咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 334 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 290 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 96 篇 信息与通信工程
    • 74 篇 电气工程
    • 60 篇 生物工程
    • 40 篇 控制科学与工程
    • 33 篇 化学工程与技术
    • 32 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 19 篇 安全科学与工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
  • 190 篇 理学
    • 85 篇 数学
    • 74 篇 生物学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 27 篇 化学
    • 11 篇 系统科学
  • 92 篇 管理学
    • 47 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 20 篇 privacy
  • 16 篇 federated learni...
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 security
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 11 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 measurement
  • 8 篇 object detection

机构

  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 21 篇 school of softwa...
  • 19 篇 school of comput...
  • 18 篇 the hubei engine...
  • 18 篇 school of inform...
  • 17 篇 huazhong univers...
  • 17 篇 school of cyber ...
  • 14 篇 shenzhen huazhon...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 33 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 13 篇 li minghui
  • 12 篇 wang haoyu
  • 12 篇 zhou ziqi
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 10 篇 fang xiang

语言

  • 637 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
669 条 记 录,以下是231-240 订阅
排序:
research on security Assessment of Intelligent Electronic Devices in Smart Grids Considering Cyber-Attacks and Physical Faults
SSRN
收藏 引用
SSRN 2023年
作者: Chen, Yang-Rong Li, Jun-E Xia, Yu Zhang, Rui-Wen Li, Ling-Ling Li, Xiao-Yu Ge, Lin School of Intelligent Engineering Zhengzhou University of Aeronautics Zhengzhou450046 China Henan Data Security Engineering Technology Research Center Zhengzhou450046 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Zhengzhou University of Aeronautics China
The smart grid contains lots of intelligent electronic devices (IEDs). IEDs are considered high-priority targets of cyber-attacks. Assessing the security of IEDs effectively can help operators take timely measures to ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Dual consistent constraint via disentangled consistency and complementarity for multi-view clustering
收藏 引用
Neurocomputing 2025年 641卷
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论
Verifiable and Hybrid Attribute-Based Proxy Re-Encryption for Flexible data Sharing in Cloud Storage
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Lixue Xu, Chunxiang Zeng, Fugeng School of Science Henan Institute of Technology Henan Xinxiang453003 China Center for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Data Sciences and Information Engineering Guizhou Minzu University Guizhou Guiyang550025 China
Cloud computing is a promising service architecture that enables a data owner to share data in an economic and efficient manner. To ensure data privacy, a data owner will generate the ciphertext of the data before out... 详细信息
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
Hard-Label Black-Box Attacks on 3D Point Clouds
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Daizong Tao, Yunbo Zhou, Pan Hu, Wei Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
With the maturity of depth sensors in various 3D safety-critical applications, 3D point cloud models have been shown to be vulnerable to adversarial attacks. Almost all existing 3D attackers simply follow the white-bo... 详细信息
来源: 评论
data-Driven Active Power Dispatch for Wind Farms  13
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
13th IEEE data Driven Control and Learning Systems Conference, DDCLS 2024
作者: Jiao, Xuguo Zhang, Daoyuan Wang, Xin Ma, Zhaoxing Zhang, Zhenyong Liu, Wenfeng School of Information and Control Engineering Qingdao University of Technology Qingdao266520 China College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China School of Civil Engineering Qingdao University of Technology Qingdao266520 China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论