咨询与建议

限定检索结果

文献类型

  • 149 篇 期刊文献
  • 126 篇 会议

馆藏范围

  • 275 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 167 篇 工学
    • 123 篇 计算机科学与技术...
    • 105 篇 软件工程
    • 40 篇 信息与通信工程
    • 28 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 13 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 环境科学与工程(可...
  • 63 篇 理学
    • 27 篇 生物学
    • 26 篇 数学
    • 9 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 35 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 9 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 58 篇 hubei key labora...
  • 56 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 18 篇 school of inform...
  • 16 篇 huazhong univers...
  • 14 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 36 篇 jin hai
  • 30 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 9 篇 deng xianjun
  • 9 篇 xianjun deng
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 7 篇 leo yu zhang

语言

  • 254 篇 英文
  • 20 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
275 条 记 录,以下是51-60 订阅
排序:
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification
arXiv
收藏 引用
arXiv 2024年
作者: Qin, Zeqing Wu, Yiwei Han, Lansheng School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China
Large Language Models (LLMs) have shown great promise in vulnerability identification. As C/C++ comprises half of the Open-Source Software (OSS) vulnerabilities over the past decade and updates in OSS mainly occur thr... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
A First Look at LLM-powered Smartphones
A First Look at LLM-powered Smartphones
收藏 引用
IEEE/ACM International Conference on Automated Software Engineering - Workshops (ASE Workshops)
作者: Liangxuan Wu Yanjie Zhao Chao Wang Tianming Liu Haoyu Wang Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology
The integration of Large Language Models (LLMs) into edge devices such as smartphones represents a significant leap in mobile technology, promising enhanced user experiences and novel functionalities. This paper prese... 详细信息
来源: 评论
Application Research of Vertical Federated Learning Technology in Banking Risk Control Model Strategy  21
Application Research of Vertical Federated Learning Technolo...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Luo, Yong Lu, Zhi Yin, Xiaofei Lu, Songfeng Weng, Yiting Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
This study centers on the application of vertical federated learning technology in the context of Internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm... 详细信息
来源: 评论
Learning Time Slot Preferences via Mobility Tree for Next POI Recommendation
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Tianhao Pan, Xuan Cai, Xiangrui Zhang, Ying Yuan, Xiaojie College of Computer Science Nankai University China Tianjin Key Laboratory Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education China Science and Technology on Communication Networks Laboratory Shijiazhuang China
Next Point-of-Interests (POIs) recommendation task aims to provide a dynamic ranking of POIs based on users’ current check-in trajectories. The recommendation performance of this task is contingent upon a comprehensi... 详细信息
来源: 评论
BadActs: A Universal Backdoor Defense in the Activation Space
arXiv
收藏 引用
arXiv 2024年
作者: Yi, Biao Chen, Sishuo Li, Yiming Li, Tong Zhang, Baolei Liu, Zheli College of Cyber Science Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University China Center for Data Science Peking University China Nanyang Technological University Singapore
Backdoor attacks pose an increasingly severe security threat to Deep Neural Networks (DNNs) during their development stage. In response, backdoor sample purification has emerged as a promising defense mechanism, aimin... 详细信息
来源: 评论
Coping With a Severely Changing Number of Objectives in Dynamic Multi-Objective Optimization
收藏 引用
IEEE Transactions on Evolutionary Computation 2025年
作者: Ruan, Gan Hou, Zhanglu Yao, Xin Lingnan University School of Data Science Hong Kong Xiangtan University Hunan Engineering Research Center of Intelligent System Optimization and Security Hunan Province Xiangtan411105 China
In dynamic multi-objective optimization problems (DMOPs) where the number of objectives changes, the Pareto-optimal set (PS) manifold may expand or contract over time. Knowledge transfer has been utilized to solve DMO... 详细信息
来源: 评论
Advancing Healthcare IoT: Blockchain and Federated Learning Integration for Enhanced security and Insights
Advancing Healthcare IoT: Blockchain and Federated Learning ...
收藏 引用
2024 International Conference on Communication, Computer sciences and Engineering, IC3SE 2024
作者: Malik, Rida Ur-Rehaman, Atta Razzaq, Hamza Bhatt, Chandradeep Kaushik, Keshav Khan, Inam Ullah Riphah Institute Of System Engineering Department Of Information Security Islamabad Pakistan Riphah Institute Of System Engineering Department Of Data Science Islamabad Pakistan Graphic Era Hill University Department Of Cse Uttarakhand India Graphic Era Deemed To Be University Uttarakhand Dehradun India School Of Computer Science University Of Petroleum And Energy Studies Dehradun India Seas Isra University Department Of Electronic Engineering Islamabad Campus Pakistan
Fast-growing IoT devices in healthcare have ushered in a new era of data-driven patient care and treatment. These gadgets capture too much sensitive medical data, a major issue. We need to boost data analysis, securit... 详细信息
来源: 评论