咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 247 篇 理学
    • 123 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 19 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 120 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 806 篇 英文
  • 158 篇 其他
  • 13 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
976 条 记 录,以下是791-800 订阅
排序:
Dual Consistent Constraint via Disentangled Consistency and Complementarity for Multi-view Clustering
arXiv
收藏 引用
arXiv 2025年
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yan Zeng ChengChuang Huang YiJie Ni ChunBao Zhou JiLin Zhang Jue Wang MingYao Zhou MeiTing Xue YunQuan Zhang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Key Laboratory for Modeling and Simulation of Complex Systems Ministry of Education Hangzhou China Data Security Governance Zhejiang Engineering Research Center Hangzhou China School of ITMO Joint Institute Hangzhou Dianzi University Hangzhou China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing China HuaWei State Key Laboratory of Computer Architecture Institute of Computing Technology of the Chinese Academy of Sciences Beijing China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or...
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
Discrete unified gas kinetic scheme for the conservative Allen-Cahn equation
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Chunhua Liang, Hong Guo, Zhaoli Wang, Lian-Ping Guangdong Provincial Key Laboratory of Turbulence Research and Applications Department of Mechanics and Aerospace Engineering Southern University of Science and Technology Guangdong Shenzhen518055 China Department of Physics Hangzhou Dianzi University Hangzhou310018 China State Key Laboratory of Coal Combustion Huazhong University of Science and Technology Wuhan430074 China Center for Complex Flows and Soft Matter Research Southern University of Science and Technology Guangdong Shenzhen518055 China Guangdong-Hong Kong-Macao Joint Laboratory for Data-Driven Fluid Mechanics and Engineering Applications Southern University of Science and Technology Guangdong Shenzhen518055 China
In this paper, the discrete unified gas kinetic scheme (DUGKS) with an improved microflux across the cell interface for the conservative Allen-Cahn equation (CACE) is proposed. In the context of DUGKS, the recovered k... 详细信息
来源: 评论
Heterogeneous graph completion collaborative network for attribute-missing heterogeneous graph representation learning
收藏 引用
Expert Systems with Applications 2025年 290卷
作者: Yang, Yuanjun Ou, Weihua Fu, Sichao Chen, Jiamin Wu, Yunshun School of Mathematical Sciences Guizhou Normal University Guiyang China School of Big Data and Computer Science Guizhou Normal University Guiyang China School of Electronic Information and Communication Huazhong University of Science and Technology Hubei China Engineering Research Center of Micro-Nano and Intelligent Manufacturing Ministry of Education Kaili Guizhou China
Heterogeneous graph representation learning has attracted significant attention and found widespread application in various real-world scenarios. Due to various uncontrollable factors, heterogeneous graph data often s... 详细信息
来源: 评论
SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX
SCB: Flexible and Efficient Asymmetric Computations Utilizin...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Wenyi Ouyang Qiongxiao Wang Wei Wang Jingqiang Lin Yaxi He Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Data Assurance and Communications Security Research Center Chinese Academy of Sciences Beijing China Beijing Research Institute University of Science and Technology of China Beijing China School of Cyber Security University of Science and Technology of China Hefei China
The wide spread of cloud computing and the rapid growth of online activities raise the demand for privacy enhancing cryptography, such as identity-based encryption (IBE), attribute-based encryption (ABE), and group/ri... 详细信息
来源: 评论
Modeling and analysis of the dynamic mechanism of rumor propagation considering the process of rumor refuting
Nonlinear Science
收藏 引用
Nonlinear science 2025年 3卷
作者: Xutao Li Junshan Pan Yong Hu Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education School of Cyber Science and Technology Hubei University Wuhan 430062 Hubei China School of Physics Huazhong University of Science and Technology Wuhan 430074 Hubei China
The boost of rumor spreading by the Internet has caused a series of social problems. Refuting the rumor timely can alleviate the harm caused by rumor dissemination. To investigate the propagation mechanism of rumor af...
来源: 评论
Evaluating the Cache Side Channel Attacks Against ECDSA  15th
Evaluating the Cache Side Channel Attacks Against ECDSA
收藏 引用
15th International Conference on Information security and Cryptology, Inscrypt 2019
作者: Ma, Ziqiang Cai, Quanwei Lin, Jingqiang Jing, Jiwu Ye, Dingfeng Meng, Lingjia State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Various attacks are proposed against different ECDSA implementations: the key-related data are acquired through cache side channels, and then processed to recover the private key. For each cache side channel attack, t... 详细信息
来源: 评论
VulDeeLocator: A deep learning-based fine-grained vulnerability detector
arXiv
收藏 引用
arXiv 2020年
作者: Li, Zhen Zou, Deqing Xu, Shouhuai Chen, Zhaoxuan Zhu, Yawei Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Cyber Security and Computer Hebei University Baoding071002 China The Department of Computer Science University of Colorado Colorado Springs CO80918 United States University of Texas San Antonio United States
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve the vulne... 详细信息
来源: 评论
Delay-Optimal Edge Cache Replacement with Non-Markovian Content Fetching
Delay-Optimal Edge Cache Replacement with Non-Markovian Cont...
收藏 引用
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
作者: Nannan Zhang Wei Wang Pan Zhou Aiping Huang College of Information Science and Electronic Engineering Zhejiang Provincial Key Laboratory of Information Processing Communication and Networking Zhejiang University Hangzhou China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Leveraging the content caching technology, popular contents can be in close proximity to the users, which reduces the delay effectively. In this paper, we dedicate to minimizing the long-term average delay for the cac... 详细信息
来源: 评论