咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 247 篇 理学
    • 123 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 19 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 120 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 806 篇 英文
  • 158 篇 其他
  • 13 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
976 条 记 录,以下是771-780 订阅
排序:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
收藏 引用
Internet of Things (Netherlands) 2023年 22卷
作者: Zahoor, Amina Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Ayub, Muhammad Faizan Conti, Mauro Das, Ashok Kumar Department of Computer Science COMSATS University Islamabad Sahiwal Campus 57000 Pakistan Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Sahiwal 57000 Pakistan Department of Mathematics University of Padua Padua 35131 Italy Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India
IoT-enabled Smart Grid (IoT-SG) is an emerging paradigm that enables the bi-direction communication of IoT devices and hardware to efficiently collect and transmit the consumer's information over the Internet. How... 详细信息
来源: 评论
Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks
Trusted and Spectrum-Efficient Crowd Computing in Massive MI...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Pengfeng Zhang Lei Li Xin Liu Rui Wang Donglan Liu Bing Su Yuntao Wang Yiliang Liu Zhou Su State Grid Shandong Electric Power Company Zibo Power Supply Company Zibo China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China Shandong Key Laboratory of Energy Industry Internet Big Data Technology Jinan China Shandong Smart Grid Technology Innovation Center Jinan China School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China
Crowd computing in large-scale cellular networks typically involves a significant number of participants, leading to high spectrum interference, reduced communication efficiency, and low user trustworthiness. To overc... 详细信息
来源: 评论
Hardware-Based Address-Centric Acceleration of Key-Value Store
Hardware-Based Address-Centric Acceleration of Key-Value Sto...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Chencheng Ye Yuanchao Xu Xipeng Shen Xiaofei Liao Hai Jin Yan Solihin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China North Carolina State University Raleigh North Carolina USA Computer Science University of Central Florida Florida USA
Efficiently retrieving data is essential for key-value store applications. A major part of the retrieving time is on data addressing, that is, finding the location of the value in memory that corresponds to a key. Thi... 详细信息
来源: 评论
A novel binary modified beluga whale optimization algorithm using ring crossover and probabilistic state mutation for enhanced bladder cancer diagnosis
收藏 引用
Informatics in Medicine Unlocked 2024年 50卷
作者: Gharaibeh, Hasan Alawad, Noor Aldeen Nasayreh, Ahmad Al Mamlook, Rabia Emhamed Makhadmeh, Sharif Naser Bashkami, Ayah Abualigah, Laith Ezugwu, Absalom E. Computer Science Department Faculty of Information Technology and Computer Sciences Yarmouk University Irbid 21163 Jordan Department of Business Administration Trine University IN United States Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libya Department of Information Technology King Abdullah II School of Information Technology The University of Jordan Amman 11942 Jordan Department Medical Laboratory Sciences – Faculty of Science Al Balqa Applied University Salt 19117 Jordan Department of Cyber Security and Cloud Computing Faculty of Information Technology Applied Science Private University Amman 11937 Jordan Artificial Intelligence and Sensing Technologies (AIST) Research Center University of Tabuk Tabuk 71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq 25113 Jordan MEU Research Unit Middle East University Amman 11831 Jordan Applied science research center Applied science private university Amman 11931 Jordan Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura 140401 India Unit for Data Science and Computing North-West University 11 Hofman Street Potchefstroom 2520 South Africa Artificial Intelligence Research Center (AIRC) College of Engineering and Information Technology Ajman University Ajman P.O. Box 346 United Arab Emirates
Bladder cancer (BC) remains a significant global health challenge, requiring the development of accurate predictive models for diagnosis. In this study, a new Binary Modified White Whale Optimization (B-MBWO) algorith... 详细信息
来源: 评论
Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Xiong Ye, Jiancheng Lui, John C.S. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Network Technology Lab Hong Kong Research Center Huawei Technologies Co. Ltd. Hong Kong Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
Mobile edge computing facilitates users to offload computation tasks to edge servers for meeting their stringent delay requirements. Previous works mainly explore task offloading when system-side information is given ... 详细信息
来源: 评论
Continual learning via inter-task synaptic mapping
arXiv
收藏 引用
arXiv 2021年
作者: Fubing, Mao Weiwei, Weng Pratama, Mahardhika Kien Yee, Edward Yapp National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore Singapore Institute of Manufacturing Technology A*Star Singapore Singapore
Learning from streaming tasks leads a model to catastrophically erase unique experiences it absorbs from previous episodes. While regularization techniques such as LWF, SI, EWC have proven themselves as an effective a... 详细信息
来源: 评论
Shattered chain of trust: understanding security risks in cross-cloud IoT access delegation  20
Shattered chain of trust: understanding security risks in cr...
收藏 引用
Proceedings of the 29th USENIX Conference on security Symposium
作者: Bin Yuan Yan Jia Luyi Xing Dongfang Zhao XiaoFeng Wang Deqing Zou Hai Jin Yuqing Zhang School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center and Indiana University Bloomington and Shenzhen Huazhong University of Science and Technology Research Institute China School of Cyber Engineering Xidian University China and National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and Indiana University Bloomington Indiana University Bloomington School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center Huazhong Univ. of Sci. & Tech. China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and School of Cyber Engineering Xidian University China
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by th...
来源: 评论
Multi-Level Chaotic Maps for 3D Textured Model Encryption  2nd
Multi-Level Chaotic Maps for 3D Textured Model Encryption
收藏 引用
2nd EAI International Conference on Robotic Sensor Networks, ROSENET 2018
作者: Jin, Xin Zhu, Shuyun Wu, Le Zhao, Geng Li, Xiaodong Zhou, Quan Lu, Huimin Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China CETC Big Data Research Institute Co. Ltd. Guizhou Guiyang China Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Mechanical and Control Engineering Kyushu Institute of Technology Kitakyushu Japan
With the rapid progress of virtual reality and augmented reality technologies, 3D contents are the next widespread media in many applications. Thus, the protection of 3D models is primarily important. Encryption of 3D... 详细信息
来源: 评论
CKG: Dynamic Representation Based on Context and Knowledge Graph
CKG: Dynamic Representation Based on Context and Knowledge G...
收藏 引用
International Conference on Pattern Recognition
作者: Xunzhu Tang Tiezhu Sun Rujie Zhu Shi Wang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Momenta Suzhou China University of Central Florida Orlando FL USA Institute of Computing Technology Chinese Academy beijing China
Recently, neural language representation models pre-trained on large corpus can capture rich co-occurrence information and be fine-tuned in downstream tasks to improve the performance. As a result, they have achieved ... 详细信息
来源: 评论
Moto: Enhancing Embedding with Multiple Joint Factors for Chinese Text Classification
Moto: Enhancing Embedding with Multiple Joint Factors for Ch...
收藏 引用
International Conference on Pattern Recognition
作者: Xunzhu Tang Rujie Zhu Tiezhu Sun Shi Wang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China University of Central Florida Orlando FL USA Momenta Suzhou China Institute of Computing Technology Chinese Academy beijing China
Recently, language representation techniques have achieved great performances in text classification. However, most existing representation models are specifically designed for English materials, which may fail in Chi... 详细信息
来源: 评论