咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 334 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 290 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 96 篇 信息与通信工程
    • 74 篇 电气工程
    • 60 篇 生物工程
    • 40 篇 控制科学与工程
    • 33 篇 化学工程与技术
    • 32 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 19 篇 安全科学与工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
  • 190 篇 理学
    • 85 篇 数学
    • 74 篇 生物学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 27 篇 化学
    • 11 篇 系统科学
  • 92 篇 管理学
    • 47 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 20 篇 privacy
  • 16 篇 federated learni...
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 security
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 11 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 measurement
  • 8 篇 object detection

机构

  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 21 篇 school of softwa...
  • 19 篇 school of comput...
  • 18 篇 the hubei engine...
  • 18 篇 school of inform...
  • 17 篇 huazhong univers...
  • 17 篇 school of cyber ...
  • 14 篇 shenzhen huazhon...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 33 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 13 篇 li minghui
  • 12 篇 wang haoyu
  • 12 篇 zhou ziqi
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 10 篇 fang xiang

语言

  • 637 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
669 条 记 录,以下是401-410 订阅
排序:
A Study on a Reduced Indicator System for the Network security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Hongbin Zhang Yikang Bai Dongmei Zhao Bin Liu Ying Xu Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is...
来源: 评论
Graph transformer-convolution network for graph classification
Graph transformer-convolution network for graph classificati...
收藏 引用
2021 International Conference on Green Communication, Network, and Internet of Things, GCNIoT 2021
作者: Li, Chengzong Zhai, Rui Zuo, Fang Zhang, Libo Yu, Junyang School of Software Henan University Kaifeng China Henan Provincial Engineering Research Center of Intelligent Data Processing Henan University Kaifeng China Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University Kaifeng China Subject Innovation and Intelligence Introduction Base of Henan Higher Educational Institution Software Eng. Intelligent Info. Proc. Innov. and Intelligence Introduction Base of Henan University China
The Transformer has achieved tremendous success in computer vision, natural language processing, and graph representation learning. However, the transformer cannot effectively encode the topology information of the gr... 详细信息
来源: 评论
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Shaofei Dong, Feng Xiao, Xusheng Wang, Haoyu Shao, Fei Chen, Jiedong Guo, Yao Chen, Xiangqun Li, Ding School of Computer Science Peking University China Arizona State University United States Case Western Reserve University United States Sangfor Technologies Inc. China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios... 详细信息
来源: 评论
Unsupervised Temporal Video Grounding with Deep Semantic Clustering
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Daizong Qu, Xiaoye Wang, Yinzhen Di, Xing Zou, Kai Cheng, Yu Xu, Zichuan Zhou, Pan The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Electronic Information and Communication Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology ProtagoLabs Inc Microsoft Research Dalian University of Technology
Temporal video grounding (TVG) aims to localize a target segment in a video according to a given sentence query. Though respectable works have made decent achievements in this task, they severely rely on abundant vide... 详细信息
来源: 评论
research on long and short-term social recommendation based on convolutional and gated recurrent units
Research on long and short-term social recommendation based ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zihe Jia Peng Xue Zhiqiang Dai Qian Gao Xiaomeng Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users....
来源: 评论
Secure and Privacy-preserving data-sharing Framework based on Blockchain technology for Al-Najaf/Iraq Oil Refinery  19
Secure and Privacy-preserving Data-sharing Framework based o...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Umran, Samir M. Lu, SongFeng Abduljabbar, Zaid Ameen Lu, Zhi Feng, Bingyan Zheng, Lu Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Iraqi Cement State Company Ministry of Industry and Minerals Baghdad10011 Iraq Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China University of Basrah College of Education for Pure Sciences Iraq Al-Kunooze University College Technical Computer Engineering Department Basrah Iraq Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Industrial Internet Research Institute Wuhan Huazhong Numerical Control Co. Ltd Wuhan430074 China South-Central University for Nationalities College of Computer Science Wuhan430074 China
The Industrial Internet of Things or Industry 4.0 efficiently enhances the manufacturing process in terms of raising productivity, system performance, cost reduction, and building large-scale systems. It enables the c... 详细信息
来源: 评论
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Learning Approach
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Le...
收藏 引用
International Smart Grid Workshop and Certificate Program (ISGWCP)
作者: Saadin Oyucu Şeref Sağıroğlu Ahmet Aksöz Emre Biçer Department of Computer Engineering Faculty of Engineering Adıyaman Türkiye Gazi University Artificial Intelligence and Big Data Analytics Security R&D Center Ankara Türkiye Mobilers Team Sivas Cumhuriyet University Sivas Türkiye Faculty of Engineering and Natural Sciences Battery Research Laboratory Sivas University of Science and Technology Sivas Türkiye
Smart grids are faced with a range of challenges, such as the development of communication infrastructure, cybersecurity threats, data privacy, and the protection of user information, due to their complex structure. A... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Polynomial-SHAP analysis of liver disease markers for capturing of complex feature interactions in machine learning models
收藏 引用
Computers in Biology and Medicine 2024年 182卷 109168-109168页
作者: Ejiyi, Chukwuebuka Joseph Cai, Dongsheng Ejiyi, Makuachukwu B. Chikwendu, Ijeoma A. Coker, Kenneth Oluwasanmi, Ariyo Bamisile, Oluwatoyosi F. Ejiyi, Thomas U. Qin, Zhen College of Nuclear Technology and Automation Engineering Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Sichuan Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Department of Electrical and Electronic Engineering Ho Technical University Ghana Ghana Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu State Nsukka Nigeria
Liver disease diagnosis is pivotal for effective patient management, and machine learning techniques have shown promise in this domain. In this study, we investigate the impact of Polynomial-SHapley Additive exPlanati... 详细信息
来源: 评论
MACCoM: A multiple attention and convolutional cross-mixer framework for detailed 2D biomedical image segmentation
收藏 引用
Computers in Biology and Medicine 2024年 179卷 108847-108847页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Ejiyi, Makuachukwu Bennedith Ukwuoma, Chiagoziem Ejiyi, Thomas Ugochukwu Muoka, Gladys Wavinya Gyarteng, Emmanuel S.A. Bamisile, Olusola O. Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Chengdu China
The UNet architecture, which is widely used for biomedical image segmentation, has limitations like blurred feature maps and over- or under-segmented regions. To overcome these limitations, we propose a novel network ... 详细信息
来源: 评论