咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 453 篇 期刊文献

馆藏范围

  • 972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 584 篇 工学
    • 449 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 120 篇 信息与通信工程
    • 90 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 30 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 13 篇 仪器科学与技术
    • 13 篇 土木工程
  • 246 篇 理学
    • 123 篇 数学
    • 78 篇 生物学
    • 48 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 22 篇 化学
    • 21 篇 系统科学
  • 147 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 35 篇 法学
    • 23 篇 社会学
  • 33 篇 医学
    • 26 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 49 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 computational mo...
  • 29 篇 federated learni...
  • 27 篇 privacy
  • 25 篇 deep learning
  • 21 篇 security
  • 21 篇 blockchain
  • 21 篇 accuracy
  • 21 篇 training
  • 18 篇 machine learning
  • 17 篇 graph neural net...
  • 17 篇 data models
  • 16 篇 optimization
  • 16 篇 contrastive lear...
  • 16 篇 authentication
  • 15 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 scalability
  • 13 篇 data privacy

机构

  • 101 篇 national enginee...
  • 83 篇 school of comput...
  • 67 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 56 篇 key laboratory o...
  • 51 篇 shandong enginee...
  • 50 篇 shandong provinc...
  • 40 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 school of inform...
  • 19 篇 shenzhen huazhon...
  • 18 篇 the hubei engine...

