable Neurons
arXiv
收藏 引用
arXiv 2022年
作者: Jin, Haibo Chen, Ruoxi Zheng, Haibin Chen, Jinyin Cheng, Yao Yu, Yue Liu, Xianglong College of Information Engineering Zhejiang University of Technology Hangzhou China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou China Huawei International Singapore National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha China State Key Laboratory of Software Development Environment Beihang University Beijing China
Despite impressive capabilities and outstanding performance, deep neural networks (DNNs) have captured increasing public concern about their security problems, due to their frequently occurred erroneous behaviors. The... 详细信息
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
Study of a code comment decision method based on structural features
Study of a code comment decision method based on structural ...
收藏 引用
2019 International Conference on Intelligent computing, Automation and Systems, ICICAS 2019
作者: Wang, Renmin Wang, Tao Wang, Huaimin Key Lab. of Parallel and Distributed Computing National University of Defense Technology Changsha China
Code comment is one of the most effective ways to help programmers to understand the source code. High-quality comment decisions can not only cover the core code snippets in the software system but also avoid generati... 详细信息
来源: 评论