咨询与建议

限定检索结果

文献类型

  • 48 篇 期刊文献
  • 22 篇 会议

馆藏范围

  • 70 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 30 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 11 篇 电气工程
    • 10 篇 信息与通信工程
    • 9 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 船舶与海洋工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 网络空间安全
  • 20 篇 理学
    • 12 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 海洋科学
    • 2 篇 统计学(可授理学、...
  • 12 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 4 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 3 篇 deep learning
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 learning systems
  • 2 篇 smart contract
  • 2 篇 feature extracti...
  • 2 篇 clustering algor...
  • 2 篇 authentication p...
  • 2 篇 federated learni...
  • 2 篇 artificial intel...
  • 2 篇 cloud computing
  • 2 篇 convolutional ne...
  • 1 篇 demonstrations
  • 1 篇 edge optimizatio...
  • 1 篇 view variation
  • 1 篇 multi-label clas...
  • 1 篇 tools
  • 1 篇 gps/gsm
  • 1 篇 reliability
  • 1 篇 data security

机构

  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 6 篇 hubei key labora...
  • 5 篇 shenzhen huazhon...
  • 4 篇 institute for ne...
  • 3 篇 national enginee...
  • 3 篇 huazhong univers...
  • 3 篇 school of cyber ...
  • 2 篇 college of compu...
  • 2 篇 department of co...
  • 2 篇 software enginee...
  • 2 篇 zhengzhou univer...
  • 2 篇 huazhong univers...
  • 2 篇 international in...
  • 2 篇 hubei key labora...
  • 2 篇 research center ...
  • 2 篇 jin yinhu labora...
  • 2 篇 department of co...
  • 2 篇 huazhong univers...
  • 2 篇 national enginee...

作者

  • 10 篇 jin hai
  • 8 篇 zou deqing
  • 7 篇 li zhen
  • 7 篇 xu shouhuai
  • 6 篇 zhou pan
  • 5 篇 hai jin
  • 5 篇 deng xianjun
  • 4 篇 yang laurence t.
  • 4 篇 wu dapeng oliver
  • 4 篇 deqing zou
  • 4 篇 hu yuchong
  • 4 篇 fang xiang
  • 3 篇 park jong hyuk
  • 3 篇 li yating
  • 3 篇 liu shenghao
  • 3 篇 shouhuai xu
  • 3 篇 zhang ruqian
  • 3 篇 wang ning
  • 2 篇 chen haifeng
  • 2 篇 li xiong

语言

  • 61 篇 英文
  • 9 篇 其他
检索条件"机构=Department of Data Science and System Security"
70 条 记 录,以下是21-30 订阅
排序:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Iterative Feature Space Optimization through Incremental Adaptive Evaluation
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Yanping Huang, Yanyong Chen, Zhengzhang Yao, Zijun Fu, Yanjie Liu, Kunpeng Luo, Xiao Wang, Dongjie University of Kansas Department of Electrical Engineering and Computer Science United States Southwestern University of Finance and Economics Department of Statistics China NEC Laboratories America Data Science and System Security United States Arizona State University Department of Computing and Augmented Intelligence United States Portland State University Department of Computer Science United States University of California Los Angeles Department of Computer Science United States
Iterative feature space optimization involves systematically evaluating and adjusting the feature space to improve downstream task performance. However, existing works suffer from three key limitations: 1) overlooking... 详细信息
来源: 评论
Cross-Frequency Collaborative Training Network and dataset for Semi-supervised First Molar Root Canal Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Zhou, Zhenhuan Zhang, Yuchen He, Along Wang, Peng Xie, Xueshuo Li, Tao College of Computer Science Nankai University Tianjin300350 China Key Laboratory of Data and Intelligent System Security Ministry of Education China Department of stomatology Tianjin Union Medical Center Tianjin China Haihe Lab of ITAI Tianjin300459 China
Root canal (RC) treatment is a highly delicate and technically complex procedure in clinical practice, heavily influenced by the clinicians’ experience and subjective judgment. Deep learning has made significant adva... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
A Bibliometric and Social Media Analysis of the Nexus Between Blockchain Technology and Finance  2nd
A Bibliometric and Social Media Analysis of the Nexus Betwee...
收藏 引用
2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Ayodele, Olamide Emmanuel Ajibade, Temiloluwa Iyanuoluwa Oyebode, Oluwadare Joshua Akintoye, Kayode Akinlekan Ajayi, Babatunde Adedotun Adediran, Anthonia Oluwatosin Ajibade, Samuel-Soma M. Majeed, Anwar P. P. Abdul Luo, Yang Department of Banking and Finance Ekiti State University Ekiti State Ado Ekiti Nigeria Department of Business Management Scholar School System Birmingham United Kingdom Civil and Environmental Engineering Afe Babalola University Ekiti State Ado Ekiti Nigeria Department of Computer Science The Federal Polytechnic Ekiti State Ado Ekiti Nigeria Department of Cyber Security Faculty of Computing and Informatics Ladoke Akintola University of Technology Ogbomoso Nigeria Department of Real Estate Faculty of Built Environment Universiti Malaya KL Kuala Lumpur Malaysia Department of Data Science and Artificial Intelligence Faculty of Engineering and Technology Sunway University Selangor Malaysia Department of Computer Engineering Istanbul Ticaret University Istanbul Turkey Suzhou Taicang215400 China
This study explores Blockchain technology in the global financial industry using trends analysis, bibliometric analysis, and a literature appraisal using Elsevier Scopus data from 2016 to 2023. The Blockchain in Finan... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
Advancing Healthcare IoT: Blockchain and Federated Learning Integration for Enhanced security and Insights
Advancing Healthcare IoT: Blockchain and Federated Learning ...
收藏 引用
Communication, Computer sciences and Engineering (IC3SE), International Conference on
作者: Rida Malik Atta ur-Rehaman Hamza Razzaq Chandradeep Bhatt Keshav Kaushik Inam Ullah Khan Department of Information Security Riphah Institute of System Engineering Islamabad Pakistan Department of Data Science Riphah Institute of System Engineering Islamabad Pakistan Department of CSE Graphic Era Hill University Uttarakhand India Graphic Era Deemed to be University Dehradun Uttarakhand India School of Computer Science University of Petroleum and Energy Studies Dehradun India Department of Electronic Engineering SEAS Isra University Islamabad Campus Pakistan
Fast-growing IoT devices in healthcare have ushered in a new era of data-driven patient care and treatment. These gadgets capture too much sensitive medical data, a major issue. We need to boost data analysis, securit... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论