咨询与建议

限定检索结果

文献类型

  • 522 篇 会议
  • 473 篇 期刊文献

馆藏范围

  • 995 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 596 篇 工学
    • 459 篇 计算机科学与技术...
    • 359 篇 软件工程
    • 124 篇 信息与通信工程
    • 98 篇 电气工程
    • 74 篇 控制科学与工程
    • 60 篇 生物工程
    • 50 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 29 篇 安全科学与工程
    • 27 篇 网络空间安全
    • 26 篇 生物医学工程(可授...
    • 25 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 16 篇 建筑学
    • 15 篇 交通运输工程
    • 14 篇 仪器科学与技术
  • 252 篇 理学
    • 123 篇 数学
    • 80 篇 生物学
    • 49 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 23 篇 化学
    • 21 篇 系统科学
  • 150 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 33 篇 feature extracti...
  • 31 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 26 篇 deep learning
  • 23 篇 security
  • 22 篇 accuracy
  • 22 篇 training
  • 21 篇 machine learning
  • 21 篇 blockchain
  • 18 篇 graph neural net...
  • 18 篇 data models
  • 16 篇 optimization
  • 16 篇 data mining
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 84 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 27 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 19 篇 shenzhen huazhon...
  • 19 篇 school of inform...
  • 18 篇 the hubei engine...

作者

  • 126 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 mahmood khalid
  • 14 篇 das ashok kumar
  • 14 篇 yu huang
  • 13 篇 wan yao
  • 13 篇 jiang xiao

语言

  • 766 篇 英文
  • 217 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
995 条 记 录,以下是111-120 订阅
排序:
Efficient Remote Memory Paging for Disaggregated Memory Systems  1
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Wang, Tao Liu, Haikun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Memory disaggregation has attracted increasing attention in recent years because it is a cost-efficient approach to scale memory capacity for applications in a data center. However, the latency of remote memory access... 详细信息
来源: 评论
Anole: A Lightweight and Verifiable Learned-Based Index for Time Range Query on Blockchain Systems  28th
Anole: A Lightweight and Verifiable Learned-Based Index for...
收藏 引用
28th International Conference on database Systems for Advanced Applications, DASFAA 2023
作者: Chang, Jian Li, Binhong Xiao, Jiang Lin, Licheng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Time range query is essential to facilitate a wide range of blockchain applications such as data provenance in the supply chain. Existing blockchain systems adopt the storage-consuming tree-based index structure for b... 详细信息
来源: 评论
Unified Grid Tagging Scheme for Aspect Sentiment Quad Prediction  31
Unified Grid Tagging Scheme for Aspect Sentiment Quad Predic...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Su, Guixin Zhang, Yongcheng Wang, Tongguan Wu, Mingmin Sha, Ying Key Laboratory of Smart Farming for Agricultural Animals Wuhan China Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education China Hubei Engineering Technology Research Center of Agricultural Big Data Wuhan China College of Informatics Huazhong Agricultural University Wuhan China
Aspect Sentiment Quad Prediction (ASQP) aims to extract all sentiment elements in quads for a given review to explain the reason for the sentiment. Previous table-filling based methods have achieved promising results ... 详细信息
来源: 评论
λGrapher: A Resource-Efficient Serverless System for GNN Serving through Graph Sharing  24
λGrapher: A Resource-Efficient Serverless System for GNN Se...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Hu, Haichuan Liu, Fangming Pei, Qiangyu Yuan, Yongjie Xu, Zichen Wang, Lin National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in the School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan China Peng Cheng Laboratory Huazhong University of Science and Technology China School of Mathematics and Computer Science Nanchang University China Paderborn University Paderborn Germany
Graph Neural Networks (GNNs) have been increasingly adopted for graph analysis in web applications such as social networks. Yet, efficient GNN serving remains a critical challenge due to high workload fluctuations and... 详细信息
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Large Language Model Supply Chain: A research Agenda
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Shenao Zhao, Yanjie Hou, Xinyi Wang, Haoyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
The rapid advancement of large language models (LLMs) has revolutionized artificial intelligence, introducing unprecedented capabilities in natural language processing and multimodal content generation. However, the i... 详细信息
来源: 评论