咨询与建议

限定检索结果

文献类型

  • 516 篇 期刊文献
  • 454 篇 会议
  • 4 册 图书

馆藏范围

  • 974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 632 篇 工学
    • 475 篇 计算机科学与技术...
    • 382 篇 软件工程
    • 122 篇 信息与通信工程
    • 85 篇 电气工程
    • 76 篇 控制科学与工程
    • 68 篇 生物工程
    • 43 篇 安全科学与工程
    • 42 篇 电子科学与技术(可...
    • 36 篇 机械工程
    • 32 篇 网络空间安全
    • 30 篇 生物医学工程(可授...
    • 27 篇 化学工程与技术
    • 24 篇 光学工程
    • 21 篇 建筑学
    • 20 篇 交通运输工程
    • 19 篇 土木工程
  • 280 篇 理学
    • 147 篇 数学
    • 89 篇 生物学
    • 58 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 29 篇 化学
    • 17 篇 系统科学
  • 138 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 41 篇 法学
    • 27 篇 社会学
  • 31 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 17 篇 公共卫生与预防医...
  • 17 篇 经济学
    • 16 篇 应用经济学
  • 11 篇 农学
  • 8 篇 教育学
  • 8 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 36 篇 semantics
  • 29 篇 deep learning
  • 27 篇 federated learni...
  • 27 篇 accuracy
  • 25 篇 privacy
  • 20 篇 blockchain
  • 20 篇 training
  • 19 篇 anomaly detectio...
  • 19 篇 security
  • 17 篇 contrastive lear...
  • 17 篇 computational mo...
  • 17 篇 machine learning
  • 16 篇 data privacy
  • 15 篇 neural networks
  • 15 篇 differential pri...
  • 15 篇 data models
  • 14 篇 authentication
  • 13 篇 codes
  • 12 篇 deep neural netw...

机构

  • 69 篇 shandong provinc...
  • 68 篇 key laboratory o...
  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 48 篇 school of comput...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 24 篇 hubei engineerin...
  • 24 篇 school of cyber ...
  • 23 篇 tu dortmund univ...
  • 23 篇 school of softwa...
  • 22 篇 state key labora...
  • 20 篇 school of inform...
  • 19 篇 data assurance a...
  • 19 篇 shandong fundame...
  • 18 篇 huazhong univers...

作者

  • 47 篇 zhou pan
  • 37 篇 jin hai
  • 31 篇 hai jin
  • 26 篇 pauly markus
  • 26 篇 hu shengshan
  • 24 篇 neider daniel
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 14 篇 roy rajarshi
  • 13 篇 wang haoyu
  • 13 篇 fang xiang
  • 12 篇 wan wei
  • 11 篇 pan zhou
  • 11 篇 jing zhao

语言

  • 835 篇 英文
  • 134 篇 其他
  • 4 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Data Science and Security"
974 条 记 录,以下是1-10 订阅
排序:
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
Attributing Mental States to Non-Embodied Autonomous Systems: A Systematic Review
Attributing Mental States to Non-Embodied Autonomous Systems...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI EA 2025
作者: Wischnewski, Magdalena Research Center Trustworthy Data Science and Security Dortmund Germany
Rapidly evolving, non-embodied autonomous agents, oftentimes powered by AI, have been shown to trigger mental state attributions by users. However, unlike embodied agents, attributions to non-embodied autonomous agent... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
On the Independence of Adversarial Transferability to Topological Changes in the dataset  10
On the Independence of Adversarial Transferability to Topolo...
收藏 引用
10th IEEE International Conference on data science and Advanced Analytics, DSAA 2023
作者: Newen, Carina Muller, Emmanuel Tu Dortmund Research Center Trustworthy Data Science & Security Computer Science Dortmund Germany
One curious property of neural networks is the vulnerability to specific attacks, often called adversarial examples. One of the directions adversarial transferability research has taken is to focus on dataset features... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time
收藏 引用
Proceedings of the ACM on Human-Computer Interaction 2023年 第CSCW2期7卷 1-45页
作者: Kowalewski, Marvin Utz, Christine Degeling, Martin Schnitzler, Theodor Herbert, Franziska Schaewitz, Leonie Farke, Florian M. Becker, Steffen Dürmuth, Markus Ruhr University Bochum Bochum Germany CISPA Helmholtz Center for Information Security Saarbrücken Germany Research Center Trustworthy Data Science and Security TU Dortmund University Dortmund Germany Max Planck Institute for Security and Privacy Bochum Germany Leibniz University Hannover Hannover Germany
The COVID-19 pandemic has prompted countries around the world to introduce smartphone apps to support disease control efforts. Their purposes range from digital contact tracing to quarantine enforcement to vaccination... 详细信息
来源: 评论
ChatGPT as a Negotiator: An Analysis of its Adherence with Proportionality and Equality  7
ChatGPT as a Negotiator: An Analysis of its Adherence with P...
收藏 引用
7th International Conference on Algorithms, Computing and Artificial Intelligence, ACAI 2024
作者: Aksoy, Meltem Tsishetska, Veronika Computer Science Research Center Trustworthy Data Science and Security Technical University Dortmund Dortmund Germany Computer Science Technical University Dortmund Dortmund Germany
This study examines the adherence of ChatGPT (GPT-3.S and GPT-4) to fairness principles, specifically proportionality and equality, in negotiation scenarios. Three distinct negotiation contexts were explored: work-stu... 详细信息
来源: 评论
Bridging the Early science Gap with Artificial Intelligence Evaluating Large Language Models as Tools for Early Childhood science Education
Bridging the Early Science Gap with Artificial Intelligence ...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI EA 2025
作者: Bush, Annika Alibakhshi, Amin Research Center Trustworthy Data Science and Security University Alliance Ruhr TU Dortmund Dortmund Germany Research Center Trustworthy Data Science and Security University Alliance Ruhr Ruhr University Bochum Bochum Germany
Early childhood science education is crucial for developing scientific literacy, yet translating complex scientific concepts into age-appropriate content remains challenging for educators. Our study evaluates four lea... 详细信息
来源: 评论
The Complexity of Learning LTL, CTL and ATL Formulas  42
The Complexity of Learning LTL, CTL and ATL Formulas
收藏 引用
42nd International Symposium on Theoretical Aspects of Computer science, STACS 2025
作者: Bordais, Benjamin Neider, Daniel Roy, Rajarshi TU Dortmund University Center for Trustworthy Data Science and Security University Alliance Ruhr Dortmund Germany Department of Computer Science University of Oxford United Kingdom
We consider the problem of learning temporal logic formulas from examples of system behavior. Learning temporal properties has crystallized as an effective means to explain complex temporal behaviors. Several efficien... 详细信息
来源: 评论