咨询与建议

限定检索结果

文献类型

  • 154 篇 期刊文献
  • 124 篇 会议

馆藏范围

  • 278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 173 篇 工学
    • 127 篇 计算机科学与技术...
    • 107 篇 软件工程
    • 41 篇 信息与通信工程
    • 34 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
  • 65 篇 理学
    • 28 篇 数学
    • 27 篇 生物学
    • 10 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 37 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 11 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 10 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 37 篇 jin hai
  • 30 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 10 篇 deng xianjun
  • 9 篇 xianjun deng
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 8 篇 shengshan hu
  • 7 篇 shenghao liu

语言

  • 255 篇 英文
  • 22 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
278 条 记 录,以下是101-110 订阅
排序:
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论
Large Language Model Supply Chain: A Research Agenda
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Shenao Zhao, Yanjie Hou, Xinyi Wang, Haoyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
The rapid advancement of large language models (LLMs) has revolutionized artificial intelligence, introducing unprecedented capabilities in natural language processing and multimodal content generation. However, the i... 详细信息
来源: 评论
WaDec: Decompiling WebAssembly Using Large Language Model
arXiv
收藏 引用
arXiv 2024年
作者: She, Xinyu Zhao, Yanjie Wang, Haoyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
WebAssembly (abbreviated Wasm) has emerged as a cornerstone of web development, offering a compact binary format that allows high-performance applications to run at near-native speeds in web browsers. Despite its adva... 详细信息
来源: 评论
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
MalWuKong: Towards Fast, Accurate, and Multilingual Detectio...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Ningke Li Shenao Wang Mingxi Feng Kailong Wang Meizhen Wang Haoyu Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
In the face of increased threats within software registries and management systems, we address the critical need for effective malicious code detection. In this paper, we propose an innovative approach that integrates...
来源: 评论
AutoSlicer: Automatic Program Partitioning for Securing Sensitive data Based-on data Dependency Analysis and Code Refactoring
AutoSlicer: Automatic Program Partitioning for Securing Sens...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Weizhong Qiang Hao Luo Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Legacy programs are normally monolithic (that is, all code runs in a single process and is not partitioned), and a bug in a program may result in the entire program being vulnerable and therefore untrusted. Program pa... 详细信息
来源: 评论
Ranking on Heterogeneous Manifold for Multimodal Information Retrieval  21
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Wan, Xingshi Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science & Technology Wuhan China
In light of recent advancements in Internet of Multimedia Things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS... 详细信息
来源: 评论
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Wei Liao Lansheng Han Peng Chen Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r...
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
SMPC Task Decomposition: A Theory for Accelerating Secure Multi-party Computation Task
arXiv
收藏 引用
arXiv 2023年
作者: Feng, Yuanqing Bai, Tao Lu, Songfeng Tang, Xueming Wu, Junjun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Today, we are in the era of big data, and data are becoming more and more important, especially private data. Secure Multi-party Computation (SMPC) technology enables parties to perform computing tasks without reveali... 详细信息
来源: 评论
Quantum-inspired Hash Function Based on Parity-dependent Quantum Walks with Memory
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Qing Tang, Xueming Lu, Songfeng Yang, Hao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
In this paper, we develop a generic controlled alternate quantum walk model (called CQWM-P) by combining parity-dependent quantum walks with distinct arbitrary memory lengths and then construct a quantum-inspired hash... 详细信息
来源: 评论