咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 334 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 290 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 96 篇 信息与通信工程
    • 74 篇 电气工程
    • 60 篇 生物工程
    • 40 篇 控制科学与工程
    • 33 篇 化学工程与技术
    • 32 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 19 篇 安全科学与工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
  • 190 篇 理学
    • 85 篇 数学
    • 74 篇 生物学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 27 篇 化学
    • 11 篇 系统科学
  • 92 篇 管理学
    • 47 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 20 篇 privacy
  • 16 篇 federated learni...
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 security
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 11 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 measurement
  • 8 篇 object detection

机构

  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 21 篇 school of softwa...
  • 19 篇 school of comput...
  • 18 篇 the hubei engine...
  • 18 篇 school of inform...
  • 17 篇 huazhong univers...
  • 17 篇 school of cyber ...
  • 14 篇 shenzhen huazhon...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 33 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 13 篇 li minghui
  • 12 篇 wang haoyu
  • 12 篇 zhou ziqi
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 10 篇 fang xiang

语言

  • 637 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
669 条 记 录,以下是171-180 订阅
排序:
DarkFed: A data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Optimized Dynamic Watermarking for Audio DNNs with Adaptive Embedding and Boundary Sampling
Optimized Dynamic Watermarking for Audio DNNs with Adaptive ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Hao Fei Hewang Nie Siqi Sun Songfeng Lu Ting Luo Ling Qian Dunbo Cai Zhiguo Huang Runqing Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen China China Mobile (Suzhou) Software Technology Company Limited Suzhou China
The intensified concerns arising from the widespread adoption of deep learning have led to increased scrutiny of intellectual property protection in DNN models. Existing audio watermarking techniques, predominantly ba... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
MalWuKong: Towards Fast, Accurate, and Multilingual Detectio...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Ningke Li Shenao Wang Mingxi Feng Kailong Wang Meizhen Wang Haoyu Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
In the face of increased threats within software registries and management systems, we address the critical need for effective malicious code detection. In this paper, we propose an innovative approach that integrates...
来源: 评论
Enhancing Programming Course Quality through Human Posture Recognition and Screen Content Detection
Enhancing Programming Course Quality through Human Posture R...
收藏 引用
Information Science and Education (ICISE-IE), International Conference on
作者: Xiaopan Chen Haiyang Bai Xiaoke Zhu Lingyuan Dong School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology Henan University Kaifeng China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
The evaluation of programming course instruction is a key component of educational management. However, relying solely on supervising teachers for assessment poses challenges in comprehensive evaluation and providing ...
来源: 评论
Towards Distractibility Induced trust Management Using BlockChain for Edge Computing
Towards Distractibility Induced trust Management Using Block...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
作者: Yang, Haochen Wang, Guanghui Dong, Lifeng He, Xin School of Software Henan University Kaifeng China Henan Provincial Engineering Research Center of Intelligent Data Processing Kaifeng China Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University Kaifeng China Institute of Intelligent Network System Henan University Kaifeng China Henan Jiuyu Tenglong Information Engineering Co. Ltd. Zhengzhou China
Edge computing solves massive data processing problems by utilizing the storage and computing functions of edge devices. Due to the openness of edge computing, distracted devices inevitably participate in edge computi... 详细信息
来源: 评论
Automated Extraction of Active Offshore Oil/Gas Platforms Based on High-Spatial Resolution SDGSAT-1/GLI data: A Case Study in the Northern Gulf of Mexico  2
Automated Extraction of Active Offshore Oil/Gas Platforms Ba...
收藏 引用
2023 2nd International Conference on Environmental Remote Sensing and Geographic Information technology, ERSGIT 2023
作者: Chen, Zhongzhong Yan, Lin Qiu, Yujia Liang, Yueji Li, Xiao-Ming College of Geomatics and Geoinformation Guilin University of Technology Guilin541004 China International Research Center of Big Data for Sustainable Development Goals Beijing100094 China Key Laboratory of Digital Earth Science Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Computer and Information Engineering Henan University Kaifeng475001 China
The acquisition of spatial distribution information on active offshore oil/gas platforms (AOOP) is of importance for effective ocean management and the comprehensive study on marine carbon emissions. In recent years, ... 详细信息
来源: 评论
Clustering Network Based on Pre-Clustering center Codebook
Clustering Network Based on Pre-Clustering Center Codebook
收藏 引用
International Conference on Intelligent System and Knowledge engineering, ISKE
作者: Qiulong An Jianning Wu Tianqiang Huang Liqing Huang Haifeng Luo Feng Ye Fujian Provincial Engineering Research Center of Big Data Analysis and Application College of Computer and Cyber Security Fujian Normal University Digital Fujian Institute of Big Data Security Technology Fuzhou China
Most existing deep clustering models attempt to group similar datas by using autoencoders to simultaneously minimize the clustering loss and reconstruction losses. However, these methods do not impose any constraints ...
来源: 评论