咨询与建议

限定检索结果

文献类型

  • 522 篇 会议
  • 473 篇 期刊文献

馆藏范围

  • 995 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 596 篇 工学
    • 459 篇 计算机科学与技术...
    • 359 篇 软件工程
    • 124 篇 信息与通信工程
    • 98 篇 电气工程
    • 74 篇 控制科学与工程
    • 60 篇 生物工程
    • 50 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 29 篇 安全科学与工程
    • 27 篇 网络空间安全
    • 26 篇 生物医学工程(可授...
    • 25 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 16 篇 建筑学
    • 15 篇 交通运输工程
    • 14 篇 仪器科学与技术
  • 252 篇 理学
    • 123 篇 数学
    • 80 篇 生物学
    • 49 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 23 篇 化学
    • 21 篇 系统科学
  • 150 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 33 篇 feature extracti...
  • 31 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 26 篇 deep learning
  • 23 篇 security
  • 22 篇 accuracy
  • 22 篇 training
  • 21 篇 machine learning
  • 21 篇 blockchain
  • 18 篇 graph neural net...
  • 18 篇 data models
  • 16 篇 optimization
  • 16 篇 data mining
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 84 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 27 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 19 篇 shenzhen huazhon...
  • 19 篇 school of inform...
  • 18 篇 the hubei engine...

作者

  • 126 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 mahmood khalid
  • 14 篇 das ashok kumar
  • 14 篇 yu huang
  • 13 篇 wan yao
  • 13 篇 jiang xiao

语言

  • 766 篇 英文
  • 217 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
995 条 记 录,以下是51-60 订阅
排序:
ModelLock: Locking Your Model With a Spell  24
ModelLock: Locking Your Model With a Spell
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Gao, Yifeng Sun, Yuhua Ma, Xingjun Wu, Zuxuan Jiang, Yu-Gang Shanghai Key Lab of Intell. Info. Processing School of Cs Fudan University Shanghai China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
This paper presents a novel model protection paradigm Model Locking that locks the performance of a finetuned model on private data to make it unusable or unextractable without the right key. Specifically, we proposed... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Multi-Pair Temporal Sentence Grounding via Multi-Thread Knowledge Transfer Network  39
Multi-Pair Temporal Sentence Grounding via Multi-Thread Know...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Fang, Xiang Fang, Wanlong Wang, Changshuo Liu, Daizong Tang, Keke Dong, Jianfeng Zhou, Pan Li, Beibei Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China Nanyang Technological University Singapore Peking University China Guangzhou University China Zhejiang Gongshang University China
Given some video-query pairs with untrimmed videos and sentence queries, temporal sentence grounding (TSG) aims to locate query-relevant segments in these videos. Although previous respectable TSG methods have achieve... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation  42
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Wang, Haozhao Xu, Wenchao Fan, Yunfeng Li, Ruixuan Zhou, Pan Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China The Hong Kong Polytechnic University Department of Computing Hong Kong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co... 详细信息
来源: 评论
Exploring the Potential of Large Vision-Language Models for Unsupervised Text-Based Person Retrieval  39
Exploring the Potential of Large Vision-Language Models for ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Zongyi Jianbo, Li Shi, Yuxuan Chen, Jiazhong Huang, Shijuan Tu, Linnan Shen, Fei Ling, Hefei Department of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center of Educational Big Data The Faculty of Artificial Intelligence in Education Central China Normal University China Nanjing University of Science and Technology China
The aim of text-based person retrieval is to identify pedestrians using natural language descriptions within a large-scale image gallery. Traditional methods rely heavily on manually annotated image-text pairs, which ... 详细信息
来源: 评论
Correcting Pronoun Homophones with Subtle Semantics in Chinese Speech Recognition  30
Correcting Pronoun Homophones with Subtle Semantics in Chine...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Zhaobo Gan, Rui Yuan, Pingpeng Jin, Hai National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Laboratory Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
Speech recognition is becoming prevalent in daily life. However, due to the similar semantic context of the entities and the overlap of Chinese pronunciation, the pronoun homophone, especially "他/她/它 (he/she/i... 详细信息
来源: 评论
Quantum security analysis of SM4 algorithm  6
Quantum security analysis of SM4 algorithm
收藏 引用
6th International Conference on Wireless Communications and Smart Grid, ICWCSG 2024
作者: Yang, Hao Wang, Chunhong Tang, Xueming Cui, Yongquan Lu, Songfeng Cai, Dunbo Qian, Ling Zhang, Runqing Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Maritime Communication Research Institute Wuhan430010 China Software Technology Co. Ltd. Suzhou215153 China
The security of commercial encryption algorithms has always been a focus of attention. The SM4 algorithm, a commercial cryptographic standard, has been recognized by ISO/IEC as an international standard and has shown ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论