咨询与建议

限定检索结果

文献类型

  • 145 篇 期刊文献
  • 124 篇 会议

馆藏范围

  • 269 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 164 篇 工学
    • 122 篇 计算机科学与技术...
    • 105 篇 软件工程
    • 40 篇 信息与通信工程
    • 27 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 环境科学与工程(可...
  • 62 篇 理学
    • 27 篇 生物学
    • 26 篇 数学
    • 9 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 35 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 9 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 56 篇 hubei key labora...
  • 55 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 14 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 36 篇 jin hai
  • 28 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 9 篇 deng xianjun
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 8 篇 shengshan hu
  • 7 篇 fang xiang
  • 7 篇 zhang yechao

语言

  • 248 篇 英文
  • 20 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
269 条 记 录,以下是1-10 订阅
排序:
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
Integrating Structural Semantic Knowledge for Enhanced Information Extraction Pre-training
Integrating Structural Semantic Knowledge for Enhanced Infor...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yi, Xiaoyang Bao, Yuru Zhang, Jian Qin, Yifang Lin, Faxin College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Information Extraction (IE), aiming to extract structured information from unstructured natural language texts, can significantly benefit from pre-trained language models. However, existing pre-training methods solely... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
UARC:Unsupervised Anomalous Traffic Detection with Improved U-Shaped Autoencoder and RetNet Based Multi-clustering  26th
UARC:Unsupervised Anomalous Traffic Detection with Improved ...
收藏 引用
26th International Conference on Information and Communications security, ICICS 2024
作者: Xie, Yunyang Chen, Kai Li, Shenghui Li, Bingqian Zhang, Ning Hubei Key Laboratory of Distributed System Security Hubei Engin eering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University Technology Wuhan430074 China
With the ongoing advancement of deep learning, modern network intrusion detection systems increasingly favor utilizing deep learning networks to improve their ability to learn traffic characteristics. To address the c... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
A First Look at LLM-powered Smartphones  39
A First Look at LLM-powered Smartphones
收藏 引用
39th ACM/IEEE International Conference on Automated Software Engineering Workshops, ASEW 2024
作者: Wu, Liangxuan Zhao, Yanjie Wang, Chao Liu, Tianming Wang, Haoyu Huazhong University of Science and Technology Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
The integration of Large Language Models (LLMs) into edge devices such as smartphones represents a significant leap in mobile technology, promising enhanced user experiences and novel functionalities. This paper prese... 详细信息
来源: 评论
On the security of Smart Home systems:A Survey
收藏 引用
Journal of Computer science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography  21
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Liao, Wei Han, Lansheng Chen, Peng Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r... 详细信息
来源: 评论