咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 334 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 290 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 96 篇 信息与通信工程
    • 74 篇 电气工程
    • 60 篇 生物工程
    • 40 篇 控制科学与工程
    • 33 篇 化学工程与技术
    • 32 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 19 篇 安全科学与工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
  • 190 篇 理学
    • 85 篇 数学
    • 74 篇 生物学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 27 篇 化学
    • 11 篇 系统科学
  • 92 篇 管理学
    • 47 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 20 篇 privacy
  • 16 篇 federated learni...
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 security
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 11 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 measurement
  • 8 篇 object detection

机构

  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 21 篇 school of softwa...
  • 19 篇 school of comput...
  • 18 篇 the hubei engine...
  • 18 篇 school of inform...
  • 17 篇 huazhong univers...
  • 17 篇 school of cyber ...
  • 14 篇 shenzhen huazhon...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 33 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 13 篇 li minghui
  • 12 篇 wang haoyu
  • 12 篇 zhou ziqi
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 10 篇 fang xiang

语言

  • 637 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
669 条 记 录,以下是271-280 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
ModelLock: Locking Your Model With a Spell
arXiv
收藏 引用
arXiv 2024年
作者: Gao, Yifeng Sun, Yuhua Ma, Xingjun Wu, Zuxuan Jiang, Yu-Gang Shanghai Key Lab of Intell. Info. Processing School of CS Fudan University Shanghai China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
This paper presents a novel model protection paradigm Model Locking that locks the performance of a finetuned model on private data to make it unusable or unextractable without the right key. Specifically, we proposed... 详细信息
来源: 评论
Point-Level and Set-Level Deep Representation Learning for Cross-Modal Person Re-identification
Point-Level and Set-Level Deep Representation Learning for C...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Jihui Hu Pengfei Ye Danyang Li Lingyun Dong Xiaopan Chen Xiaoke Zhu Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University
In practice, significant modality differences usually exist between visible and infrared images, which makes visible-infrared Person Re-Identification (VI-ReID) a challenging research task. Due to the existing influen... 详细信息
来源: 评论
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 49-63页
作者: Quan YUAN Puwen WEI Keting JIA Haiyang XUE Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Department of Computer Science and Technology Tsinghua University State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Data Assurance and Communication Security Research Center Chinese Academy of Sciences
Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused... 详细信息
来源: 评论
Semi-supervised Segmentation and Quantization Algorithm for Infarct Size Measurement of Rat Heart Sections
Semi-supervised Segmentation and Quantization Algorithm for ...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Xiaoke Zhu Yulong Cai Xiaopan Chen Qi Hu Lingyun Dong Caihong Yuan School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
Segmentation of rat heart section images and infarct area quantization are essential components of infarct size measurement in processing data from animal experiments on ischemic heart disease. Previously, the task of... 详细信息
来源: 评论
Lightweight Transformer Network and Self-supervised Task for Kinship Verification
Lightweight Transformer Network and Self-supervised Task for...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Xiaoke Zhu Yunwei Li Danyang Li Lingyun Dong Xiaopan Chen School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
Kinship verification is one of the interesting and critical problems in computer vision research, with significant progress in the past decades. Meanwhile, Vision Transformer (VIT) has recently achieved impressive suc... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Towards Instruction-Tuned Verification for Improving Biomedical Information Extraction with Large Language Models
Towards Instruction-Tuned Verification for Improving Biomedi...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jin Li Ruifan Yuan Yu Tian Jingsong Li School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing China College of Biomedical Engineering & Instrumental Science Zhejiang University Hangzhou China Zhejiang Lab Research Center for Data Hub and Security Hangzhou China
Biomedical information extraction, including tasks like Named Entity Recognition (NER) and Relationship Extraction (RE), plays a critical role in analyzing unstructured biomedical data, facilitating more accurate down... 详细信息
来源: 评论