咨询与建议

限定检索结果

文献类型

  • 522 篇 会议
  • 473 篇 期刊文献

馆藏范围

  • 995 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 596 篇 工学
    • 459 篇 计算机科学与技术...
    • 359 篇 软件工程
    • 124 篇 信息与通信工程
    • 98 篇 电气工程
    • 74 篇 控制科学与工程
    • 60 篇 生物工程
    • 50 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 29 篇 安全科学与工程
    • 27 篇 网络空间安全
    • 26 篇 生物医学工程(可授...
    • 25 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 16 篇 建筑学
    • 15 篇 交通运输工程
    • 14 篇 仪器科学与技术
  • 252 篇 理学
    • 123 篇 数学
    • 80 篇 生物学
    • 49 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 23 篇 化学
    • 21 篇 系统科学
  • 150 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 33 篇 feature extracti...
  • 31 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 26 篇 deep learning
  • 23 篇 security
  • 22 篇 accuracy
  • 22 篇 training
  • 21 篇 machine learning
  • 21 篇 blockchain
  • 18 篇 graph neural net...
  • 18 篇 data models
  • 16 篇 optimization
  • 16 篇 data mining
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 84 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 27 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 19 篇 shenzhen huazhon...
  • 19 篇 school of inform...
  • 18 篇 the hubei engine...

作者

  • 126 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 mahmood khalid
  • 14 篇 das ashok kumar
  • 14 篇 yu huang
  • 13 篇 wan yao
  • 13 篇 jiang xiao

语言

  • 766 篇 英文
  • 217 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
995 条 记 录,以下是241-250 订阅
排序:
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
Orbit Weighting Scheme in the Context of Vector Space Information Retrieval
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1347-1379页
作者: Ahmad Ababneh Yousef Sanjalawe Salam Fraihat Salam Al-E’mari Hamzah Alqudah Department of Computer Science Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Department of Cybersecurity Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityP.O.Box 346Ajman13306United Arab Emirates Information Security Department Faculty of Information TechnologyUniversity of PetraAmman11196Jordan Department of Data Science and Artificial Intelligence Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... 详细信息
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
Diagnosis of the Evolutionary Characteristics and Variability of Meteorological Drought in the Yellow River Basin
Diagnosis of the Evolutionary Characteristics and Variabilit...
收藏 引用
第六届环境预防和污染控制技术国际学术会议
作者: Yunliang Wen Ling Kang Liwei Zhou Wufeng Liao School of Civil & Hydraulic Engineering Huazhong University of Science and Technology Joint International Water Security Research Center Huazhong University of Science and Technology
Frequent occurrences of meteorological droughts in the Yellow River Basin(YRB) result from the combined impact of global climate change and human activities. To address the problems of unclear evolution mechanism and ... 详细信息
来源: 评论
Spatiotemporal variability of soil salinity and the driving factors of cultivated land in Xinjiang, China
收藏 引用
International Journal of Agricultural and Biological engineering 2025年 第2期18卷 197-207页
作者: Yue Zhang Huichun Ye Ronghao Liu Chaojia Nie Mingyao Tang Yuanfang Huang Hongye Wang Xiaoshu Zhao Weini Wang Zhijun Lyu International Research Center of Big Data for Sustainable Development Goals Beijing 100094China Key Laboratory of Digital Earth Science Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100094China College of Water Resources Science and Engineering Taiyuan University of TechnologyTaiyuan 030024China Lab of Big Earth Data and Sustainable Development Goal(BASL) Kashi Aerospace Information Research InstituteKashgar 844000China Xinjiang Soil and Fertilizer Station Urumqi 830006China College of Land Science and Technology China Agricultural UniversityBeijing 100193China Cultivated Land Quality Monitoring and Protection Center Ministry of Agriculture and Rural AffairsBeijing 100125China Ordos Agriculture and Animal Husbandry Ecology and Resource Protection Center Ordos 017001Inner MenguliaChina Agricultural and Animal Husbandry Technology Extension Center Dalat BannerOrdos 014300Inner MenguliaChina
Soil salinization poses a major challenge to agricultural production,food security,and sustainability in arid and semi-arid regions *** addressing this issue requires a thorough understanding of the spatiotemporal var... 详细信息
来源: 评论
Can Language Models Serve as Temporal Knowledge Bases?
Can Language Models Serve as Temporal Knowledge Bases?
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Zhao, Ruilin Zhao, Feng Xu, Guandong Zhang, Sixiao Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Recent progress regarding the use of language models (LMs) as knowledge bases (KBs) has shown that language models can act as structured knowledge bases for storing relational facts. However, most existing works only ... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem  23
A Large-Scale Empirical Study on Semantic Versioning in Gola...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated Software engineering
作者: Wenke Li Feng Wu Cai Fu Fan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China AND Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Platform and Content Group Tencent Technology (Shenzhen) Co.Ltd Shenzhen China
Third-party libraries (TPLs) have become an essential component of software, accelerating development and reducing maintenance costs. However, breaking changes often occur during the upgrades of TPLs and prevent clien... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论