咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 247 篇 理学
    • 123 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 19 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 120 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 806 篇 英文
  • 158 篇 其他
  • 13 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
976 条 记 录,以下是171-180 订阅
排序:
LOPO: An Out-of-order Layer Pulling Orchestration Strategy for Fast Microservice Startup  42
LOPO: An Out-of-order Layer Pulling Orchestration Strategy f...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Gu, Lin Huang, Junhao Huang, Shaoxing Zeng, Deze Li, Bo Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China China University of Geosciences School of Computer Science Wuhan China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Container based microservices have been widely applied to promote the cloud elasticity. The mainstream Docker containers are structured in layers, which are organized in stack with bottom-up dependency. To start a mic... 详细信息
来源: 评论
Provenance Based Intrusion Detection via Measuring Provenance Sequence Similarity
Provenance Based Intrusion Detection via Measuring Provenanc...
收藏 引用
2022 International Conference on Blockchain technology and Information security, ICBCTIS 2022
作者: Wu, Lin Xie, Y.L. Wu, Yafeng Liang, Jinyuan Li, Xuan School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Wuhan China Nsfocus Inc. A9-3/F Optical Valley Software Park Wuhan China
Malicious intrusion presents normalization and diversification in the current environment. Attackers often evade detection by changing the execution order of programs or adding many confusing operations. Aiming at the... 详细信息
来源: 评论
Automatic Segmentation Method for the Nuclei Contour of High Resolution Rat Brain  23
Automatic Segmentation Method for the Nuclei Contour of High...
收藏 引用
6th International Conference on big data Technologies, ICBDT 2023
作者: Xu, Xiaofeng Zheng, Wei Henan Engineering Research Center of Intelligent Processing for Big Data of Digital Image School of Computer Science and Technology Nanyang Normal University Nanyang473061 China
The brain consists of massive nuclei with different functions. In neuroscience research, the precise recognition and delineation of nucleus boundaries is the crux of brain atlas illustration. Here, we propose a method... 详细信息
来源: 评论
EdgeMove: Pipelining Device-Edge Model Training for Mobile Intelligence  23
EdgeMove: Pipelining Device-Edge Model Training for Mobile I...
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Dong, Zeqian He, Qiang Chen, Feifei Jin, Hai Gu, Tao Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia School of Computing Macquarie University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Training machine learning (ML) models on mobile and Web-of-Things (WoT) has been widely acknowledged and employed as a promising solution to privacy-preserving ML. However, these end-devices often suffer from constrai... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
MalWuKong: Towards Fast, Accurate, and Multilingual Detectio...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Ningke Li Shenao Wang Mingxi Feng Kailong Wang Meizhen Wang Haoyu Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
In the face of increased threats within software registries and management systems, we address the critical need for effective malicious code detection. In this paper, we propose an innovative approach that integrates...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
PipeEdge: A Trusted Pipelining Collaborative Edge Training based on Blockchain  23
PipeEdge: A Trusted Pipelining Collaborative Edge Training b...
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Yuan, Liang He, Qiang Chen, Feifei Dou, Ruihan Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Mathematics University of Waterloo Canada National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Powered by the massive data generated by the blossom of mobile and Web-of-Things (WoT) devices, Deep Neural Networks (DNNs) have developed both in accuracy and size in recent years. Conventional cloud-based DNN traini... 详细信息
来源: 评论
Lightweight Authenticated Key Agreement Protocol for Smart Power Grid Systems Using PUF
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 3568-3580页
作者: Zahoor, Amina Mahmood, Khalid Saleem, Muhammad Asad Badar, Hafiz Muhammad Sanaullah Le, Tuan-Vinh Das, Ashok Kumar Department of Computer Science Sahiwal57000 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Emerson University Multan Department of Emerging Computing Technologies Multan61000 Pakistan Fu Jen Catholic University Bachelor's Program of Artificial Intelligence and Information Security New Taipei City24206 Taiwan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India
The Smart Power Grid (SPG) is pivotal in orchestrating and managing demand response in contemporary smart cities, leveraging the prowess of Information and Communication Technologies (ICTs). Within the immersive SPG e... 详细信息
来源: 评论
Dispatcher: Resource-aware Nakamoto Blockchain via Hierarchical Topology and Adaptive Incentives
收藏 引用
Distributed Ledger Technologies: research and Practice 2024年 第2期3卷 1-20页
作者: Hai Jin Shuohua Dong Xiaohai Dai Yuandi Cai Jiang Xiao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Mainstream blockchain systems such as Bitcoin and Ethereum are revolutionizing the financial industry by adopting the Nakamoto consensus protocol, i.e., Proof-of-Work (PoW). Only nodes with sufficient computing resour... 详细信息
来源: 评论