咨询与建议

限定检索结果

文献类型

  • 346 篇 会议
  • 341 篇 期刊文献

馆藏范围

  • 687 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 303 篇 计算机科学与技术...
    • 253 篇 软件工程
    • 100 篇 信息与通信工程
    • 76 篇 电气工程
    • 60 篇 生物工程
    • 50 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 20 篇 安全科学与工程
    • 17 篇 网络空间安全
    • 16 篇 土木工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 建筑学
    • 12 篇 动力工程及工程热...
  • 195 篇 理学
    • 87 篇 数学
    • 74 篇 生物学
    • 42 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 29 篇 化学
    • 11 篇 系统科学
  • 95 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 18 篇 医学
    • 14 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 22 篇 deep learning
  • 21 篇 privacy
  • 17 篇 federated learni...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 training
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 contrastive lear...
  • 9 篇 measurement

机构

  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 48 篇 school of comput...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 24 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 19 篇 school of comput...
  • 18 篇 huazhong univers...
  • 18 篇 the hubei engine...
  • 17 篇 school of cyber ...
  • 15 篇 huazhong univers...

作者

  • 47 篇 zhou pan
  • 38 篇 jin hai
  • 33 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 13 篇 wang haoyu
  • 12 篇 wan wei
  • 12 篇 fang xiang
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 shengshan hu

语言

  • 624 篇 英文
  • 58 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
687 条 记 录,以下是481-490 订阅
排序:
Automatically derived stateful network functions including non-field attributes
Automatically derived stateful network functions including n...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Bin Yuan Shengyao Sun Xianjun Deng Deqing Zou Haoyu Chen Shenghui Li Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Research Institute Huazhong University of Science and Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab
The modern network consists of thousands of network devices from different suppliers that perform distinct code-pendent functions, such as routing, switching, modifying header fields, and access control across physica... 详细信息
来源: 评论
Robust and Secure Federated Learning with Verifiable Differential Privacy
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhang, Chushan Weng, Jian Weng, Jiasi Zhong, Yijian Liu, Jia-Nan Deng, Cunle College of Cyber Security of Jinan University Guangzhou510632 China College of Cyber Security of Jinan University National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Dongguan University of Technology School of Computer Science and Technology Dongguan523808 China
Federated Learning (FL) has emerged as a popular paradigm for training machine learning models on data from multiple sources without the need for data to leave their respective locations. Although FL is widely used, r... 详细信息
来源: 评论
Network security Situational Awareness Model Based on Threat Intelligence  14th
Network Security Situational Awareness Model Based on Threat...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Zhang, Hongbin Yin, Yan Zhao, Dongmei Liu, Bin Gao, Hongbin School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050018 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang05000 China
In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awarene... 详细信息
来源: 评论
Energy Optimization for Wild Animal Tracker Basing on Watchdog technology  7th
Energy Optimization for Wild Animal Tracker Basing on Watchd...
收藏 引用
7th International Conference on Artificial Intelligence and security, ICAIS 2021
作者: Xu, Zhenggang Zhai, Wenhan Liang, Chen Zhao, Yunlin Huang, Tian Zhou, Minghui Zhou, Libo Yang, Guiyan Hu, Zhiyuan School of Material and Chemical Engineering Hunan City University Yiyang413000 China Country College of Forestry Northwest A & F University Yangling712100 China Key Laboratory of Forestry Remote Sensing Based Big Data & Ecological Security for Hunan Province Central South University of Forestry and Technology Changsha410004 China Engineering Research Center for Internet of Animals Changsha410000 China
Wild animal tracker, as an important IoT device terminal, can collect animal's position information and movement information in real time. The analysis based on the above big data provides us with a new perspectiv... 详细信息
来源: 评论
Trust and Risk Based on Access Control Model in Social Internet of Things
收藏 引用
International Journal of Network security 2023年 第5期25卷 736-744页
作者: Zhang, Hongbin Liu, Jian Zhao, Dongmei Liu, Bin Wang, Yanmei Fan, Fan School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Scienc and Technology Shijiazhuang050000 China Hebei Geological Worker’s University Shijiazhuang050000 China
Integrating social networks and the Internet of Things has formed an emerging field of Social Internet of Things (IoT). Aiming to address the shortcomings of traditional TBAC (Trust based on Access Control) and ABAC (... 详细信息
来源: 评论
Spatial fuzzy C-means clustering and deep belief network for change detection in synthetic aperture radar images  5
Spatial fuzzy C-means clustering and deep belief network for...
收藏 引用
IET International Radar Conference 2020, IET IRC 2020
作者: Qi, Wenwen Wu, Lin Guo, Zhengwei Huang, Dan College of Computer and Information Engineering Henan University Kaifeng475004 China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng475004 China Henan Engineering Research Center of Intelligent Technology and Application Henan University Kaifeng475004 China College of Environment and Planning Henan University Kaifeng475004 China Department of Laboratory and Equipment Management Henan University Kaifeng475004 China
In this study, spatial fuzzy c-means (SFCM) clustering and deep belief network (DBN) method is presented for change detection in SAR images. There are three primary steps of this approach, they are given as follows: 1... 详细信息
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
Generative Federated Learning with Small and Large Models In Consumer Electronics for Privacy preserving data Fusion in Healthcare Internet of Things
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Ghazal, Taher M. Islam, Shayla Hasan, Mohammad Kamrul Abu-Shareha, Ahmad A. Mokhtar, Umi A. Khan, M. Attique Baili, Jamel Saeed, Ali Q. Bhattt, Mohammed Wasim Ahmad, Munir Al-Ahliyya Amman University Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Department of Networks and Cybersecurity Hourani Center for Applied Scientific Research Amman Jordan UCSI University Institute of Computer Science and Digital Innovation Kuala Lumpur 56000 Malaysia Universiti Kebangsaan Malaysia (UKM) Center for Cyber Security Faculty of Information Science and Technology Malaysia Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Department of Data Science and Artificial Intelligence Amman Jordan Prince Mohammad bin Fahd University Saudi Arabia King Khalid University College of Computer Science Department of Computer Engineering Abha 61413 Saudi Arabia Northern Technical University Computer Center Ninevah Iraq Korea University College of Informatics Seoul 02841 South Korea
Healthcare Internet of Things (HIoT) requires large-scale privacy features to ensure maximum security in sharing sensitive physiological data in consumer electronics. Recent approaches utilize the fusion concept to pr... 详细信息
来源: 评论
Adaptive Proposal Generation Network for temporal sentence localization in videos
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Daizong Qu, Xiaoye Dong, Jianfeng Zhou, Pan The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Electronic Information and Communication Huazhong University of Science and Technology Huawei Cloud Zhejiang Gongshang University
We address the problem of temporal sentence localization in videos (TSLV). Traditional methods follow a top-down framework which localizes the target segment with predefined segment proposals. Although they have achie... 详细信息
来源: 评论
Coarse to fine: Domain adaptive crowd counting via adversarial scoring network
arXiv
收藏 引用
arXiv 2021年
作者: Zou, Zhikang Qu, Xiaoye Zhou, Pan Xu, Shuangjie Ye, Xiaoqing Wu, Wenhao Ye, Jin The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China Baidu Inc. China Department of Computer Science and Engineering Hong Kong University of Science and Technology China
Recent deep networks have convincingly demonstrated high capability in crowd counting, which is a critical task attracting widespread attention due to its various industrial applications. Despite such progress, traine... 详细信息
来源: 评论