作者

  • 125 篇 hai jin
  • 122 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 das ashok kumar
  • 15 篇 mahmood khalid
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 803 篇 英文
  • 158 篇 其他
  • 12 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
972 条 记 录,以下是911-920 订阅
排序:
Crank Call Detection Models Based on Call data of Telephone Subscribers
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1673卷
作者: Wenbo Xie Zhen Liu Yan Fu Big Data Research Center University of Electronic Science and Technology of China Chengdu 611731 People's Republic of China Web Sciences Center School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 People's Republic of China
data explosion makes our life much more convenient than ever. For example, people always get timely news from Apps, and get interesting recommendations when shopping online. However, these conveniences come by probing...
来源: 评论
Lifelong Disk Failure Prediction via GAN-Based Anomaly Detection
Lifelong Disk Failure Prediction via GAN-Based Anomaly Detec...
收藏 引用
IEEE International Conference on Computer Design: VLSI in Computers and Processors, (ICCD)
作者: Tianming Jiang Jiangfeng Zeng Ke Zhou Ping Huang Tianming Yang Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China School of Computer Science & Technology Huazhong University of Science & Technology China School of Information Management Central China Normal University China Temple University USA Huanghuai University China
As a classical technique in storage systems, disk failure prediction aims at predicting impending disk failures in advance for high data reliability. Over the past decades, taking as input the SMART (Self-Monitoring, ...
来源: 评论
An Advanced Quantum-Resistant Signature Scheme for Cloud Based on Eisenstein Ring
收藏 引用
Computers, Materials & Continua 2018年 第7期56卷 19-34页
作者: Faguo Wu Xiao Zhang Wang Yao Zhiming Zheng Lipeng Xiang Wanpeng Li Key Laboratory of Mathematics Informatics and Behavioral SemanticsMinistry of EducationSchool of Mathematics and Systems ScienceBeihang UniversityBeijing100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing100191China The Fifth Electronics Research Institute of Ministry of Industry and Information Technology Guangzhou510610China Department of Electrical and Electronic Engineering City University of LondonUK
Signature,widely used in cloud environment,describes the work as readily identifying its *** existing signature schemes in the literature mostly rely on the Hardness assumption which can be easily solved by quantum **... 详细信息
来源: 评论
An Overview of General Theory of security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao Information Security Center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 评论
Errata to “On-Edge Multi-Task Transfer Learning: Model and Practice With data-Driven Task Allocation”
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2020年 第11期31卷 2569-2569页
作者: Qiong Chen Zimu Zheng Chuang Hu Dan Wang Fangming Liu National Engineering Research Center for Big Data Technology and System Huazhong University of Science and Technology Wuhan China Edge Cloud Innovation Lab Technical Innovation Department Cloud BU Huawei Technologies Company Ltd. Shenzhen China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong
Presents corrections to author information for the above named paper.
来源: 评论
Interactive Ontology Matching Based on Evolutionary Algorithm
Interactive Ontology Matching Based on Evolutionary Algorith...
收藏 引用
International Conference on Computational Intelligence and security
作者: Xingsi Xue Junfeng Chen Aihong Ren College of Information Science and Engineering Intelligent Information Processing Research Center Fujian Key Lab for Automotive Electronics and Electric Drive Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China College of IOT Engineering Hohai University ChanZhou China School of Mathematics and Information Science Baoji University of Arts and Sciences Baoji China
Since different ontologies are mostly developed independently, establishing meaningful links between their entities, so-called ontology matching, is critical to ensure their communication. Due to the complexity of the... 详细信息
来源: 评论
Mapping essential urban land use categories in China(EULUC-China):preliminary results for 2018
收藏 引用
science Bulletin 2020年 第3期65卷 182-187页
作者: Peng Gong Bin Chen Xuecao Li Han Liu Jie Wang Yuqi Bai Jingming Chen Xi Chen Lei Fang Shuailong Feng Yongjiu Feng Yali Gong Hao Gu Huabing Huang Xiaochun Huang Hongzan Jiao Yingdong Kang Guangbin Lei Ainong Li Xiaoting Li Xun Li Yuechen Li Zhilin Li Zhongde Li Chong Liu Chunxia Liu Maochou Liu Shuguang Liu Wanliu Mao Changhong Miao Hao Ni Qisheng Pan Shuhua Qi Zhehao Ren Zhuoran Shan Shaoqing Shen Minjun Shi Yimeng Song Mo Su Hoi Ping Suen Bo Sun Fangdi Sun Jian Sun Lin Sun Wenyao Sun Tian Tian Xiaohua Tong Yihsing Tseng Ying Tu Hong Wang Lan Wang Xi Wan Zongming Wang Tinghai Wu Yaowen Xie Jian Yang Jun Yang Man Yuan Wenze Yue Hongda Zeng Kuo Zhang Neng Zhang Tao Zhang Yu Zhang Feng Zhao Yichen Zheng Qiming Zhou Nicholas Clinton Zhiliang Zhu Bing Xu Ministry of Education Key Laboratory for Earth System Modeling Department of Earth System ScienceTsinghua UniversityBeijing 100084China Tsinghua Urban Institute Tsinghua UniversityBeijing 100084China Center