咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 334 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 290 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 96 篇 信息与通信工程
    • 74 篇 电气工程
    • 60 篇 生物工程
    • 40 篇 控制科学与工程
    • 33 篇 化学工程与技术
    • 32 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 19 篇 安全科学与工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
  • 190 篇 理学
    • 85 篇 数学
    • 74 篇 生物学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 27 篇 化学
    • 11 篇 系统科学
  • 92 篇 管理学
    • 47 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 20 篇 privacy
  • 16 篇 federated learni...
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 security
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 11 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 measurement
  • 8 篇 object detection

机构

  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 21 篇 school of softwa...
  • 19 篇 school of comput...
  • 18 篇 the hubei engine...
  • 18 篇 school of inform...
  • 17 篇 huazhong univers...
  • 17 篇 school of cyber ...
  • 14 篇 shenzhen huazhon...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 33 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 13 篇 li minghui
  • 12 篇 wang haoyu
  • 12 篇 zhou ziqi
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 10 篇 fang xiang

语言

  • 637 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
669 条 记 录,以下是241-250 订阅
排序:
Rethinking the Video Sampling and Reasoning Strategies for Temporal Sentence Grounding
Rethinking the Video Sampling and Reasoning Strategies for T...
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Zhu, Jiahao Liu, Daizong Zhou, Pan Di, Xing Cheng, Yu Yang, Song Xu, Wenzheng Xu, Zichuan Wan, Yao Sun, Lichao Xiong, Zeyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China ProtagoLabs Inc Microsoft Research Wangxuan Institute of Computer Technology Peking University China Beijing Institute of Technology China School of Sichuan University China Dalian University of Technology China Lehigh University United States School of Computer Sci. & Tech. Huazhong University of Science and Technology China
Temporal sentence grounding (TSG) aims to identify the temporal boundary of a specific segment from an untrimmed video by a sentence query. All existing works first utilize a sparse sampling strategy to extract a fixe... 详细信息
来源: 评论
Unsupervised Spatio-Temporal State Estimation for Fine-Grained Adaptive Anomaly Diagnosis of Industrial Cyber-Physical Systems
SSRN
收藏 引用
SSRN 2024年
作者: Sun, Haili Huang, Yan Han, Lansheng Fu, Cai Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China National Key Laboratory of Science and Technology on Multispectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS)... 详细信息
来源: 评论
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem
arXiv
收藏 引用
arXiv 2023年
作者: Li, Wenke Wu, Feng Fu, Cai Zhou, Fan School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China Co.Ltd Shenzhen China
Third-party libraries (TPLs) have become an essential component of software, accelerating development and reducing maintenance costs. However, breaking changes often occur during the upgrades of TPLs and prevent clien... 详细信息
来源: 评论
data Poisoning Attack to X-armed Bandits  21
Data Poisoning Attack to X-armed Bandits
收藏 引用
21st IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2022
作者: Luo, Zhi Li, Youqi Chen, Lixing Xu, Zichuan Zhou, Pan Huazhong University of Science and Technology School of Cyber Science and Engineering China Beijing Institute of Technology School of Cyberspace Science and Technology School of Computer Science China Shanghai Jiao Tong University Institute of Cyber Science and Technology China Dalian University of Technology School of Software China Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendati... 详细信息
来源: 评论
Learning Comprehensive Representation via Selective Activation and Dual-Level Orthogonality for Pedestrian Attribute Recognition
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Wu, Junyi Huang, Yan Gao, Min Niu, Yuzhen Chen, Yuzhong Wu, Qiang Zhao, Jianqiang Ministry of Education Engineering Research Center of Big Data Intelligence China Ai Research Center Sdic Intelligence Xiamen Information Co. Ltd Xiamen China Xiamen Meiya Pico Information Security Research Institute Co. Ltd Xiamen China Institute of Automation Beijing China Fuzhou University Fujian Key Lab for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering Fuzhou China University of Technology Sydney School of Electrical and Data Engineering Ultimo Australia
Multi-label Pedestrian Attribute Recognition (PAR) involves identifying a series of semantic attributes in person images. Existing PAR solutions typically rely on CNN as the backbone network to extract pedestrian feat... 详细信息
来源: 评论
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Haili Huang, Yan Han, Lansheng Fu, Cai Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China National Key Laboratory of Science and Technology on Multispectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS)... 详细信息
来源: 评论
Towards Efficient data-Centric Robust Machine Learning with Noise-based Augmentation
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Xiaogeng Wang, Haoyu Zhang, Yechao Wu, Fangzhou Hu, Shengshan School Of Cyber Science And Engineering National Engineering Research Center For Big Data Technology And System Services Computing Technology And System Lab Hubei Engineering Research Center On Big Data Security Huazhong University Of Science And Technology Wuhan430074 China
The data-centric machine learning aims to find effective ways to build appropriate datasets which can improve the performance of AI models. In this paper, we mainly focus on designing an efficient data-centric scheme ... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Real-time stealth transmission via dither-based bias control
Real-time stealth transmission via dither-based bias control
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Yuanxiang Wang Weidong Shao Linsheng Zhong Xiaoxiao Dai Qi Yang Lei Deng Deming Liu Mengfan Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan China
We report a real-time 1 kbps stealthy transmission in the 10 Gbps QPSK public communication. The stealth data is embedded in dither signals of bias control. The scheme is compatible with existing optical transmission ... 详细信息
来源: 评论
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optimization in Intelligent Transportation IoT  19
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optim...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Yi, Lingzhi Luo, Bin Zhu, Chenlu Deng, Xianjun Xia, Yunzhi Wu, Hengshan Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China University of South China School of Civil Engineering Hengyang421001 China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Hubei Chutian Expressway Digital Technology Co. Ltd Wuhan430074 China
The integration of Internet of Things (IoT)-based highway bridge structural health monitoring (HBSHM) and intelligent transportation systems (ITS) plays an essential role in detecting damage for large and complex brid... 详细信息
来源: 评论