咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 247 篇 理学
    • 123 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 19 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 120 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 806 篇 英文
  • 158 篇 其他
  • 13 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
976 条 记 录,以下是161-170 订阅
排序:
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation Systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation Systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Learning Approach  12
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Le...
收藏 引用
12th International Conference on Smart Grid, icSmartGrid 2024
作者: Oyucu, Saadin Sagiroglu, Seref Aksoz, Ahmet Bicer, Emre Faculty of Engineering Department of Computer Engineering Adiyaman Turkey Gazi University Artificial Intelligence and Big Data Analytics Security R&d Center Ankara Turkey Sivas Cumhuriyet University Mobilers Team Sivas Turkey Sivas University of Science and Technology Faculty of Engineering and Natural Sciences Battery Research Laboratory Sivas Turkey
Smart grids are faced with a range of challenges, such as the development of communication infrastructure, cybersecurity threats, data privacy, and the protection of user information, due to their complex structure. A... 详细信息
来源: 评论
data Poisoning Attack to X-armed Bandits  21
Data Poisoning Attack to X-armed Bandits
收藏 引用
21st IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2022
作者: Luo, Zhi Li, Youqi Chen, Lixing Xu, Zichuan Zhou, Pan Huazhong University of Science and Technology School of Cyber Science and Engineering China Beijing Institute of Technology School of Cyberspace Science and Technology School of Computer Science China Shanghai Jiao Tong University Institute of Cyber Science and Technology China Dalian University of Technology School of Software China Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendati... 详细信息
来源: 评论
A Digital Twin-based Framework of Motion Control and State Monitoring for Pneumatic Muscle
收藏 引用
Recent Patents on Mechanical engineering 2023年 第3期16卷 203-213页
作者: Xie, Shenglong Liu, Wenyuan Duan, Huiru Chen, Dijian Wan, Yanjian Key Laboratory of Intelligent Manufacturing Quality Big Data Tracking and Analysis of Zhejiang Province China Ji-liang University Zhejiang Hangzhou310018 China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Ma'anshan243032 China
Introduction: The current digital twin systems usually have the drawback of high cost and complex technology, and it is necessary to develop a simple solution to reduce the cost and cycle for the development of digita... 详细信息
来源: 评论
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Network for Segmenting Pathology Lesion of the Focal Lymphocytic Sialadenitis  1
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Ne...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Han, Hao Lu, Feng Deng, Yanhan Luo, Xiaofang Jin, Hai Tu, Wei Xie, Xia School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan430074 China Tongji Medical College Huazhong University of Science and Technology Tongji Hospital Wuhan430022 China School of Computer Science and Technology Hainan University Haikou China
In the medical realm, the pivotal role of pathological Whole Slide Images (WSIs) in detecting cancer, tracking disease progression, and evaluating treatment efficacy is indisputable. Nevertheless, the identification a... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing  4
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zhou, Jincheng Li, Yue Shen, Yujie Tang, Dan Cai, Hongliang Gong, Jing Bai, Ningchao School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated data centers
收藏 引用
Journal of Computer science & technology 2021年 第5期36卷 1051-1070页
作者: Yu-Wei Wu Qing-Gang Wang Long Zheng Xiao-Fei Liao Hai Jin Wen-Bin Jiang Ran Zheng Kan Hu National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
With the rapid growth of real-world graphs,the size of which can easily exceed the on-chip(board)storage capacity of an accelerator,processing large-scale graphs on a single Field Programmable Gate Array(FPGA)becomes ... 详细信息
来源: 评论
SADBA: Self-Adaptive Distributed Backdoor Attack Against Federated Learning  39
SADBA: Self-Adaptive Distributed Backdoor Attack Against Fed...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Feng, Jun Lai, Yuzhe Sun, Hong Ren, Bocheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Economics Wuhan Textile University China School of Computer Science and Technology Hainan University China
Backdoor attacks in federated learning (FL) face challenges such as lower attack success rates and compromised main task accuracy (MA) compared to local training. Existing methods like distributed backdoor attack (DBA... 详细信息
来源: 评论
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment  21
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Huang, Shuai Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business UIniversity Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on BigData Security Wuhan China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China
In this research, we tackled the complex task of aligning audio and lyrics content automatically. This task entails the precise matching of lyrics with the corresponding audio segments in songs, necessitating the coor... 详细信息
来源: 评论
AFaVS: Accurate Yet Fast Version Switching for Graph Processing Systems  39
AFaVS: Accurate Yet Fast Version Switching for Graph Process...
收藏 引用
39th IEEE International Conference on data engineering, ICDE 2023
作者: Zheng, Long Ye, Xiangyu Liu, Haifeng Wang, Qinggang Huang, Yu Gui, Chuangyi Yao, Pengcheng Liao, Xiaofei Jin, Hai Xue, Jingling Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Laboratory Wuhan430074 China Zhejiang Lab Hangzhou311121 China Unsw School of Computer Science and Engineering Sydney Australia
Multi-version graph processing has been widely used to solve many real-world problems. The process of the multi-version graph processing typically includes: (1) a history graph version switching at a specific time and... 详细信息
来源: 评论