咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 453 篇 期刊文献

馆藏范围

  • 972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 246 篇 理学
    • 123 篇 数学
    • 78 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 33 篇 医学
    • 26 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 18 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 101 篇 national enginee...
  • 83 篇 school of comput...
  • 67 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 803 篇 英文
  • 158 篇 其他
  • 12 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
972 条 记 录,以下是851-860 订阅
排序:
Accountable privacy-enhanced multi-authority attribute-based authentication scheme for cloud services*✰
收藏 引用
Computer Communications 2025年
作者: Xin Liu Hao Wang Bo Zhang Bin Zhang School of Information Engineering Shandong Youth University of Political Science Jinan 250103 China New Technology Research and Development Center of Intelligent Information Controlling in Universities of Shandong Jinan 250103 China Smart Healthcare Big Data Engineering and Ubiquitous Computing Characteristic Laboratory in Universities of Shandong Jinan 250103 China School of Information Science and Engineering Shandong Normal University Jinan 250358 China School of Information Science and Engineering University of Jinan Jinan 250022 China
Current attribute-based authentication (ABA) schemes have three major drawbacks: first, the single attribute authority (AA) becomes the system bottleneck, i.e., if the AA is corrupted, the entire system will stop work...
来源: 评论
An improved discrete unified gas kinetic scheme for simulating compressible natural convection flows
收藏 引用
Journal of Computational Physics: X 2021年 11卷
作者: Wen, Xin Wang, Lian-Ping Guo, Zhaoli Shen, Jie Department of Mechanical Engineering 126 Spencer Laboratory University of Delaware NewarkDE19716-3140 United States Guangdong Provincial Key Laboratory of Turbulence Research and Applications Center for Complex Flows and Soft Matter Research Department of Mechanics and Aerospace Engineering Southern University of Science and Technology ShenzhenGuangdong518055 China Guangdong-Hong Kong-Macao Joint Laboratory for Data-Driven Fluid Mechanics and Engineering Applications Southern University of Science and Technology Shenzhen518055 China State Key Laboratory of Coal Combustion Huazhong University of Science and Technology Wuhan China Shanghai Institute of Applied Mathematics and Mechanics Shanghai University Shanghai China
Discrete unified gas-kinetic scheme (DUGKS) has been developed recently as a general method for simulating flows at all Knudsen numbers. In this study, we extend DUGKS to simulate fully compressible thermal flows. We ... 详细信息
来源: 评论
Reasoning over the Air: A Reasoning-based Implicit Semantic-Aware Communication Framework
arXiv
收藏 引用
arXiv 2023年
作者: Xiao, Yong Liao, Yiwei Li, Yingyu Shi, Guangming Poor, H. Vincent Saad, Walid Debbah, Mérouane Bennis, Mehdi The School of Electronic Information and Communications The Huazhong University of Science and Technology Wuhan430074 China The Peng Cheng Laboratory Guangdong Shenzhen518055 China Guangdong Guangzhou510555 China The School of Mech. Eng. and Elect. Inform. The China University of Geosciences Wuhan430074 China The School of Artificial Intelligence The Xidian University Shaanxi Xi’an710071 China The Department of Electrical and Computer Engineering Princeton University PrincetonNJ08544 United States The Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States Cyber Security Systems and Applied AI Research Center Lebanese American University Beirut Lebanon Khalifa University of Science and Technology P O Box 127788 Abu Dhabi United Arab Emirates CentraleSupelec University Paris-Saclay Gif-sur-Yvette91192 France The University of Oulu Oulu90014 Finland
—Semantic-aware communication is a novel paradigm that draws inspiration from human communication focusing on the delivery of the meaning of messages. It has attracted significant interest recently due to its potenti... 详细信息
来源: 评论
The role of usability on e-learning user interactions and satisfaction: a literature review
收藏 引用
Journal of Systems and Information technology 2019年 第3期21卷 368-394页
作者: Gunesekera, Asela Indunil Bao, Yukun Kibelloh, Mboni Center for Modern Information Managment Huazhong University of Science and Technology Wuhan China Center for Big Data Analytics Jiangxi University of Engineering Xinyu China Faculty of Arts and Social Science Tumaini University Makumira – Dar es Salaam College Dar es Salaam Tanzania United Republic of Department of Computer Science General Sir John Kotelawala Defence University Ratmalana Sri Lanka
