咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 247 篇 理学
    • 123 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 19 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 120 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 806 篇 英文
  • 158 篇 其他
  • 13 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
976 条 记 录,以下是181-190 订阅
排序:
A Study on a Reduced Indicator System for the Network security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Zhang, Hongbin Bai, Yikang Zhao, Dongmei Liu, Bin Xu, Ying Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is... 详细信息
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image  30
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Ronghuan Zhao, Jing Li, Ming Zou, Qingzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong University of Traditional Chinese Medicine School of Intelligence and Information Engineering Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural Networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service
收藏 引用
Computers, Materials & Continua 2022年 第5期71卷 2599-2616页
作者: Muhammad Ibrahim Faisal Jamil YunJung Lee DoHyeun Kim Big Data Research Center Department of Computer Science and StatisticsJeju National UniversityKoreaJeju-si63243Korea Department of Computer Engineering(and Advanced Technology Research Institute) Jeju National UniversityJeju 63243Korea
In recent times,the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security *** IoT has shown wide adoption in various applications i... 详细信息
来源: 评论
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Wei Liao Lansheng Han Peng Chen Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r...
来源: 评论
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Xinyi Wei, Chen Wang, Shenao Zhao, Yanjie Gao, Peiming Zhang, Yuanchao Wang, Kailong Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China Wuhan Jinyinhu Laboratory China
The exponential growth of open-source package ecosystems, particularly NPM and PyPI, has led to an alarming increase in software supply chain poisoning attacks. Existing static analysis methods struggle with high fals... 详细信息
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
Towards Instruction-Tuned Verification for Improving Biomedical Information Extraction with Large Language Models
Towards Instruction-Tuned Verification for Improving Biomedi...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Li, Jin Yuan, Ruifan Tian, Yu Li, Jingsong Nanjing University of Information Science and Technology School of Artificial Intelligence Nanjing China Zhejiang University College of Biomedical Engineering & Instrumental Science Hangzhou China Research Center for Data Hub and Security Zhejiang Lab Hangzhou China
Biomedical information extraction, including tasks like Named Entity Recognition (NER) and Relationship Extraction (RE), plays a critical role in analyzing unstructured biomedical data, facilitating more accurate down... 详细信息
来源: 评论
MeHyper: Accelerating Hypergraph Neural Networks by Exploring Implicit dataflows  31
MeHyper: Accelerating Hypergraph Neural Networks by Explorin...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Zhao, Wenju Yao, Pengcheng Chen, Dan Zheng, Long Liao, Xiaofei Wang, Qinggang Ma, Shaobo Li, Yu Liu, Haifeng Xiao, Wenjing Sun, Yufei Zhu, Bing Jin, Hai Xue, Jingling Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China National University of Singapore School of Computing 119077 Singapore Guangxi University School of Computer Electronics and Information NanNing530004 China University of New South Wales School of Computer Science and Engineering SydneyNSW2052 Australia
Hypergraph Neural Networks (HGNNs) are increasingly utilized to analyze complex inter-entity relationships. Traditional HGNN systems, based on a hyperedge-centric dataflow model, independently process aggregation task... 详细信息
来源: 评论
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12621-12630页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The rise of smart cities is directly connected to the increasing use of vehicles. The growing vehicle utilization has driven the emergence of Vehicular Ad-hoc Networks (VANETs), facilitating instant information exchan... 详细信息
来源: 评论