咨询与建议

限定检索结果

文献类型

  • 48 篇 期刊文献
  • 22 篇 会议

馆藏范围

  • 70 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 30 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 11 篇 电气工程
    • 10 篇 信息与通信工程
    • 9 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 船舶与海洋工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 网络空间安全
  • 20 篇 理学
    • 12 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 海洋科学
    • 2 篇 统计学(可授理学、...
  • 12 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 4 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 3 篇 deep learning
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 learning systems
  • 2 篇 smart contract
  • 2 篇 feature extracti...
  • 2 篇 clustering algor...
  • 2 篇 authentication p...
  • 2 篇 federated learni...
  • 2 篇 artificial intel...
  • 2 篇 cloud computing
  • 2 篇 convolutional ne...
  • 1 篇 demonstrations
  • 1 篇 edge optimizatio...
  • 1 篇 view variation
  • 1 篇 multi-label clas...
  • 1 篇 tools
  • 1 篇 gps/gsm
  • 1 篇 reliability
  • 1 篇 data security

机构

  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 6 篇 hubei key labora...
  • 5 篇 shenzhen huazhon...
  • 4 篇 institute for ne...
  • 3 篇 national enginee...
  • 3 篇 huazhong univers...
  • 3 篇 school of cyber ...
  • 2 篇 college of compu...
  • 2 篇 department of co...
  • 2 篇 software enginee...
  • 2 篇 zhengzhou univer...
  • 2 篇 huazhong univers...
  • 2 篇 international in...
  • 2 篇 hubei key labora...
  • 2 篇 research center ...
  • 2 篇 jin yinhu labora...
  • 2 篇 department of co...
  • 2 篇 huazhong univers...
  • 2 篇 national enginee...

作者

  • 10 篇 jin hai
  • 8 篇 zou deqing
  • 7 篇 li zhen
  • 7 篇 xu shouhuai
  • 6 篇 zhou pan
  • 5 篇 hai jin
  • 5 篇 deng xianjun
  • 4 篇 yang laurence t.
  • 4 篇 wu dapeng oliver
  • 4 篇 deqing zou
  • 4 篇 hu yuchong
  • 4 篇 fang xiang
  • 3 篇 park jong hyuk
  • 3 篇 li yating
  • 3 篇 liu shenghao
  • 3 篇 shouhuai xu
  • 3 篇 zhang ruqian
  • 3 篇 wang ning
  • 2 篇 chen haifeng
  • 2 篇 li xiong

语言

  • 61 篇 英文
  • 9 篇 其他
检索条件"机构=Department of Data Science and System Security"
70 条 记 录,以下是31-40 订阅
排序:
Tensor and Minimum Connected Dominating Set based Confident Information Coverage Reliability Evaluation for IoT
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年
作者: Xiao, Ziheng Zhu, Chenlu Feng, Wei Liu, Shenghao Deng, Xianjun Lu, Hongwei Yang, Laurence T. Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China Artificial Intelligence and Intelligent Transportation Joint Technical Center of HUST and Hubei Chutian Intelligent Transportation Company Ltd United States Network and Industrial Control Information Security Technology Department China Nuclear Power Operation Technology Company Ltd. 1011 Xiongchu Avenue Hubei Wuhan430070 China The Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul01811 Korea Republic of
Internet of Things (IoT) reliability evaluation contributes to the sustainable computing and enhanced stability of the network. Previous algorithms usually evaluate the reliability of IoT by enumenating the states of ... 详细信息
来源: 评论
Tensor Dynamic Fusion Based Modality-Imbalanced Multimodal Federated Learning in Mobile Edge Computing for Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Nie, Xin Yi, Lingzhi Yang, Laurence T. Deng, Xianjun Fan, Fulan Zhang, Hongtao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei EngineeringResearch Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China St. Francis Xavier University Department of Computer Science Antigonish Canada South-Central Minzu University School of Education Wuhan430074 China
Mobile edge computing extends the capabilities of computation and storage from the cloud to the edge, enabling local data storage and processing. This computing paradigm complements federated learning (FL), as it sati... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Graph Sampling based Fairness-aware Recommendation over Sensitive Attribute Removal
Graph Sampling based Fairness-aware Recommendation over Sens...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Shenghao Liu Guoyang Wu Xianjun Deng Hongwei Lu Bang Wang Laurence Yang James J. Park Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea
Discrimination against different user groups has received growing attention in the recommendation field. To address this problem, existing works typically remove sensitive attributes that may cause discrimination thro...
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Tensor-Based Multi-Scale Correlation Anomaly Detection for AIoT-Enabled Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zeng, Jiuzhen Yang, Laurence T. Wang, Chao Deng, Xianjun Yang, Xiangli Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada University of South China School of Electrical Engineering Hengyang421001 China
Artificial Intelligence of Things (AIoT) is an innovative paradigm expected to enable various consumer applications that is transforming our lives. While enjoying benefits and services from these applications, we also... 详细信息
来源: 评论
The security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论
New Approach for Efficient Malicious Multiparty Private Set Intersection
SSRN
收藏 引用
SSRN 2023年
作者: Lv, Siyi Wei, Yu Jia, Jingyu Li, Xinhao Liu, Zheli Chen, Xiaofeng Guo, Liang College of Cyber Science The College of Computer Science Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China Department of Computer Science Purdue University United States School of Cyber Engineering Xidian University Xi’an China Huawei Technology Co. Ltd Shenzhen China
The Multiparty Private Set Intersection (MPSI) protocol allows untrusted parties to compute the intersection of their sets without revealing any additional information. However, existing solutions face challenges in t... 详细信息
来源: 评论
Rainfall-Induced Landslide Prediction using Graph-Based Convolutional Network Models
Rainfall-Induced Landslide Prediction using Graph-Based Conv...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE International Conference on
作者: P. Rajasekar K. M. Devendraiah A Tamizhselvi Droupti Yadav A. Priyadharshini D. Suganthi Department of Data Science and Business System SRM Institute of Science and Technology India V. V. Sangha's Independent P U College Ballari India Department of Information Technology St. Joseph's College of Engineering Chennai India Department of Environmental Science Technology School of Basic Sciences CSJM University Kanpur India Department of Computer Science and Engineering (Cyber Security) Nandha Engineering College Erode India Saveetha College of Liberal Arts and Sciences SIMATS Chennai India
Landslides are natural disasters that are devastating and unpredictable. Community notification and casualty reduction require early warning systems. Using data analytics and machine learning technology (MLT), IoT-ena... 详细信息
来源: 评论