Purpose: The purpose of this study is to review the effect of usability factors on e-learning user relationships, namely, student–student interaction (SSI), student–instructor interaction (SII) and student–content ... 详细信息
来源: 评论
DAMIA: Leveraging domain adaptation as a defense against membership inference attacks
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Hongwei Luo, Weiqi Zeng, Guoqiang Weng, Jian Zhang, Yue Yang, Anjia College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China
Deep Learning (DL) techniques allow one to train a model from a dataset, and the model can be adopted to solve tasks. DL has attracted much interest given its fancy performance and potential market value, while securi... 详细信息
来源: 评论
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes
Extending Registration and Authentication Processes of FIDO2...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chengqian Guo Quanwei Cai Qiongxiao Wang Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering CAS Data Assurance and Communication Security Research Center CAS School of Cyber Security University of Chinese Academy of Sciences School of Cyber Security University of Science and Technology of China
FIDO2, the newest set of FIDO specifications, enables the user to leverage an external authenticator for the authentication in both mobile and desktop environments (referred to as user agent). For the secure registrat... 详细信息
来源: 评论
TML-CDS: Trusted Multi-layer Connected Dominating Set for Secure Routing in Distributed Networks
TML-CDS: Trusted Multi-layer Connected Dominating Set for Se...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Weidong Fang Li Yi Chunsheng Zhu Guoqing Jia Wuxiong Zhang Science and Technology on Micro-system Laboratory Shanghai Institute of Micro-system and Information TechnologyChinese Academy of Sciences Shanghai P. R. China University of Chinese Academy of Sciences. Beijing P. R. China Shanghai Research and Development Center for Micro-Nano Electronics Shanghai P. R. China College of Big Data and Internet Shenzhen Technology University Shenzhen Guangdong China College of Physics and Electronic Information Engineering Qinghai Minzu University Xining P. R. China Zhongke WaterTech Research (Jiangxi) Technology Co. Ltd. Nanchang P. R. China
The internal attack launched by compromised nodes is a serious security risk in distributed networks. It is due to the openness of wireless channel and the lack of trust relationships between nodes. The trust model is... 详细信息
来源: 评论
Cost-efficient and skew-aware data scheduling for incremental learning in 5G network
arXiv
收藏 引用
arXiv 2020年
作者: Pu, Lingjun Yuan, Xinjing Xu, Xiaohang Chen, Xu Zhou, Pan Xu, Jingdong The College of Computer Science Nankai University Tianjin300071 China The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710126 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The Pazhou Lab. Guangzhou510335 China The Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
To facilitate the emerging applications in 5G networks, mobile network operators will provide many network functions in terms of control and prediction. Recently, they have recognized the power of machine learning (ML... 详细信息
来源: 评论
Peripheral-free device pairing by randomly switching power
arXiv
收藏 引用
arXiv 2020年
作者: Shao, Zhijian Weng, Jian Zhang, Yue Wu, Yongdong Li, Ming Weng, Jiasi Luo, Weiqi Yu, Shui College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China University of Technology Sydney UltimoNSW Australia
The popularity of Internet-of-Things (IoT) comes with security concerns. Attacks against wireless communication venues of IoT (e.g., Man-in-the-Middle attacks) have grown at an alarming rate over the past decade. Pair... 详细信息
来源: 评论
MorLog: Morphable Hardware Logging for Atomic Persistence in Non-Volatile Main Memory
MorLog: Morphable Hardware Logging for Atomic Persistence in...
收藏 引用
Annual International Symposium on Computer Architecture, ISCA
作者: Xueliang Wei Dan Feng Wei Tong Jingning Liu Liuqing Ye Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology (School of Computer Science and Technology Huazhong University of Science and Technology) Ministry of Education of China
Byte-addressable non-volatile memory (NVM) is emerging as an alternative for main memory. Non-volatile main memory (NVMM) systems are required to support atomic persistence and deal with the high overhead of programmi...
来源: 评论