咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 425 篇 工学
    • 286 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 96 篇 信息与通信工程
    • 71 篇 电气工程
    • 60 篇 生物工程
    • 41 篇 控制科学与工程
    • 33 篇 化学工程与技术
    • 32 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 18 篇 安全科学与工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
  • 190 篇 理学
    • 85 篇 数学
    • 74 篇 生物学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 27 篇 化学
    • 11 篇 系统科学
  • 93 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 22 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 20 篇 privacy
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 security
  • 15 篇 federated learni...
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 11 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 measurement
  • 8 篇 object detection

机构

  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 21 篇 school of softwa...
  • 19 篇 school of comput...
  • 18 篇 the hubei engine...
  • 18 篇 school of inform...
  • 17 篇 huazhong univers...
  • 17 篇 school of cyber ...
  • 14 篇 shenzhen huazhon...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 33 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 13 篇 li minghui
  • 12 篇 wang haoyu
  • 12 篇 zhou ziqi
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 10 篇 fang xiang

语言

  • 634 篇 英文
  • 26 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
665 条 记 录,以下是411-420 订阅
排序:
VulCNN: An Image-inspired Scalable Vulnerability Detection System
VulCNN: An Image-inspired Scalable Vulnerability Detection S...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Yueming Wu Deqing Zou Shihan Dou Wei Yang Duo Xu Hai Jin Huazhong University of Science and Technology China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering HUST Wuhan China Services Computing Technology and System Lab National Engineering Research Center for Big Data Technology and System HUST Wuhan China Fudan University China University of Texas at Dallas United States Cluster and Grid Computing Lab School of Computer Science and Technology HUST Wuhan China
Since deep learning (DL) can automatically learn features from source code, it has been widely used to detect source code vulnerability. To achieve scalable vulnerability scanning, some prior studies intend to process... 详细信息
来源: 评论
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Binghui Li, Youqi Zhou, Pan Department of Computer Science Illinois Institute of Technology United States School of Cyberspace Science and Technology School of Computer Science Beijing Institute of Technology China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Graph neural networks (GNNs) have achieved state-of-the-art performance in many graph-based tasks such as node classification and graph classification. However, many recent works have demonstrated that an attacker can... 详细信息
来源: 评论
Wavelike tunneling of phonons dominates glassy thermal conductivity in crystalline Cs3Bi2I6Cl3
收藏 引用
Physical Review B 2023年 第22期108卷 224302-224302页
作者: Jingyu Li Liuming Wei Zhuoyang Ti Le Ma Yuli Yan Guangbiao Zhang Peng-Fei Liu Institute for Computational Materials Science School of Physics and Electronics International Joint Research Laboratory of New Energy Materials and Devices of Henan Province Henan University Kaifeng 475004 China Institute of High Energy Physics Chinese Academy of Sciences Beijing 100049 China Spallation Neutron Source Science Center Dongguan 523803 China Department of Network Security Henan Police College Zhengzhou 450046 China Science Island Branch of Graduate School University of Science and Technology of China Hefei 230026 China School of Materials Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China
Intrinsically low lattice thermal conductivity κL in halide perovskites is of great interest for energy conversion applications. Here, based on first-principles calculations, we systematically study the lattice therm... 详细信息
来源: 评论
Accurate Leukocyte Detection Based on Deformable-DETR and Multi-Level Feature Fusion for Aiding Diagnosis of Blood Diseases
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Yifei Zhang, Chenyan Chen, Ben Huang, Yiyu Sun, Yifei Wang, Changmiao Fu, Xianjun Dai, Yuxing Qin, Feiwei Peng, Yong Gao, Yu HDU-ITMO Joint Institute Hangzhou Dianzi University Hangzhou310018 China Medical Big Data Lab Shenzhen Research Institute of Big Data Shenzhen518172 China School of Artificial Intelligence Zhejiang College of Security Technology Wenzhou325016 China National-local Joint Engineering Research Center for Digitalized Electrical Design Technology Wenzhou University Wenzhou325035 China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China Department of Hematology Zhejiang Hospital Hangzhou310018 China
In standard hospital blood tests, the traditional process requires doctors to manually isolate leukocytes from microscopic images of patients’ blood using microscopes. These isolated leukocytes are then categorized v... 详细信息
来源: 评论
A Lightweight and Robust Access Control Protocol for IoT-based e-Healthcare Network
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Ghaffar, Zahid Kuo, Wen-Chung Mahmood, Khalid Tariq, Tayyaba Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J.F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University Department of Computer Science and Engineering College of Informatics 145 Anam-ro Seongbuk-gu Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh Saudi Arabia
Internet of Things (IoT) devices are crucial components in e-healthcare networks. It enables remote patient health monitoring and facilitates seamless communication among medical sensors, wearable devices, and healthc... 详细信息
来源: 评论
Ecological security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 985-1001页
作者: Xiaozhou Li Zhenggang Xu Yuanyuan Fu Qi Jin Yunlin Zhao Neal NXiong Key Laboratory of Forestry Remote Sensing Based Big Data&Ecological Security for Hunan Province Central South University of Forestry and TechnologyChangsha410004China Hunan Urban and Rural Ecological Planning and Restoration Engineering Research Center Hunan City UniversityYiyang413000China College of Information and Electronic Engineering Hunan City UniversityYiyang413000China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
Today,resource depletion threatens a number of resource-based cities in *** ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resou... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
Evaluating the Impact of Special Characters on Password security: a Comparative Analysis
收藏 引用
IEEE Network 2025年
作者: He, Daojing Liu, Zhiyong Chan, Sammy Zhou, Beibei Guizani, Mohsen Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Guizhou University State Key Laboratory of Public Big Data Guizhou China Research and Development Center Guangzhou Jingyuan Security Technology Co. Ltd Guangzhou China City University of Hong Kong Kowloon Department of Electrical Engineering Hong Kong Hong Kong Shanghai Urban Construction Vocational College School of Artificial Intelligence Application Shanghai China Machine Learning Department Abu Dhabi United Arab Emirates
Text-based password authentication remains essential for identity verification on internet platforms and blockchain systems. However, as computational power advances, security threats to user passwords have intensifie... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Corrosion-resistant aluminum alloy design through machine learning combined with high-throughput calculations
arXiv
收藏 引用
arXiv 2023年
作者: Ji, Yucheng Fu, Xiaoqian Ding, Feng Xu, Yongtao He, Yang Ao, Min Xiao, Fulai Chen, Dihao Dey, Poulumi Xiao, Kui Ren, Jingli Li, Xiaogang Dong, Chaofang Ji, Y. Fu, X. Ding, F. He, Y. Ao, M. Chen, D. Xiao, K. Li, X. Dong, C. Ji, Y. Dey, P. Xu, Y. Xiao, F. Ren, J. Beijing Advanced Innovation Center for Materials Genome Engineering National Materials Corrosion Protection Data Center Institute for Advanced Materials and Technology Shunde Innovation School University of Science and Technology Beijing Beijing100083 China Department of Materials Science and Engineering Faculty of Mechanical Maritime and Materials Engineering Delft University of Technology Delft2628CD Netherlands National Engineering & Technology Research Center for Non-Ferrous Metals Composites GRINM Group Corporation Limited Beijing101407 China Shandong Nanshan Aluminum Co. Ltd. Longkou265706 China Henan Academy of Big Data Zhengzhou University Zhengzhou450001 China
Efficiently designing lightweight alloys with combined high corrosion resistance and mechanical properties remains an enduring topic in materials engineering. To this end, machine learning (ML) coupled ab-initio calcu... 详细信息
来源: 评论