咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 247 篇 理学
    • 123 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 19 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 66 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 120 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 806 篇 英文
  • 158 篇 其他
  • 13 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
976 条 记 录,以下是841-850 订阅
排序:
衰亡链揭示互利共生生态系统中安全与崩溃的中间阶段(英文)
收藏 引用
engineering 2024年 第12期 89-98页
作者: 王光炜 刘雪明 肖颖 袁烨 潘林强 管晓宏 高建喜 张海涛 The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and Technology Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Tsinghua National Laboratory of Information Science and Technology Department of Automation Tsinghua University Department of Computer Science Rensselaer Polytechnic Institute
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities, such as overfishing and deforestation, and the effects of such damage on ecological stability are u...
来源: 评论
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-specific and Domain-shared Knowledge
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Tian, Hui Qiu, Yiqin Li, Haizhou Zhang, Xinpeng Vasilakos, Athanasios V. National Huaqiao University College of Computer Science and Technology Xiamen361021 China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China School of Data Science Chinese University of Hong Kong Shenzhen518172 China National University of Singapore Department of Electrical and Computer Engineering 119077 Singapore Fudan University School of Computer Science Shanghai200433 China University of Agder Center for AI Research Grimstad4879 Norway
Universal low bit-rate speech steganalysis is a cutting-edge research task addressing real-world application needs and has garnered significant attention recently. However, the existing methods are still inadequate in... 详细信息
来源: 评论
research on KDT-DBSCAN-based Personal Semantic Location Acquisition
Research on KDT-DBSCAN-based Personal Semantic Location Acqu...
收藏 引用
第32届中国控制与决策会议
作者: Rong Nie Zixuan Yao Dong Wei Kaizhang Hou Jishuai Lin Beijing Engineering Research Center of Security Alarm and Security Check School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing Municipal Science and Technology Commission Haidian Branch of Beijing Public Security Bureau
With the development of science and technology in recent years,the planning and construction of smart cities have entered a new *** them,smart city safety management is the foundation that supports the stable developm... 详细信息
来源: 评论
A systematic collection of medical image datasets for deep learning
arXiv
收藏 引用
arXiv 2021年
作者: Li, Johann Zhu, Guangming Hua, Cong Feng, Mingtao Bennamoun, Basheer Li, Ping Lu, Xiaoyuan Song, Juan Shen, Peiyi Xu, Xu Mei, Lin Zhang, Liang Shah, Syed Afaq Ali Bennamoun, Mohammed School of Computer Science and Technology Xidian University China School of Medicine University of Notre Dame Australia Data and Virtual Research Room Shanghai Broadband Network Center China Third Research Institute of The Ministry of Public Security China Discipline of Information Technology Media and Communications Murdoch University Australia Department of Computer Science and Software Engineering University of Western Australia Australia
The astounding success made by artificial intelligence (AI) in healthcare and other fields proves that AI can achieve human-like performance. However, success always comes with challenges. Deep learning algorithms are... 详细信息
来源: 评论
Ensuring data Confidentiality with a Secure XTS-AES Design in Flash Translation Layer  5
Ensuring Data Confidentiality with a Secure XTS-AES Design i...
收藏 引用
5th IEEE International Conference on Cloud Computing and big data Analytics, ICCCBDA 2020
作者: Zhang, Qionglu Jia, Shijie He, Junlin Zhao, Xinyi Xia, Luning Niu, Yingjiao Jing, Jiwu State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Beijing Certificate Authority Corporation Limited Beijing China
Nowadays sensitive data are commonly stored on personal mobile devices (e.g., laptops and smartphones) or public cloud storage platforms. data on these platforms are commonly protected with strong cryptography like fu... 详细信息
来源: 评论
Efficient Hardware-Assisted Crash Consistency in Encrypted Persistent Memory
Efficient Hardware-Assisted Crash Consistency in Encrypted P...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Zhan Zhang Jianhui Yue Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China Computer Science Department Michigan Technological University Houghton Michigan
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure data recoverability and data confidentiality. The enforcement of these two goals does not only put more burden on pr... 详细信息
来源: 评论
Weighted Linear Multiple Kernel Learning for Saliency Detection  2nd
Weighted Linear Multiple Kernel Learning for Saliency Detect...
