咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 247 篇 理学
    • 123 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 19 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 120 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 806 篇 英文
  • 158 篇 其他
  • 13 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
976 条 记 录,以下是151-160 订阅
排序:
COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Zhaonan Zhao, Yanjie Wei, Chen Wan, Zirui Liu, Yue Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Monash University Melbourne Australia Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Version control systems are commonly used to manage open-source software, in which each commit may introduce new vulnerabilities or fix existing ones. researchers have developed various tools for detecting vulnerabili... 详细信息
来源: 评论
An Efficient Graph Accelerator with Distributed On-Chip Memory Hierarchy  22nd
An Efficient Graph Accelerator with Distributed On-Chip Mem...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Zheng, Ran Jiang, Yingxin Wang, Yibo Su, Yongbo Zheng, Long Yao, Pengcheng Liao, Xiaofei Jin, Hai National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
Graph processing has evolved and expanded swiftly with artificial intelligence and big data technology. High-Bandwidth Memory (HBM), which delivers terabyte-level memory bandwidth, has opened up new development possib... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors  39
NumbOD: A Spatial-Frequency Fusion Attack Against Object Det...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
FedMoS: Taming Client Drift in Federated Learning with Double Momentum and Adaptive Selection  42
FedMoS: Taming Client Drift in Federated Learning with Doubl...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Wang, Xiong Chen, Yuxin Li, Yuqing Liao, Xiaofei Jin, Hai Li, Bo Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Federated learning (FL) enables massive clients to collaboratively train a global model by aggregating their local updates without disclosing raw data. Communication has become one of the main bottlenecks that prolong... 详细信息
来源: 评论
PNRITR:research on Positive and Negative Entity Region Perception Methods for Image-Text Retrieval  36
PNRITR:Research on Positive and Negative Entity Region Perce...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Zhang, Zhiping Sun, Tao Zheng, Hongyan Liu, Hao Liu, Gengchen Yang, Zhi Wang, Xiaoyu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The aim of cross-modal image-text retrieval is to heighten comprehension and to create robust associations between visual and textual content. This process entails a mutual querying and synchronization across various ... 详细信息
来源: 评论
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device Identification
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device...
收藏 引用
International Workshop on Quality of Service
作者: Kangli Niu Shenghao Liu Lingzhi Yi Xianjun Deng Suning Chen Laurence T. Yang Minmin Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Safety Engineering Zhongnan University of Economics and Law
In order to resist network attacks on IoT devices, identifying IoT devices is the first step for ensuring device security. The traditional passive method identifies IoT devices by mining the potential relationship bet... 详细信息
来源: 评论
Multi-Hop Attention Diffusion Graph Neural Networks For Multimodal Fake News Detection
Multi-Hop Attention Diffusion Graph Neural Networks For Mult...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Zhongqiang Lu, Dongli Sha, Ying Key Laboratory of Smart Farming for Agricultural Animals Wuhan China Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education Wuhan China Hubei Engineering Technology Research Center of Agricultural Big Data Wuhan China College of Informatics Huazhong Agricultural University Wuhan China
Fake news often spreads rapidly on social media in various forms, exposing users to a large amount of misinformation and disinformation. Recently, promising results have been achieved in fake news detection. However, ... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
ES-Mask: Evolutionary Strip Mask for Explaining Time Series Prediction  37
ES-Mask: Evolutionary Strip Mask for Explaining Time Series ...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Sun, Yifei Song, Cheng Lu, Feng Li, Wei Jin, Hai Zomaya, Albert Y. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Centre for Distributed and High Performance Computing School of Computer Science University of Sydney Australia
Machine learning models are increasingly used in time series prediction with promising results. The model explanation of time series prediction falls behind the model development and makes less sense to users in under... 详细信息
来源: 评论