咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 464 篇 期刊文献

馆藏范围

  • 971 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 591 篇 工学
    • 452 篇 计算机科学与技术...
    • 355 篇 软件工程
    • 120 篇 信息与通信工程
    • 94 篇 电气工程
    • 68 篇 控制科学与工程
    • 60 篇 生物工程
    • 50 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 31 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 14 篇 仪器科学与技术
    • 13 篇 土木工程
  • 251 篇 理学
    • 125 篇 数学
    • 79 篇 生物学
    • 48 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 22 篇 化学
    • 22 篇 系统科学
  • 148 篇 管理学
    • 97 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 36 篇 法学
    • 24 篇 社会学
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 4 篇 军事学
  • 3 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学

主题

  • 46 篇 semantics
  • 30 篇 feature extracti...
  • 26 篇 deep learning
  • 26 篇 computational mo...
  • 26 篇 privacy
  • 22 篇 federated learni...
  • 21 篇 blockchain
  • 20 篇 security
  • 20 篇 training
  • 19 篇 machine learning
  • 17 篇 data models
  • 16 篇 graph neural net...
  • 16 篇 accuracy
  • 15 篇 authentication
  • 14 篇 neural networks
  • 14 篇 optimization
  • 14 篇 data mining
  • 14 篇 predictive model...
  • 13 篇 memory managemen...
  • 13 篇 contrastive lear...

机构

  • 102 篇 national enginee...
  • 83 篇 school of comput...
  • 67 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 50 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 41 篇 huazhong univers...
  • 38 篇 national enginee...
  • 34 篇 hubei engineerin...
  • 31 篇 hubei key labora...
  • 30 篇 services computi...
  • 28 篇 cluster and grid...
  • 26 篇 school of softwa...
  • 24 篇 hubei engineerin...
  • 22 篇 hubei engineerin...
  • 21 篇 college of infor...
  • 20 篇 shenzhen huazhon...
  • 20 篇 school of inform...
  • 18 篇 the hubei engine...

作者

  • 126 篇 hai jin
  • 119 篇 jin hai
  • 49 篇 zhou pan
  • 43 篇 xiaofei liao
  • 27 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liu daizong
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 19 篇 zhang leo yu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 deqing zou
  • 16 篇 das ashok kumar
  • 16 篇 mahmood khalid
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 dan feng

