咨询与建议

限定检索结果

文献类型

  • 147 篇 期刊文献
  • 124 篇 会议

馆藏范围

  • 271 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 122 篇 计算机科学与技术...
    • 105 篇 软件工程
    • 40 篇 信息与通信工程
    • 27 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 13 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 环境科学与工程(可...
  • 62 篇 理学
    • 27 篇 生物学
    • 26 篇 数学
    • 9 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 35 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 9 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 14 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 36 篇 jin hai
  • 28 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 9 篇 deng xianjun
  • 9 篇 xianjun deng
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 8 篇 shengshan hu
  • 7 篇 shenghao liu

语言

  • 250 篇 英文
  • 20 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
271 条 记 录,以下是91-100 订阅
排序:
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
You Are Catching My Attention: Are Vision Transformers Bad Learners under Backdoor Attacks?
You Are Catching My Attention: Are Vision Transformers Bad L...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zenghui Yuan Pan Zhou Kai Zou Yu Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Protagolabs Inc Microsoft Research
Vision Transformers (ViTs), which made a splash in the field of computer vision (CV), have shaken the dominance of convolutional neural networks (CNNs). However, in the process of industrializing ViTs, backdoor attack...
来源: 评论
Personalized Local Differential Privacy for Multi-dimensional Range Queries over Mobile User data
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: He, Yuanyuan Wang, Meiqi Deng, Xianjun Yang, Peng Xue, Qiao Yang, Laurence T. Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Electronic Information and Communications Wuhan430074 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210000 China
Multi-dimensional range queries performed on the mobile user data records become increasingly important and popular in the fields of e-commerce, social media, transportation logistics, etc. Meanwhile, mobile users usu... 详细信息
来源: 评论
Privacy Law Enforcement Under Centralized Governance: A Qualitative Analysis of Four Years’ Special Privacy Rectification Campaigns
arXiv
收藏 引用
arXiv 2025年
作者: Jing, Tao Li, Yao Ye, Jingzhou Wang, Jie Wang, Xueqiang School of Cyber Science and Engineering Huazhong University of Science and Technology China JinYinHu Laboratory China University of Central Florida United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
In recent years, major privacy laws like the GDPR have brought about positive changes. However, challenges remain in enforcing the laws, particularly due to under-resourced regulators facing a large number of potentia... 详细信息
来源: 评论
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论
COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control systems
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Zhaonan Zhao, Yanjie Wei, Chen Wan, Zirui Liu, Yue Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Monash University Melbourne Australia Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Version control systems are commonly used to manage open-source software, in which each commit may introduce new vulnerabilities or fix existing ones. Researchers have developed various tools for detecting vulnerabili... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
A Blackbox Fuzzing Based on Automated State Machine Extraction
A Blackbox Fuzzing Based on Automated State Machine Extracti...
收藏 引用
IEEE International Conference on data science in Cyberspace (DSC)
作者: Zhaowei Zhang Wenjing Yu Zibin Wang Youlin Xiang National Key Laboratory of Science and Technology on Information System Security Beijing China Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Shanghai China
Currently, protocol fuzzing techniques mainly employ two approaches: greybox fuzzing based on mutation and blackbox fuzzing based on generation. Greybox fuzzing techniques use message exchanges between the protocol se...
来源: 评论
TailClip: Mitigating Tail Latency in Cloud Gaming via Smart Video Frame Generation
TailClip: Mitigating Tail Latency in Cloud Gaming via Smart ...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Qianyun Gong Kunheng Jiang Jingjing Wen Xinjing Yuan Jianxin Shi Lingjun Pu Institute of Systems and Networks College of Computer Science Nankai University Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Latency is one of the most significant issues in cloud gaming, among which tail latency, mainly attributed to dynamic network environments (i.e., transmission) and limited device computing capacity (e.g., decoding), h... 详细信息
来源: 评论