咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 464 篇 期刊文献

馆藏范围

  • 971 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 591 篇 工学
    • 452 篇 计算机科学与技术...
    • 355 篇 软件工程
    • 120 篇 信息与通信工程
    • 94 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 50 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 31 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 14 篇 仪器科学与技术
    • 13 篇 土木工程
  • 251 篇 理学
    • 125 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 22 篇 化学
    • 22 篇 系统科学
  • 148 篇 管理学
    • 97 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 36 篇 法学
    • 24 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 4 篇 军事学
  • 3 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学

主题

  • 46 篇 semantics
  • 30 篇 feature extracti...
  • 26 篇 deep learning
  • 26 篇 computational mo...
  • 26 篇 privacy
  • 22 篇 federated learni...
  • 21 篇 blockchain
  • 20 篇 security
  • 20 篇 training
  • 19 篇 machine learning
  • 17 篇 data models
  • 16 篇 graph neural net...
  • 16 篇 accuracy
  • 15 篇 authentication
  • 14 篇 neural networks
  • 14 篇 optimization
  • 14 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 memory managemen...
  • 13 篇 contrastive lear...

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 67 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 50 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 41 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 shenzhen huazhon...
  • 20 篇 school of inform...
  • 18 篇 the hubei engine...

作者

  • 126 篇 hai jin
  • 119 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 deqing zou
  • 16 篇 das ashok kumar
  • 16 篇 mahmood khalid
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 879 篇 英文
  • 79 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
971 条 记 录,以下是1-10 订阅
排序:
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
science China(Information sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
On the security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Precise control of page cache for containers
收藏 引用
Frontiers of Computer science 2024年 第2期18卷 17-30页
作者: Kun WANG Song WU Shengbang LI Zhuo HUANG Hao FAN Chen YU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause signi... 详细信息
来源: 评论
Answering reachability queries with ordered label constraints over labeled graphs
收藏 引用
Frontiers of Computer science 2024年 第1期18卷 105-117页
作者: Daoliang HE Pingpeng YUAN Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science&TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Labe... 详细信息
来源: 评论
Minimal Context-Switching data Race Detection with dataflow Tracking
收藏 引用
Journal of Computer science & technology 2024年 第1期39卷 211-226页
作者: 郑龙 李洋 辛杰 刘海峰 郑然 廖小飞 金海 National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
data race is one of the most important concurrent anomalies in multi-threaded *** con-straint-based techniques are leveraged into race detection,which is able to find all the races that can be found by any oth-er soun... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
ARCHER:a ReRAM-based accelerator for compressed recommendation systems
收藏 引用
Frontiers of Computer science 2024年 第5期18卷 147-160页
作者: Xinyang SHEN Xiaofei LIAO Long ZHENG Yu HUANG Dan CHEN Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they... 详细信息
来源: 评论
Evaluating RISC-V Vector Instruction Set Architecture Extension with Computer Vision Workloads
收藏 引用
Journal of Computer science & technology 2023年 第4期38卷 807-820页
作者: 李若时 彭平 邵志远 金海 郑然 National Engineering Research Center for Big Data Technology and System Huazhong University of Science and Technology Wuhan 430074China Services Computing Technology and System Laboratory Huazhong University of Science and TechnologyWuhan 430074 China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Computer vision(CV)algorithms have been extensively used for a myriad of applications *** the multimedia data are generally well-formatted and regular,it is beneficial to leverage the massive parallel processing power... 详细信息
来源: 评论