咨询与建议

限定检索结果

文献类型

  • 48 篇 期刊文献
  • 22 篇 会议

馆藏范围

  • 70 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 30 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 11 篇 电气工程
    • 10 篇 信息与通信工程
    • 9 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 船舶与海洋工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 网络空间安全
  • 20 篇 理学
    • 12 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 海洋科学
    • 2 篇 统计学(可授理学、...
  • 12 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 4 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 3 篇 deep learning
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 learning systems
  • 2 篇 smart contract
  • 2 篇 feature extracti...
  • 2 篇 clustering algor...
  • 2 篇 authentication p...
  • 2 篇 federated learni...
  • 2 篇 artificial intel...
  • 2 篇 cloud computing
  • 2 篇 convolutional ne...
  • 1 篇 demonstrations
  • 1 篇 edge optimizatio...
  • 1 篇 view variation
  • 1 篇 multi-label clas...
  • 1 篇 tools
  • 1 篇 gps/gsm
  • 1 篇 reliability
  • 1 篇 data security

机构

  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 6 篇 hubei key labora...
  • 5 篇 shenzhen huazhon...
  • 4 篇 institute for ne...
  • 3 篇 national enginee...
  • 3 篇 huazhong univers...
  • 3 篇 school of cyber ...
  • 2 篇 college of compu...
  • 2 篇 department of co...
  • 2 篇 software enginee...
  • 2 篇 zhengzhou univer...
  • 2 篇 huazhong univers...
  • 2 篇 international in...
  • 2 篇 hubei key labora...
  • 2 篇 research center ...
  • 2 篇 jin yinhu labora...
  • 2 篇 department of co...
  • 2 篇 huazhong univers...
  • 2 篇 national enginee...

作者

  • 10 篇 jin hai
  • 8 篇 zou deqing
  • 7 篇 li zhen
  • 7 篇 xu shouhuai
  • 6 篇 zhou pan
  • 5 篇 hai jin
  • 5 篇 deng xianjun
  • 4 篇 yang laurence t.
  • 4 篇 wu dapeng oliver
  • 4 篇 deqing zou
  • 4 篇 hu yuchong
  • 4 篇 fang xiang
  • 3 篇 park jong hyuk
  • 3 篇 li yating
  • 3 篇 liu shenghao
  • 3 篇 shouhuai xu
  • 3 篇 zhang ruqian
  • 3 篇 wang ning
  • 2 篇 chen haifeng
  • 2 篇 li xiong

语言

  • 61 篇 英文
  • 9 篇 其他
检索条件"机构=Department of Data Science and System Security"
70 条 记 录,以下是1-10 订阅
排序:
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
Interpretable Skill Learning for Dynamic Treatment Regimes through Imitation  57
Interpretable Skill Learning for Dynamic Treatment Regimes t...
收藏 引用
57th Annual Conference on Information sciences and systems, CISS 2023
作者: Jiang, Yushan Yu, Wenchao Song, Dongjin Cheng, Wei Chen, Haifeng University of Connecticut Department of Computer Science and Engineering StorrsCT United States Data Science and System Security Nec Laboratories American PrincetonNJ United States
Imitation learning that mimics experts' skills from their demonstrations has shown great success in discovering dynamic treatment regimes, i.e., the optimal decision rules to treat an individual patient based on r... 详细信息
来源: 评论
Confident Information Coverage Reliability Evaluation for Sensor Networks of Openly Deployed ICP systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical systems 2024年 2卷 565-574页
作者: Chen, Suning Yi, Yuanyuan Yi, Lingzhi Liu, Shenghao Deng, Xianjun Xia, Yunzhi Fan, Xiaoxuan Yang, Laurence T. Park, Jong Hyuk Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China Seoul National University of Technology Department of Computer Science and Engineering Seoul01811 Korea Republic of
Industrial Cyber-Physical (ICP) systems are integration of computation and physical processes to help achieve operational excellence. As sensors and actuators compose the openly deployed ICP systems and are often susc... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation  42
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Wang, Haozhao Xu, Wenchao Fan, Yunfeng Li, Ruixuan Zhou, Pan Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China The Hong Kong Polytechnic University Department of Computing Hong Kong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co... 详细信息
来源: 评论
Advancing Healthcare IoT: Blockchain and Federated Learning Integration for Enhanced security and Insights
Advancing Healthcare IoT: Blockchain and Federated Learning ...
收藏 引用
2024 International Conference on Communication, Computer sciences and Engineering, IC3SE 2024
作者: Malik, Rida Ur-Rehaman, Atta Razzaq, Hamza Bhatt, Chandradeep Kaushik, Keshav Khan, Inam Ullah Riphah Institute Of System Engineering Department Of Information Security Islamabad Pakistan Riphah Institute Of System Engineering Department Of Data Science Islamabad Pakistan Graphic Era Hill University Department Of Cse Uttarakhand India Graphic Era Deemed To Be University Uttarakhand Dehradun India School Of Computer Science University Of Petroleum And Energy Studies Dehradun India Seas Isra University Department Of Electronic Engineering Islamabad Campus Pakistan
Fast-growing IoT devices in healthcare have ushered in a new era of data-driven patient care and treatment. These gadgets capture too much sensitive medical data, a major issue. We need to boost data analysis, securit... 详细信息
来源: 评论
Attribute-Based data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation system
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
ANIMC: A Soft Approach for Autoweighted Noisy and Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 192-206页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering The School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering m... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Ethereum smart contract security research:survey and future research opportunities
收藏 引用
Frontiers of Computer science 2021年 第2期15卷 143-160页
作者: Zeli WANG Hai JIN Weiqi DAI Kim-Kwang Raymond CHOO Deqing ZOU National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabHubei Engineering Research Center on Big Data SecurityWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s... 详细信息
来源: 评论