咨询与建议

限定检索结果

文献类型

  • 378 篇 会议
  • 223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 324 篇 工学
    • 266 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 54 篇 信息与通信工程
    • 32 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 26 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 12 篇 光学工程
    • 12 篇 核科学与技术
    • 11 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 9 篇 安全科学与工程
    • 6 篇 仪器科学与技术
  • 148 篇 理学
    • 58 篇 数学
    • 53 篇 物理学
    • 35 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 10 篇 化学
  • 88 篇 管理学
    • 72 篇 管理科学与工程(可...
    • 25 篇 工商管理
    • 24 篇 图书情报与档案管...
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 文学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 49 篇 grid computing
  • 34 篇 virtual machinin...
  • 28 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 23 篇 resource managem...
  • 22 篇 servers
  • 21 篇 peer to peer com...
  • 20 篇 protocols
  • 19 篇 hardware
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 kernel
  • 14 篇 application soft...
  • 12 篇 benchmark testin...
  • 11 篇 access control
  • 11 篇 memory managemen...

机构

  • 102 篇 national enginee...
  • 64 篇 services computi...
  • 56 篇 school of comput...
  • 46 篇 services computi...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...
  • 38 篇 tomsk state univ...

作者

  • 249 篇 hai jin
  • 167 篇 jin hai
  • 57 篇 xiaofei liao
  • 34 篇 m. klein
  • 34 篇 deqing zou
  • 34 篇 liao xiaofei
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig

语言

  • 574 篇 英文
  • 23 篇 其他
  • 12 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer Science and Technology"
608 条 记 录,以下是541-550 订阅
排序:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
HomDroid: Detecting android covert malware by social-network homophily analysis
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Zou, Deqing Yang, Wei Li, Xiang Jin, Hai Huazhong University of Science and Technology China University of Texas at Dallas United States Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Hust Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hust Wuhan430074 China Shenzhen Hust Research Institute Shenzhen518057 China Cluster and Grid Computing Lab School of Computer Science and Technology Hust Wuhan430074 China
Android has become the most popular mobile operating system. Correspondingly, an increasing number of Android malware has been developed and spread to steal users' private information. There exists one type of mal... 详细信息
来源: 评论
A Shortest Path Query Approach for Encrypted Graphs Based on Padding Dictionary Structure
A Shortest Path Query Approach for Encrypted Graphs Based on...
收藏 引用
Chinese Automation Congress (CAC)
作者: Ming Yang Kaiyang Zhang Chao Mu Xin Wang Yuanlong Liu Heng Zhang Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Grid Shandong Electric Power Company Jinan China School of Computer Engineering Jiangsu Ocean University Lianyungang China
Hybrid intelligence has emerged as an innovative approach that synergistically combines the strengths of human intelligence and artificial intelligence (AI) to address complex problems. In this paradigm, knowledge gra...
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
gECC: A GPU-based high-throughput framework for Elliptic Curve Cryptography
收藏 引用
ACM Transactions on Architecture and Code Optimization 1000年
作者: Qian Xiong Weiliang Ma Xuanhua Shi Yongluan Zhou Hai Jin Kaiyi Huang Haozhou Wang Zhengru Wang Huazhong University of Science and Technology Wuhan China School of Computer Huazhong University of Science and Technology Wuhan China University of Copenhagen Copenhagen Denmark School of computer science and technology Huazhong University of Science and Technology Services Computing Technology and System Laboratory / Cluster and Grid Computing Laboratory Wu hanwu China NVIDIA Corp Shanghai China
Elliptic Curve Cryptography (ECC) is an encryption method that provides security comparable to traditional techniques like Rivest–Shamir–Adleman (RSA) but with lower computational complexity and smaller key sizes, m... 详细信息
来源: 评论
Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”
收藏 引用
Security and Communication Networks 2018年 第1期2018卷
作者: Weizhong Qiang Shizhen Wang Hai Jin Jiangying Zhong Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 ***
来源: 评论
A Resilient Decentralized Learning Approach against Byzantine Attack via Reputation Evaluation
A Resilient Decentralized Learning Approach against Byzantin...
收藏 引用
Youth Academic Annual Conference of Chinese Association of Automation (YAC)
作者: Heng Zhang Wenting Wang Xuguo Jiao Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan P. R. China College of Control Science and Engineering Zhejiang University Hangzhou China State Grid Shandong Electric Power Research Institute Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China
Machine learning is a key component of many applications, among which decentralized learning has attracted wide attention because of its cost-effectiveness and high efficiency. However, decentralized learning is vulne... 详细信息
来源: 评论
AMSPM: Adaptive Model Selection and Partition Mechanism for Edge Intelligence-driven 5G Smart City with Dynamic computing Resources
收藏 引用
ACM Transactions on Sensor Networks 1000年
作者: Xin Niu Xuejiao Cao Chen Yu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the help of 5G network, edge intelligence (EI) can not only provide distributed, low-latency, and high-reliable intelligent services, but also enable intelligent maintenance and management of smart city. However,... 详细信息
来源: 评论
Corrigendum to “Improved Algorithm for Permutation Testing” [Theoretical computer science 986 (2024) 114316]
收藏 引用
Theoretical computer science 2024年 999卷
作者: Xiaojin Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
来源: 评论