咨询与建议

限定检索结果

文献类型

  • 522 篇 会议
  • 473 篇 期刊文献

馆藏范围

  • 995 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 596 篇 工学
    • 459 篇 计算机科学与技术...
    • 359 篇 软件工程
    • 124 篇 信息与通信工程
    • 98 篇 电气工程
    • 74 篇 控制科学与工程
    • 60 篇 生物工程
    • 50 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 29 篇 安全科学与工程
    • 27 篇 网络空间安全
    • 26 篇 生物医学工程(可授...
    • 25 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 16 篇 建筑学
    • 15 篇 交通运输工程
    • 14 篇 仪器科学与技术
  • 252 篇 理学
    • 123 篇 数学
    • 80 篇 生物学
    • 49 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 23 篇 化学
    • 21 篇 系统科学
  • 150 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 33 篇 feature extracti...
  • 31 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 26 篇 deep learning
  • 23 篇 security
  • 22 篇 accuracy
  • 22 篇 training
  • 21 篇 machine learning
  • 21 篇 blockchain
  • 18 篇 graph neural net...
  • 18 篇 data models
  • 16 篇 optimization
  • 16 篇 data mining
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 84 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 27 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 19 篇 shenzhen huazhon...
  • 19 篇 school of inform...
  • 18 篇 the hubei engine...

作者

  • 126 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 mahmood khalid
  • 14 篇 das ashok kumar
  • 14 篇 yu huang
  • 13 篇 wan yao
  • 13 篇 jiang xiao

语言

  • 766 篇 英文
  • 217 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
995 条 记 录,以下是291-300 订阅
排序:
A Hybrid Model Combined with SVM and CNN for Community Content Classification  23
A Hybrid Model Combined with SVM and CNN for Community Conte...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Ye, Yukui Xie, Xia Jin, Hai Wang, Duoqiang National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Hainan University Haikou China
Community websites bring many conveniences to people, and the classification of community content is playing an important role in website management and information searching. As the carrier of community content, post... 详细信息
来源: 评论
Cooperative Relationship Prediction between Scholars in Heterogeneous Academic Network  23
Cooperative Relationship Prediction between Scholars in Hete...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Shi, Jia Jin, Hai Xie, Xia National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Hainan University Haikou China
The real academic network belongs to a heterogeneous network, therefore, for the link prediction tasks, some information on the network may be lost if only using homogeneous network methods. In order to make good use ... 详细信息
来源: 评论
Multi-Pair Temporal Sentence Grounding via Multi-Thread Knowledge Transfer Network
arXiv
收藏 引用
arXiv 2024年
作者: Fang, Xiang Fang, Wanlong Wang, Changshuo Liu, Daizong Tang, Keke Dong, Jianfeng Zhou, Pan Li, Beibei Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science of Technology Wuhan China Sichuan University China Nanyang Technological University Singapore Peking University China Guangzhou University China Zhejiang Gongshang University China
Given some video-query pairs with untrimmed videos and sentence queries, temporal sentence grounding (TSG) aims to locate query-relevant segments in these videos. Although previous respectable TSG methods have achieve... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
A Client Selection Method Based on Loss Function Optimization for Federated Learning
收藏 引用
Computer Modeling in engineering & sciences 2023年 第10期137卷 1047-1064页
作者: Yan Zeng Siyuan Teng Tian Xiang Jilin Zhang Yuankai Mu Yongjian Ren Jian Wan School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Complex System Modeling and Simulation Ministry of EducationHangzhou310018China Zhejiang Engineering Research Center of Data Security Governance Hangzhou310018China Intelligent Robotics Research Center Zhejiang LabHangzhou311100China HDU-ITMO Joint Institute Hangzhou Dianzi UniversityHangzhou310018China
Federated learning is a distributedmachine learningmethod that can solve the increasingly serious problemof data islands and user data privacy,as it allows training data to be kept locally and not shared with other **... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
PSMiner: A Pattern-Aware Accelerator for High-Performance Streaming Graph Pattern Mining  23
PSMiner: A Pattern-Aware Accelerator for High-Performance St...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Hao Qi Yu Zhang Ligang He Kang Luo Jun Huang Haoyu Lu Jin Zhao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China and Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab China Department of Computer Science University of Warwick United Kingdom
Streaming Graph Pattern Mining (GPM) has been widely used in many application fields. However, the existing streaming GPM solution suffers from many unnecessary explorations and isomorphism tests, while the existing s...
来源: 评论
Application of a neural network model with multimodal fusion for fluorescence spectroscopy
收藏 引用
Nuclear science and Techniques 2024年 第10期35卷 135-148页
作者: Lin Tang Shuang Zhou Kai-Bo Shi Hong-Tao Shen Lei You College of Electronic Information and Electrical Engineering Chengdu UniversityChengdu 610106China Guangxi Key Laboratory of Nuclear Physics and Nuclear Technology Guangxi Normal UniversityGuilin 541004China National Engineering Research Center for Agro-Ecological Big Data Analysis&Application Anhui UniversityHefei 230039China School of Electrical and Electronic Engineering Nanyang Technological UniversitySingapore 639798Singapore Vanadium and Titanium Resource Comprehensive Utilization Key Laboratory of Sichuan Province Panzhihua UniversityPanzhihua 617000China Key Laboratory of Interior Layout optimization and Security Institutions of Higher Education of Sichuan ProvinceChengdu Normal UniversityChengdu 611130China
In energy-dispersive X-ray fluorescence spectroscopy,the estimation of the pulse amplitude determines the accuracy of the spectrum *** error generated by the amplitude estimation of the pulse output distorted by the m... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage data Provenance  26
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Feiyu Zhou, Jian-Tao Guo, Xu Inner Mongolia University College of Computer Science Inner Mongolia Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe... 详细信息
来源: 评论
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem
arXiv
收藏 引用
arXiv 2023年
作者: Li, Wenke Wu, Feng Fu, Cai Zhou, Fan School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China Co.Ltd Shenzhen China
Third-party libraries (TPLs) have become an essential component of software, accelerating development and reducing maintenance costs. However, breaking changes often occur during the upgrades of TPLs and prevent clien... 详细信息
来源: 评论