收藏 引用
2nd EAI International Conference on Robotic Sensor Networks, ROSENET 2018
作者: Zhou, Quan Wu, Jinwen Fan, Yawen Zhang, Suofei Wu, Xiaofu Zheng, Baoyu Jin, Xin Lu, Huimin Latecki, Longin Jan National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Information Engineering China University of Geosciences Wuhan China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications Nanjing China Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China CETC Big Data Research Institute Co. Ltd. Guizhou Guiyang China Department of Mechanical and Control Engineering Kyushu Institute of Technology Kitakyushu Japan Department of Computer and Information Sciences Temple University PhiladelphiaPA United States
This paper presents a novel saliency detection method based on weighted linear multiple kernel learning (WLMKL), which is able to adaptively combine different contrast measurements in a supervised manner. Three common... 详细信息
来源: 评论
research on Pre-view Method of Safety Level of Cascading Trip for Power Grid  6th
Research on Pre-view Method of Safety Level of Cascading Tri...
收藏 引用
6th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2021
作者: Deng, Huiqiong Li, Qinbin Zheng, Rongjin Li, Peiqiang Chang, Kuo-Chi School of Information Science and Engineering Fujian University of Technology No. 3 Xueyuan Road University Town Minhou Fuzhou Fujian350118 China Fujian Provincial University Engineering Research Center of Smart Grid Simulation Analysis and Integrated Control Fuzhou Fujian350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No. 3 Xueyuan Road University Town Minhou Fuzhou Fujian350118 China College of Mechanical & Electrical Engineering National Taipei University of Technology No. 1 Section 3 Zhongxiao East Road Taipei10608 Taiwan Department of Business Administration North Borneo University College Lot 47 Block-F Alamesra Permai Plaza 2 Jln Sulaman Kota Kinabalu Sabah88400 Malaysia
This article introduces a method by which the power grid's security level can be observed in advance based on the expected initial failure. Firstly, based on the general form of cascading trip, this paper gives a ... 详细信息
来源: 评论
Minimum Spanning Tree Clustering Based on Density Filtering  7th
Minimum Spanning Tree Clustering Based on Density Filtering
收藏 引用
7th CCF Academic Conference on bigdata, CCF bigdata 2019
作者: Wang, Ke Xie, Xia Sun, Jiayu Cao, Wenzhi National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hunan University of Technology and Business Changsha410205 China
Clustering analysis is an important method in data mining. In order to recognize clusters with arbitrary shapes as well as clusters with different density, we propose a new clustering approach: minimum spanning tree c... 详细信息
来源: 评论
Adaptive Fuzzy Tracking Control with Global Prescribed-Time Prescribed Performance for Uncertain Strict-Feedback Nonlinear Systems
arXiv
收藏 引用
arXiv 2022年
作者: Mao, Bing Wu, Xiaoqun Liu, Hui Xu, Yuhua Lü, Jinhu The School of Mathematics and Statistics Wuhan University Hubei430072 China Hubei Key Laboratory of Computational Science Wuhan University Hubei430072 China Research Center of Complex Network Wuhan University Hubei430072 China The School of Automation Huazhong University of Science and Technology Hubei430074 China The Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China Hubei430074 China The School of Statistics and Data Science Nanjing Audit University Jiangsu211815 China The School of Automation Science and Electrical Engineering Beihang University Beijing100191 China
Adaptive fuzzy control strategies are established to achieve global prescribed performance with prescribed-time convergence for strict-feedback systems with mismatched uncertainties and unknown nonlinearities. Firstly... 详细信息
来源: 评论