咨询与建议

限定检索结果

文献类型

  • 145 篇 期刊文献
  • 124 篇 会议

馆藏范围

  • 269 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 164 篇 工学
    • 122 篇 计算机科学与技术...
    • 105 篇 软件工程
    • 40 篇 信息与通信工程
    • 27 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 环境科学与工程(可...
  • 62 篇 理学
    • 27 篇 生物学
    • 26 篇 数学
    • 9 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 35 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 9 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 56 篇 hubei key labora...
  • 55 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 14 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 36 篇 jin hai
  • 28 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 9 篇 deng xianjun
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 8 篇 shengshan hu
  • 7 篇 fang xiang
  • 7 篇 zhang yechao

语言

  • 248 篇 英文
  • 20 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
269 条 记 录,以下是31-40 订阅
排序:
Quantum security analysis of SM4 algorithm  6
Quantum security analysis of SM4 algorithm
收藏 引用
6th International Conference on Wireless Communications and Smart Grid, ICWCSG 2024
作者: Yang, Hao Wang, Chunhong Tang, Xueming Cui, Yongquan Lu, Songfeng Cai, Dunbo Qian, Ling Zhang, Runqing Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Maritime Communication Research Institute Wuhan430010 China Software Technology Co. Ltd. Suzhou215153 China
The security of commercial encryption algorithms has always been a focus of attention. The SM4 algorithm, a commercial cryptographic standard, has been recognized by ISO/IEC as an international standard and has shown ... 详细信息
来源: 评论
A Real-time Demonstration of Bidirectional Multiformat/Rate-adjustable Integrated Laser Communication/Ranging for Satellite Communication
A Real-time Demonstration of Bidirectional Multiformat/Rate-...
收藏 引用
2024 Conference on Lasers and Electro-Optics, CLEO 2024
作者: Wang, Yizhou Wang, Yuanxiang Luo, Zhen Zhong, Linsheng Zou, Yang Ao, Xueyuan Liu, Jiale Fan, Feng Li, Xiaoliang Dai, Xiaoxiao Yang, Qi Liu, Deming National Engineering Laboratory for Next Generation Internet Access System School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Beijing Research Institute of Telemetry Beijing100094 China Jinyinhu Laboratory Wuhan430040 China
A multi-format/rate-adjustable integrated laser communication/ranging system is proposed, achieving adjustable rates between 0.625-10Gbit/s. Real-time experiment shows that at 1e-4 BER the ranging error is only 0.29% ... 详细信息
来源: 评论
A Real-time Demonstration of Bidirectional Multiformat/Rate-adjustable Integrated Laser Communication/Ranging for Satellite Communication
A Real-time Demonstration of Bidirectional Multiformat/Rate-...
收藏 引用
CLEO: science and Innovations in CLEO 2024, CLEO: S and I 2024 - Part of Conference on Lasers and Electro-Optics
作者: Wang, Yizhou Wang, Yuanxiang Luo, Zhen Zhong, Linsheng Zou, Yang Ao, Xueyuan Liu, Jiale Fan, Feng Li, Xiaoliang Dai, Xiaoxiao Yang, Qi Liu, Deming National Engineering Laboratory for Next Generation Internet Access System School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science andEngineering Huazhong University of Science and Technology Wuhan430074 China Beijing Research Institute of Telemetry Beijing100094 China Jinyinhu Laboratory Wuhan430040 China
A multi-format/rate-adjustable integrated laser communication/ranging system is proposed, achieving adjustable rates between 0.625-10Gbit/s. Real-time experiment shows that at 1e-4 BER the ranging error is only 0.29% ... 详细信息
来源: 评论
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat  7
AISLE: Self-supervised Representation Learning for the Inves...
收藏 引用
7th IEEE International Conference on data science in Cyberspace, DSC 2022
作者: Jia, Zian Wang, Xiaosu Xiong, Yun Zhang, Yao Zhao, JinJing Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China National Key Laboratory of Science and Technology on Information System Security China
Advanced Persistent Threats (APT) are difficult to detect and defend due to their high variability and concealment. Current APT detection and investigation approaches suffer from two major problems. First, most recent... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
A Secure and Lightweight Client-Side Deduplication Approach for Resisting Side Channel Attacks
A Secure and Lightweight Client-Side Deduplication Approach ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuchen Chen Chunfu Jia Guanxiong Ha Xuan Shan Hang Chen The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security (DISSec) Data Security Technology Tianjin China
Client-side deduplication system is widely used in cloud storage systems to reduce storage and communication overhead by eliminating the storing and uploading of duplicate data. However, it is vulnerable to side chann... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation  42
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Wang, Haozhao Xu, Wenchao Fan, Yunfeng Li, Ruixuan Zhou, Pan Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China The Hong Kong Polytechnic University Department of Computing Hong Kong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
VG-Net: Sensor Time Series Anomaly Detection with Joint Variational Autoencoder and Graph Neural Network  10
VG-Net: Sensor Time Series Anomaly Detection with Joint Vari...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Wang, Shuai Liu, Shenghao Fan, Xiaoxuan Wang, Haijun Zhou, Yinxin Gao, Hanjun Lu, Hongwei Deng, Xianjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Hunan Technical College of Railway High-speed China Nanjing University of Posts and Telecommunications China China National Nuclear Power Co Ltd China
Intelligent Cyber-Physical systems typically utilize sensors to gather a significant amount of raw data which often possesses temporal and high-dimensional characteristics. Ensuring the data reliability is crucial for... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论