语言

  • 879 篇 英文
  • 79 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Security Engineering Research Center and Huazhong University of Science and Technology"
971 条 记 录,以下是961-970 订阅
排序:
Privacy preserving for network coding in smart grid  15th
Privacy preserving for network coding in smart grid
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: He, Shiming Zeng, Weini Xie, Kun Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Hunan Province Engineering Research Center of Electric Transportation and Smart Distributed Network Changsha University of Science and Technology Changsha410114 China The 716th Research Institute China Shipbuilding Industry Corporation Lianyungang222061 China College of Computer Science and Electronics Engineering Hunan University Changsha410082 China Department of Electrical and Computer Engineering State University of New York at Stony Brook New York United States
In smart grid, privacy implications to individuals and their family is an important issue, due to the fine-grained usage data collection. Wireless communications are considered by many utility companies to obtain info... 详细信息
来源: 评论
A note on weight distributions of irreducible cyclic codes
A note on weight distributions of irreducible cyclic codes
收藏 引用
2014 International Conference on Information and Communications Technologies, ICT 2014
作者: Tang, Chunming Qi, Yanfeng Xu, Maozhi Wang, Baocheng Yang, Yixian School of Mathematics and Information China West Normal University Sichuan Nanchong 637002 China LMAM School of Mathematical Sciences Peking University Beijing 100871 China Aisino Corporation Inc Beijing 100195 China College of Information Engineering North China University of Technology Beijing 100144 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Research Center on fictitious Economy and Data Science Chinese Academy of Sciences Beijing 100190 China
Usually, it is difficult to determine the weight distribution of an irreducible cyclic code. In this paper, we discuss the case that an irreducible cyclic code has the maximal number of distinct nonzero weights and gi... 详细信息
来源: 评论
research on the E-commerce's user experience evaluation model
Research on the E-commerce's user experience evaluation mode...
收藏 引用
2nd International Conference on Mechanical engineering, Industrial Electronics and Informatization, MEIEI 2013
作者: Liu, Xin Xiong Liu, Qing Yun Wang, Wei Huang, Cong Mei Li, Wen Si School of Mechanical Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China Automotive Data Center China Automotive Technology and Research Center Beijing 100176 China
Firstly, the current situations of E-commerce's user experience evaluation model were analyzed. And then, fuzzy comprehensive analyses were introduced. After that, an improved E-commerce's user experience eval... 详细信息
来源: 评论
research on the Operational Characteristics of Diverging Area on Expressway Off-ramp based on Different Restricted Strategy of Lane
收藏 引用
Procedia - Social and Behavioral sciences 2013年 96卷 1156-1164页
作者: Jianguo Gong Xiucheng Guo Shuai Dai Li Duan Road Traffic Safety Research Center of the Ministry of Public Security 14th floor B Buidlingsthe center of Xinshijie No.3 DongCheng District Beijing 100062 China School of Transportation Southeast UniversityRoom 327 1th Buildings No.35 Jinxianghe Road Nanjing Jiangsu 210096 School of Civil Engineering and Mechanics Huazhong University of Science & Technology Room201 the West Building No.6 No.1037 Luoyu Road Wuhan 430074
In order to find the operational characteristics of diverging area on expressway off-ramp with Vehicle Type Restricted Strategy(VTRS) and Vehicle Type Unrestricted Strategy(VTUS) in different lane, this paper analyzed... 详细信息
来源: 评论
On the security of a certificateless signature scheme
On the security of a certificateless signature scheme
收藏 引用
2010 2nd International Conference on Signal Processing Systems, ICSPS 2010
作者: Miao, Songqin Zhang, Futai Zhang, Lei School of Computer Science and Technology Nanjing Normal University Nanjing China Jiangsu Engineering Research Center on Information Security and Privacy Protection Technology Nanjing China UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Av. Països Catalans 26 E-43007 Tarragona Catalonia Spain
Certificateless public key cryptography (CLPKC) eliminates certificate management in traditional public key infrastructure and solves the problem of the key escrow in identity-based cryptography. Certificateless signa... 详细信息
来源: 评论
Price naming on home appliance load controls in real-time pricing environment
Price naming on home appliance load controls in real-time pr...
收藏 引用
IEEE General Meeting Power& Energy Society
作者: S. Tiptipakorn W.-J. Lee C. Mao J. Lu ERCOT ISO Taylor TX USA Energy Systems Research Center (ESRC) University of Texas Arlington Arlington TX USA Department of Electrical Engineering Hubei Electric Power Security and High Efficiency Key Laboratory Huazhong University of Science and Technology Wuhan China
The EPAct 2005 expresses the Federal Government's commitment to provide supporting infrastructures for electricity demand response to all classes of customers. Most end-use residential consumers are not able to pa... 详细信息
来源: 评论
ESALP2: Efficient Signature Aggregation with Location Privacy Preservation in Wireless Body Area Networks
收藏 引用
ACM Transactions on Sensor Networks 1000年
作者: Arun Sekar Rajasekaran Azees Maria Basker Palaniswamy Ashok Kumar Das Mohammed J.F. Alenazi Department of Electronics and Communication Engineering SR University Hanamakonda India School of Computer Science and Engineering VIT-AP University Amaravati India Insight Centre for Data Analytics School of Computer Science and Information Technology University College Cork Cork Ireland Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad Hyderabad India Department of Computer Engineering College of Computer and Information Sciences CCIS) King Saud University Riyadh Saudi Arabia
For Wireless Body Area Networks (WBANs), the security of sensitive data of patients is of the utmost importance, particularly in healthcare environments. This study presents a novel methodology for improving the effic... 详细信息
来源: 评论
Correlation-aware Cross-modal Attention Network for Fashion Compatibility Modeling in UGC Systems
收藏 引用
ACM Transactions on Multimedia Computing, Communications, and Applications 1000年
作者: Kai Cui Shenghao Liu Wei Feng Xianjun Deng Liangbin Gao Minmin Cheng Hongwei Lu Laurence T. Yang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China China Nuclear Power Operation Technology Corporation Ltd. China
Empowered by the continuous integration of social multimedia and artificial intelligence, the application scenarios of information retrieval (IR) progressively tend to be diversified and personalized. Currently, User-... 详细信息
来源: 评论
AMSPM: Adaptive Model Selection and Partition Mechanism for Edge Intelligence-driven 5G Smart City with Dynamic Computing Resources
收藏 引用
ACM Transactions on Sensor Networks 1000年
作者: Xin Niu Xuejiao Cao Chen Yu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the help of 5G network, edge intelligence (EI) can not only provide distributed, low-latency, and high-reliable intelligent services, but also enable intelligent maintenance and management of smart city. However,... 详细信息
来源: 评论
Contrastive Learning based Speech Spoofing Detection for Multimedia security in Edge Intelligence
收藏 引用
ACM Transactions on Multimedia Computing, Communications, and Applications 1000年
作者: Jiaqi Sun Xianjun Deng Shenghao liu Xiaoxuan Fan Yongling Huang Yuanyuan He Celimuge Wu Jong Hyuk Park Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China The University of Electro-Communications Japan Seoul National University of Science and Technology South Korea
Artificial intelligence (AI) empowered edge computing has given rise to a new paradigm and effectively facilitated the promotion and development of multimedia applications. The speech assistant is one of the significa... 详细信息
来源: 评论