咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 453 篇 期刊文献

馆藏范围

  • 972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 246 篇 理学
    • 123 篇 数学
    • 78 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 33 篇 医学
    • 26 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 18 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 101 篇 national enginee...
  • 83 篇 school of comput...
  • 67 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 803 篇 英文
  • 158 篇 其他
  • 12 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
972 条 记 录,以下是41-50 订阅
排序:
Internet Public Safety Event Grading and Hybrid Storage Based on Multi-feature Fusion for Social Media Texts  28th
Internet Public Safety Event Grading and Hybrid Storage Bas...
收藏 引用
28th International Conference on database Systems for Advanced Applications, DASFAA 2023
作者: Hu, Die Xie, Yulai Feng, Dan Zhao, Shixun Fu, Pengyu Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the rapid development of mobile Internet technology, various public events appear on social media platforms and attract a lot of attention. Since netizens can express their opinions freely on the Internet, some e... 详细信息
来源: 评论
Tensor-Based Multi-Scale Correlation Anomaly Detection for AIoT-Enabled Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 2061-2071页
作者: Zeng, Jiuzhen Yang, Laurence T. Wang, Chao Deng, Xianjun Yang, Xiangli Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada University of South China School of Electrical Engineering Hengyang421001 China
Artificial Intelligence of Things (AIoT) is an innovative paradigm expected to enable various consumer applications that is transforming our lives. While enjoying benefits and services from these applications, we also... 详细信息
来源: 评论
Toward High-Performance Delta-Based Iterative Processing with a Group-Based Approach
收藏 引用
Journal of Computer science & technology 2022年 第4期37卷 797-813页
作者: Hui Yu Xin-Yu Jiang Jin Zhao Hao Qi Yu Zhang Xiao-Fei Liao Hai-Kun Liu Fu-Bing Mao Hai Jin National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Service Computing Technology and System Laboratory Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China
Many systems have been built to employ the delta-based iterative execution model to support iterative algorithms on distributed platforms by exploiting the sparse computational dependencies between data items of these... 详细信息
来源: 评论
Discovering Cohesive Temporal Subgraphs with Temporal Density Aware Exploration
收藏 引用
Journal of Computer science & technology 2022年 第5期37卷 1068-1085页
作者: Chun-Xue Zhu Long-Long Lin Ping-Peng Yuan Hai Jin National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Service Computing Technology and System Laboratory Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China
Real-world networks,such as social networks,cryptocurrency networks,and e-commerce networks,always have occurrence time of interactions between *** networks are typically modeled as temporal *** cohesive subgraphs fro... 详细信息
来源: 评论
Real-time stealth transmission via dither-based bias control
Real-time stealth transmission via dither-based bias control
收藏 引用
2023 Conference on Lasers and Electro-Optics, CLEO 2023
作者: Wang, Yuanxiang Shao, Weidong Zhong, Linsheng Dai, Xiaoxiao Yang, Qi Deng, Lei Liu, Deming Cheng, Mengfan Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
We report a real-time 1 kbps stealthy transmission in the 10 Gbps QPSK public communication. The stealth data is embedded in dither signals of bias control. The scheme is compatible with existing optical transmission ... 详细信息
来源: 评论
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage Cost KV-Separated LSM Store with SmartSSD-based GC Offloading  23
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Duan, Zhuohui Feng, Hao Liu, Haikun Liao, Xiaofei Jin, Hai Li, Bangyu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The key-value separation is renowned for its significant mitigation of the write amplification inherent in traditional LSM trees. However, KV separation potentially increases performance overhead in the management of ... 详细信息
来源: 评论
Efficient distributed algorithms for holistic aggregation functions on random regular graphs
收藏 引用
science China(Information sciences) 2022年 第5期65卷 32-50页
作者: Lin JIA Qiang-Sheng HUA Haoqiang FAN Qiuping WANG Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology Institute for Interdisciplinary Information Science Tsinghua University
In this paper, we propose efficient distributed algorithms for three holistic aggregation functions on random regular graphs that are good candidates for network topology in next-generation data *** three holistic agg... 详细信息
来源: 评论
ModelLock: Locking Your Model With a Spell  24
ModelLock: Locking Your Model With a Spell
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Gao, Yifeng Sun, Yuhua Ma, Xingjun Wu, Zuxuan Jiang, Yu-Gang Shanghai Key Lab of Intell. Info. Processing School of Cs Fudan University Shanghai China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
This paper presents a novel model protection paradigm Model Locking that locks the performance of a finetuned model on private data to make it unusable or unextractable without the right key. Specifically, we proposed... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
TIPS:Tailored Information Extraction in Public security Using Domain-Enhanced Large Language Model
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 2555-2572页
作者: Yue Liu Qinglang Guo Chunyao Yang Yong Liao School of Cyber Science and Technology University of Science and Technology of ChinaHefei230026China National Engineering Research Center for Public Safety Risk Perception and Control by Big Data China Academy of Electronics and Information TechnologyBeijing100041China
Processing police incident data in public security involves complex natural language processing(NLP)tasks,including information *** data contains extensive entity information—such as people,locations,and events—whil... 详细信息
来源: 评论