咨询与建议

限定检索结果

文献类型

  • 48 篇 期刊文献
  • 22 篇 会议

馆藏范围

  • 70 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 30 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 11 篇 电气工程
    • 10 篇 信息与通信工程
    • 9 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 船舶与海洋工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 网络空间安全
  • 20 篇 理学
    • 12 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 海洋科学
    • 2 篇 统计学(可授理学、...
  • 12 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 4 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 3 篇 deep learning
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 learning systems
  • 2 篇 smart contract
  • 2 篇 feature extracti...
  • 2 篇 clustering algor...
  • 2 篇 authentication p...
  • 2 篇 federated learni...
  • 2 篇 artificial intel...
  • 2 篇 cloud computing
  • 2 篇 convolutional ne...
  • 1 篇 demonstrations
  • 1 篇 edge optimizatio...
  • 1 篇 view variation
  • 1 篇 multi-label clas...
  • 1 篇 tools
  • 1 篇 gps/gsm
  • 1 篇 reliability
  • 1 篇 data security

机构

  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 6 篇 hubei key labora...
  • 5 篇 shenzhen huazhon...
  • 4 篇 institute for ne...
  • 3 篇 national enginee...
  • 3 篇 huazhong univers...
  • 3 篇 school of cyber ...
  • 2 篇 college of compu...
  • 2 篇 department of co...
  • 2 篇 software enginee...
  • 2 篇 zhengzhou univer...
  • 2 篇 huazhong univers...
  • 2 篇 international in...
  • 2 篇 hubei key labora...
  • 2 篇 research center ...
  • 2 篇 jin yinhu labora...
  • 2 篇 department of co...
  • 2 篇 huazhong univers...
  • 2 篇 national enginee...

作者

  • 10 篇 jin hai
  • 8 篇 zou deqing
  • 7 篇 li zhen
  • 7 篇 xu shouhuai
  • 6 篇 zhou pan
  • 5 篇 hai jin
  • 5 篇 deng xianjun
  • 4 篇 yang laurence t.
  • 4 篇 wu dapeng oliver
  • 4 篇 deqing zou
  • 4 篇 hu yuchong
  • 4 篇 fang xiang
  • 3 篇 park jong hyuk
  • 3 篇 li yating
  • 3 篇 liu shenghao
  • 3 篇 shouhuai xu
  • 3 篇 zhang ruqian
  • 3 篇 wang ning
  • 2 篇 chen haifeng
  • 2 篇 li xiong

语言

  • 61 篇 英文
  • 9 篇 其他
检索条件"机构=Department of Data Science and System Security"
70 条 记 录,以下是1-10 订阅
排序:
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Spatio-temporal GNN-Based Cell-Free Massive MIMO Network with Maximal Benefit-Cost Ratio
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Jiang, Jing Li, Yanni Ye, Yinghui Feng, Dan Zhang, Jiayi Sutthiphan, Worakrin Niyato, Dusit Xi'an Uni versity of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Beijing Jiaotong University Frontiers Science Center for Smart High-Speed Railway System Beijing100044 China National Telecommunication Public Company Mobile System Development Department Bangkok10210 Thailand Nanyang Technological University College of Computing and Data Science Singapore
Due to the network's rapid expansion, mobile networks bear extra high deployment costs. Being a key enabler of 6th generation (6G) mobile networks, it is crucial that cell-free massive MIMO (CF mMIMO) networks ach... 详细信息
来源: 评论
Iterative Feature Space Optimization through Incremental Adaptive Evaluation
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Yanping Huang, Yanyong Chen, Zhengzhang Yao, Zijun Fu, Yanjie Liu, Kunpeng Luo, Xiao Wang, Dongjie University of Kansas Department of Electrical Engineering and Computer Science United States Southwestern University of Finance and Economics Department of Statistics China NEC Laboratories America Data Science and System Security United States Arizona State University Department of Computing and Augmented Intelligence United States Portland State University Department of Computer Science United States University of California Los Angeles Department of Computer Science United States
Iterative feature space optimization involves systematically evaluating and adjusting the feature space to improve downstream task performance. However, existing works suffer from three key limitations: 1) overlooking... 详细信息
来源: 评论
Cross-Frequency Collaborative Training Network and dataset for Semi-supervised First Molar Root Canal Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Zhou, Zhenhuan Zhang, Yuchen He, Along Wang, Peng Xie, Xueshuo Li, Tao College of Computer Science Nankai University Tianjin300350 China Key Laboratory of Data and Intelligent System Security Ministry of Education China Department of stomatology Tianjin Union Medical Center Tianjin China Haihe Lab of ITAI Tianjin300459 China
Root canal (RC) treatment is a highly delicate and technically complex procedure in clinical practice, heavily influenced by the clinicians’ experience and subjective judgment. Deep learning has made significant adva... 详细信息
来源: 评论
A Bibliometric and Social Media Analysis of the Nexus Between Blockchain Technology and Finance  2nd
A Bibliometric and Social Media Analysis of the Nexus Betwee...
收藏 引用
2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Ayodele, Olamide Emmanuel Ajibade, Temiloluwa Iyanuoluwa Oyebode, Oluwadare Joshua Akintoye, Kayode Akinlekan Ajayi, Babatunde Adedotun Adediran, Anthonia Oluwatosin Ajibade, Samuel-Soma M. Majeed, Anwar P. P. Abdul Luo, Yang Department of Banking and Finance Ekiti State University Ekiti State Ado Ekiti Nigeria Department of Business Management Scholar School System Birmingham United Kingdom Civil and Environmental Engineering Afe Babalola University Ekiti State Ado Ekiti Nigeria Department of Computer Science The Federal Polytechnic Ekiti State Ado Ekiti Nigeria Department of Cyber Security Faculty of Computing and Informatics Ladoke Akintola University of Technology Ogbomoso Nigeria Department of Real Estate Faculty of Built Environment Universiti Malaya KL Kuala Lumpur Malaysia Department of Data Science and Artificial Intelligence Faculty of Engineering and Technology Sunway University Selangor Malaysia Department of Computer Engineering Istanbul Ticaret University Istanbul Turkey Suzhou Taicang215400 China
This study explores Blockchain technology in the global financial industry using trends analysis, bibliometric analysis, and a literature appraisal using Elsevier Scopus data from 2016 to 2023. The Blockchain in Finan... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
PRAD: Periapical Radiograph Analysis dataset and Benchmark Model Development
arXiv
收藏 引用
arXiv 2025年
作者: Zhou, Zhenhuan Zhang, Yuchen Xu, Ruihong Zhao, Xuansen Li, Tao College of Computer Science Nankai University Tianjin300350 China Key Laboratory of Data and Intelligent System Security Ministry of Education China Department of stomatology Tianjin Union Medical Center The First Affiliated Hospital of Nankai University Tianjin300121 China College of Mechanical Engineering Taiyuan University of Technology Shanxi 030000 China Haihe Lab of ITAI Tianjin300459 China
Deep learning (DL), a pivotal technology in artificial intelligence, has recently gained substantial traction in the domain of dental auxiliary diagnosis. However, its application has predominantly been confined to im... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论