for Healthy Cities Institute for China Sustainable UrbanizationTsinghua UniversityBeijing 100084China Department of Land Air and Water ResourcesUniversity of CaliforniaDavisCA 95616-8627USA Department of Geological and Atmospheric Sciences Iowa State UniversityAmesIA 50011USA State Key Laboratory of Remote Sensing Science Institute of Remote Sensing and Digital EarthChinese Academy of SciencesBeijing 100101China AI for Earth Laboratory Cross-Strait InstituteTsinghua UniversityBeijing 100084China International Institute for Earth System Sciences Nanjing UniversityNanjing 210093China Research Center for Ecology and Environment of Central Asia Chinese Academy of SciencesUrumchi 830011China Key Laboratory of Forest Ecology and Management Institute of Applied EcologyChinese Academy of SciencesShenyang 110016China National Engineering Laboratory for Applied Technology in Forestry&Ecology in South China College of Life Science and TechnologyCentral South University of Forestry and TechnologyChangsha 410004China College of Surveying&Geo-Informatics Tongji UniversityShanghai 200092China Department of Urban Planning College of Architecture and Urban PlanningTongji UniversityShanghai 200092China Beijing Institute of Urban Planning Beijing 100045China Department of Urban Planning School of Urban DesignWuhan UniversityWuhan 430072China College of Earth Sciences Jilin UniversityChangchun 130061China Research Center for Digital Mountain and Remote Sensing Application Institute of Mountain Hazards and EnvironmentChinese Academy of SciencesChengdu 610041China Institute of Remote Sensing and Geographic Information System School of Earth and Space SciencesPeking UniversityBeijing 100871China Department of Urban and Regional Planning School of Geography and PlanningSun Yat-sen Univ
Land use reflects human activities on *** land use is the highest level human alteration on Earth,and it is rapidly changing due to population increase and *** areas have widespread effects on local hydrology,climate,... 详细信息
来源: 评论
Towards the Trust-Enhancements of Single Sign-On Services
Towards the Trust-Enhancements of Single Sign-On Services
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Xuhua Bao Xiaokun Zhang Jingqiang Lin Dawei Chu Qiongxiao Wang Fengjun Li Legendsec Information Technology (Beijing) Inc. CHINA Joint Laboratory of Institute of Information Engineering Chinese Academy of Sciences and QiAnXin Group Academy of Opto-Electronics Chinese Academy of Sciences State Key Laboratory of Information Security Chinese Academy of Sciences Data Assurance and Communication Security Research Center Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Department of Electrical Engineering and Computer Science University of Kansas USA
Single sign-on (SSO) becomes popular as the identity management and authentication infrastructure in the Internet. A user receives an SSO ticket after being authenticated by the identity provider (IdP), and this IdP-i... 详细信息
来源: 评论
Future Changes in Rainy Seasons in the Upper Blue Nile Basin: Impacts on Agriculture and Water Resources
Natural Hazards Research
收藏 引用
Natural Hazards research 2025年
作者: Fekadie Bazie Enyew Dejene Sahlu Gashaw Bimrew Tarekegn Yakob Umer Belen Marti-Cardona Bedassa R. Cheneka Daniel Asfaw Bekele Daniel Ayalew Mengistu Sarkawt Hama Zinaw D. Shenga Sisay E. Debele Institute of Disaster Risk Management and Food Security Studies Bahir Dar University P.O. Box 5501 Bahir Dar Ethiopia International Water Management Institute Hatfield Gardens 333 Grosvenor Street Hatfield Pretoria South Africa School of Sustainability Civil and Environmental Engineering Faculty of Engineering and Physical Sciences University of Surrey Guildford GU2 7XH United Kingdom Biology Department Utrecht University The Netherlands University of Antwerp Belgium Department of Geography and Environmental Studies Bahir Dar University P.O. Box 79 Bahir Dar Ethiopia Geospatial Data and Technology Center (GDTC) Bahir Dar University P.O. Box 79 Bahir Dar Ethiopia Global Centre for Clean Air Research Department of Civil and Environmental Engineering Faculty of Engineering and Physical Sciences University of Surrey Guildford GU2 7XH United Kingdom Department of Chemistry College of Science University of Sulaimani Sulaimani City 46001 Kurdistan Region Iraq Slovak Hydrometeorological Institute Jeséniova 17 833 15 Bratislava Slovak Republic Department of Global Health and Development Faculty of Public Health and Policy London School of Hygiene & Tropical Medicine London WC1H 9SH UK
Changing climate is increasingly influencing the rainy seasons and posing significant challenges for agriculture and water resource management in vulnerable regions. The study examines the spatiotemporal variation of ... 详细信息
来源: 评论
Erratum to “High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators”
收藏 引用
security and Communication Networks 2020年 第1期2020卷
作者: Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 *** Data Assurance and Communications Security Research Center Chinese Academy of Sciences Beijing 100093 *** School of Cyber Security University of Chinese Academy of Sciences Beijing 100093 *** China Information Technology Security Evaluation Center Beijing 100085 *** School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 100093 ***
来源: 评论