咨询与建议

限定检索结果

文献类型

  • 154 篇 期刊文献
  • 124 篇 会议

馆藏范围

  • 278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 173 篇 工学
    • 127 篇 计算机科学与技术...
    • 107 篇 软件工程
    • 41 篇 信息与通信工程
    • 34 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
  • 65 篇 理学
    • 28 篇 数学
    • 27 篇 生物学
    • 10 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 37 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 11 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 10 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 37 篇 jin hai
  • 30 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 10 篇 deng xianjun
  • 9 篇 xianjun deng
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 8 篇 shengshan hu
  • 7 篇 shenghao liu

语言

  • 255 篇 英文
  • 22 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
278 条 记 录,以下是51-60 订阅
排序:
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography  21
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Liao, Wei Han, Lansheng Chen, Peng Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r... 详细信息
来源: 评论
Integrating Structural Semantic Knowledge for Enhanced Information Extraction Pre-training
Integrating Structural Semantic Knowledge for Enhanced Infor...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yi, Xiaoyang Bao, Yuru Zhang, Jian Qin, Yifang Lin, Faxin College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Information Extraction (IE), aiming to extract structured information from unstructured natural language texts, can significantly benefit from pre-trained language models. However, existing pre-training methods solely... 详细信息
来源: 评论
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat  7
AISLE: Self-supervised Representation Learning for the Inves...
收藏 引用
7th IEEE International Conference on data science in Cyberspace, DSC 2022
作者: Jia, Zian Wang, Xiaosu Xiong, Yun Zhang, Yao Zhao, JinJing Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China National Key Laboratory of Science and Technology on Information System Security China
Advanced Persistent Threats (APT) are difficult to detect and defend due to their high variability and concealment. Current APT detection and investigation approaches suffer from two major problems. First, most recent... 详细信息
来源: 评论
Differentially Private Deep Learning with Iterative Gradient Descent Optimization
收藏 引用
ACM/IMS Transactions on data science 2021年 第4期2卷 1–27页
作者: Ding, Xiaofeng Chen, Lin Zhou, Pan Jiang, Wenbin Jin, Hai National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Deep learning has achieved great success in various areas and its success is closely linked to the availability of massive data. But in general, a large dataset could include sensitive data and therefore the model sho... 详细信息
来源: 评论
A First Look at LLM-powered Smartphones  39
A First Look at LLM-powered Smartphones
收藏 引用
39th ACM/IEEE International Conference on Automated Software Engineering Workshops, ASEW 2024
作者: Wu, Liangxuan Zhao, Yanjie Wang, Chao Liu, Tianming Wang, Haoyu Huazhong University of Science and Technology Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
The integration of Large Language Models (LLMs) into edge devices such as smartphones represents a significant leap in mobile technology, promising enhanced user experiences and novel functionalities. This paper prese... 详细信息
来源: 评论
A Blackbox Fuzzing Based on Automated State Machine Extraction  8
A Blackbox Fuzzing Based on Automated State Machine Extracti...
收藏 引用
8th International Conference on data science in Cyberspace, DSC 2023
作者: Zhang, Zhaowei Yu, Wenjing Wang, Zibin Xiang, Youlin National Key Laboratory of Science and Technology on Information System Security Beijing China School of Computer Science Fudan University Shanghai Key Laboratory of Data Science Shanghai China
Currently, protocol fuzzing techniques mainly employ two approaches: greybox fuzzing based on mutation and blackbox fuzzing based on generation. Greybox fuzzing techniques use message exchanges between the protocol se... 详细信息
来源: 评论
MSpace: Multi security namespace management for containers
Journal of Engineering Research (Kuwait)
收藏 引用
Journal of Engineering Research (Kuwait) 2025年
作者: Liang, Hao He, Gongshan Jiang, Jinhu National Digital Switching System Engineering & Technological Research Center Zhengzhou 450002 China Key Laboratory of Cyberspace Security Ministry of Education Zhengzhou 450002 China School of Computer Science Fudan University Shanghai 200438 China Institute of Big Data Fudan University Shanghai 200433 China
Existing system security frameworks like LSM are primarily designed for the operating system kernel and are not applicable to user-level container methods. This is primarily because the system security framework is de... 详细信息
来源: 评论
Interpretable Skill Learning for Dynamic Treatment Regimes through Imitation  57
Interpretable Skill Learning for Dynamic Treatment Regimes t...
收藏 引用
57th Annual Conference on Information sciences and systems, CISS 2023
作者: Jiang, Yushan Yu, Wenchao Song, Dongjin Cheng, Wei Chen, Haifeng University of Connecticut Department of Computer Science and Engineering StorrsCT United States Data Science and System Security Nec Laboratories American PrincetonNJ United States
Imitation learning that mimics experts' skills from their demonstrations has shown great success in discovering dynamic treatment regimes, i.e., the optimal decision rules to treat an individual patient based on r... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
ANIMC: A Soft Approach for Autoweighted Noisy and Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 192-206页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering The School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering m... 详细信息
来源: 评论