咨询与建议

限定检索结果

文献类型

  • 522 篇 会议
  • 473 篇 期刊文献

馆藏范围

  • 995 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 596 篇 工学
    • 459 篇 计算机科学与技术...
    • 359 篇 软件工程
    • 124 篇 信息与通信工程
    • 98 篇 电气工程
    • 74 篇 控制科学与工程
    • 60 篇 生物工程
    • 50 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 29 篇 安全科学与工程
    • 27 篇 网络空间安全
    • 26 篇 生物医学工程(可授...
    • 25 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 16 篇 建筑学
    • 15 篇 交通运输工程
    • 14 篇 仪器科学与技术
  • 252 篇 理学
    • 123 篇 数学
    • 80 篇 生物学
    • 49 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 23 篇 化学
    • 21 篇 系统科学
  • 150 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 33 篇 feature extracti...
  • 31 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 26 篇 deep learning
  • 23 篇 security
  • 22 篇 accuracy
  • 22 篇 training
  • 21 篇 machine learning
  • 21 篇 blockchain
  • 18 篇 graph neural net...
  • 18 篇 data models
  • 16 篇 optimization
  • 16 篇 data mining
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 84 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 27 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 19 篇 shenzhen huazhon...
  • 19 篇 school of inform...
  • 18 篇 the hubei engine...

作者

  • 126 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 mahmood khalid
  • 14 篇 das ashok kumar
  • 14 篇 yu huang
  • 13 篇 wan yao
  • 13 篇 jiang xiao

语言

  • 766 篇 英文
  • 217 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
995 条 记 录,以下是321-330 订阅
排序:
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
Challenges and Approaches for Mitigating Byzantine Attacks i...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Junyu Shi Wei Wan Shengshan Hu Jianrong Lu Leo Yu Zhang School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Information Technology Deakin University
Recently emerged federated learning (FL) is an attractive distributed learning framework in which numerous wireless end-user devices can train a global model with the data remained autochthonous. Compared with the tra... 详细信息
来源: 评论
A Survey of Attacks on Large Vision-Language Models: Resources, Advances, and Future Trends
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Daizong Yang, Mingyu Qu, Xiaoye Zhou, Pan Cheng, Yu Hu, Wei Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
With the significant development of large models in recent years, Large Vision-Language Models (LVLMs) have demonstrated remarkable capabilities across a wide range of multimodal understanding and reasoning tasks. Com... 详细信息
来源: 评论
Quantum partial least squares regression algorithm for multiple correlation problem
收藏 引用
Chinese Physics B 2022年 第3期31卷 177-186页
作者: Yan-Yan Hou Jian Li Xiu-Bo Chen Yuan Tian School of Artificial Intelligence Beijing University of Post and TelecommunicationsBeijing 100876China College of Information Science and Engineering Zaozhuang UniversityZaozhuang 277160China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Post and TelecommunicationsBeijing 100876China GuiZhou University Guizhou Provincial Key Laboratory of Public Big DataGuiyang 550025China
Partial least squares(PLS) regression is an important linear regression method that efficiently addresses the multiple correlation problem by combining principal component analysis and multiple regression. In this pap... 详细信息
来源: 评论
Network Situation Awareness Model Based on Incomplete Information Game  5th
Network Situation Awareness Model Based on Incomplete Inform...
收藏 引用
5th International Conference on security and Privacy in New Computing Environments, SPNCE 2022
作者: Zhang, Hongbin Yin, Yan Zhao, Dongmei Liu, Bin Wang, Yanxia Liu, Zhen School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science and Technology Shijiazhuang050000 China Hebei Geological Workers’ University Shijiazhuang050081 China
Game theory has been widely used in network security situational awareness. However, most of the currently proposed game-based offensive and defensive situational awareness methods are for traffic data, and there are ... 详细信息
来源: 评论
Fed-AugMix: Balancing Privacy and Utility via data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Haoyang Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Gradient leakage attacks pose a significant threat to the privacy guarantees of federated learning. While distortion-based protection mechanisms are commonly employed to mitigate this issue, they often lead to notable... 详细信息
来源: 评论
Working Smarter Not Harder: Hybrid Cooling for Deep Learning in Edge datacenters
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年
作者: Pei, Qiangyu Yuan, Yongjie Hu, Haichuan Wang, Lin Zhang, Dong Yan, Bingheng Yu, Chen Liu, Fangming Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology 1037 Luoyu Road Wuhan430074 China Paderborn University TU Darmstadt Germany Jinan Inspur Data Co. Ltd. China Huazhong University of Science and Technology Peng Cheng Laboratory China
The proliferation of deep-learning-based mobile and IoT applications has driven the increasing deployment of edge datacenters equipped with domain-specific accelerators. The unprecedented computing power offered by th... 详细信息
来源: 评论
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optimization in Intelligent Transportation IoT  19
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optim...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Yi, Lingzhi Luo, Bin Zhu, Chenlu Deng, Xianjun Xia, Yunzhi Wu, Hengshan Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China University of South China School of Civil Engineering Hengyang421001 China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Hubei Chutian Expressway Digital Technology Co. Ltd Wuhan430074 China
The integration of Internet of Things (IoT)-based highway bridge structural health monitoring (HBSHM) and intelligent transportation systems (ITS) plays an essential role in detecting damage for large and complex brid... 详细信息
来源: 评论
Social Internet of Tings Trust Management Based on Implicit Social Relationship  5th
Social Internet of Tings Trust Management Based on Implicit ...
收藏 引用
5th International Conference on security and Privacy in New Computing Environments, SPNCE 2022
作者: Zhang, Hongbin Fan, Fan Zhao, Dongmei Liu, Bin Wang, Yanxia Liu, Jian School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang China Hebei Geological Workers’ University Shijiazhuang050081 China
The "Social Internet of Things (SIoT)" is a combination of the Internet of Things (IoT) and social networks to form a new paradigm. The SIoT promotes the development of smart cities, smart transportation, an... 详细信息
来源: 评论
Efficient Hardware Redo Logging for Secure Persistent Memory  23
Efficient Hardware Redo Logging for Secure Persistent Memory
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhan Yue, Jianhui Liao, Xiaofei Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China Michigan Technological University Computer Science Department HoughtonMI United States
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory ... 详细信息
来源: 评论
X-Stream: A Flexible, Adaptive Video Transformer for Privacy-Preserving Video Stream Analytics
X-Stream: A Flexible, Adaptive Video Transformer for Privacy...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Dou Feng Lin Wang Shutong Chen Lingching Tung Fangming Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Paderborn University Germany National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Guangxi University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Peng Cheng Laboratory China
Video stream analytics (VSA) systems fuel many exciting applications that facilitate people’s lives, but also raise critical concerns about exposing too much individuals’ privacy. To alleviate these concerns, variou... 详细信息
来源: 评论