咨询与建议

限定检索结果

文献类型

  • 346 篇 会议
  • 341 篇 期刊文献

馆藏范围

  • 687 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 303 篇 计算机科学与技术...
    • 253 篇 软件工程
    • 100 篇 信息与通信工程
    • 76 篇 电气工程
    • 60 篇 生物工程
    • 50 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 20 篇 安全科学与工程
    • 17 篇 网络空间安全
    • 16 篇 土木工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 建筑学
    • 12 篇 动力工程及工程热...
  • 195 篇 理学
    • 87 篇 数学
    • 74 篇 生物学
    • 42 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 29 篇 化学
    • 11 篇 系统科学
  • 95 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 18 篇 医学
    • 14 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 22 篇 deep learning
  • 21 篇 privacy
  • 17 篇 federated learni...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 training
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 contrastive lear...
  • 9 篇 measurement

机构

  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 48 篇 school of comput...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 24 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 19 篇 school of comput...
  • 18 篇 huazhong univers...
  • 18 篇 the hubei engine...
  • 17 篇 school of cyber ...
  • 15 篇 huazhong univers...

作者

  • 47 篇 zhou pan
  • 38 篇 jin hai
  • 33 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 13 篇 wang haoyu
  • 12 篇 wan wei
  • 12 篇 fang xiang
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 shengshan hu

语言

  • 624 篇 英文
  • 58 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
687 条 记 录,以下是531-540 订阅
排序:
Cloud-Assisted Privacy Protection for data Retrieval Against Keyword Guessing Attacks  3rd
Cloud-Assisted Privacy Protection for Data Retrieval Against...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Chen, Zhenwei Zhang, Yinghui Han, Gang He, Jiangyong Guo, Rui Zheng, Dong School of Cyberspace Security Xi’an University of Posts and Telecommunications Xi’an710121 China National Engineering Laboratory for Wireless Security Xi’an University of Posts and Telecommunications Xi’an710121 China Westone Cryptologic Research Center Beijing100070 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting ... 详细信息
来源: 评论
Multi-Level Chaotic Maps for 3D Textured Model Encryption  2nd
Multi-Level Chaotic Maps for 3D Textured Model Encryption
收藏 引用
2nd EAI International Conference on Robotic Sensor Networks, ROSENET 2018
作者: Jin, Xin Zhu, Shuyun Wu, Le Zhao, Geng Li, Xiaodong Zhou, Quan Lu, Huimin Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China CETC Big Data Research Institute Co. Ltd. Guizhou Guiyang China Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Mechanical and Control Engineering Kyushu Institute of Technology Kitakyushu Japan
With the rapid progress of virtual reality and augmented reality technologies, 3D contents are the next widespread media in many applications. Thus, the protection of 3D models is primarily important. Encryption of 3D... 详细信息
来源: 评论
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
arXiv
收藏 引用
arXiv 2021年
作者: Qiu, Huming Ma, Hua Zhang, Zhi Zheng, Yifeng Fu, Anmin Zhou, Pan Gao, Yansong Abbott, Derek Al-Sarawi, Said F. School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Electrical and Electronic Engineering The University of Adelaide Adelaide Australia Data61 CSIRO Sydney Australia The School of Computer Science and Technology Harbin Institute of Technology Guangdong Shenzhen518055 China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China
Currently, a high demand for on-device deep neural network (DNN) model deployment is limited by the large model size, computing-intensive floating-point operations (FLOPS), and intellectual property (IP) infringements... 详细信息
来源: 评论
The influence of different heating rates on mortality of Tribolium castaneum(Herbst)(Coleoptera: Tenebrionidae)
收藏 引用
Grain & Oil Science and technology 2020年 第2期3卷 64-69页
作者: Yulong Kang Jianhua Lyu Pengjie Wang Engineering Research Center of Grain Storage and Security of Ministry of Education Grain Storage and Logistics National Engineering LaboratoryZhengzhou 450001China College of Food Science and Technology Henan University of TechnologyZhengzhou 450001China
In order to elucidate the ability of stored product insects to resist high temperature at varying temperature conditions,the influence of different heating rates on the mortality of all life stages of Tribolium castan... 详细信息
来源: 评论
A Tutorial on Movable Antennas for Wireless Networks
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Lipeng Ma, Wenyan Mei, Weidong Zeng, Yong Wu, Qingqing Ning, Boyu Xiao, Zhenyu Shao, Xiaodan Zhang, Jun Zhang, Rui Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore Chengdu611731 China National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China School of Electronic and Information Engineering Beihang University Beijing100191 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada State Key Laboratory of CNS/ATM MIIT Key Laboratory of Complex-field Intelligent Sensing Beijing Institute of Technology Beijing100081 China School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Guangdong Shenzhen518172 China
Movable antenna (MA) has been recognized as a promising technology to enhance the performance of wireless communication and sensing by enabling antenna movement. Such a significant paradigm shift from conventional fix... 详细信息
来源: 评论
Abnormal Traffic Detection Method Based on DCNN-GRU Architecture in SDN
收藏 引用
International Journal of Intelligent Systems 2025年 第1期2025卷
作者: Xueyuan Duan Kun Wang Yu Fu Taotao Liu Yihan Yu Jianqiao Xu Lu Wang College of Computer and Information Technology Xinyang Normal University Xinyang 464000 Henan China *** Department of Information Security Naval University of Engineering Wuhan 430033 Hubei China *** Henan Key Laboratory of Analysis and Applications of Education Big Data Xinyang Normal University Xinyang 464000 China *** School of Information and Communication Engineering Xinyang Vocational and Technical College Xinyang 464000 Henan China *** Department of Operational Research and Programming Naval University of Engineering Wuhan 430033 China *** Department of Economic Crime Investigation Henan Police College Zhengzhou 450046 Henan China
In response to the centralized single-architecture abnormal traffic detection method in Software Defined Network (SDN), which consumes massive computational and network resources, and may lead to the decline of servic...
来源: 评论
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
收藏 引用
Internet of Things (Netherlands) 2023年 22卷
作者: Zahoor, Amina Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Ayub, Muhammad Faizan Conti, Mauro Das, Ashok Kumar Department of Computer Science COMSATS University Islamabad Sahiwal Campus 57000 Pakistan Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Sahiwal 57000 Pakistan Department of Mathematics University of Padua Padua 35131 Italy Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India
IoT-enabled Smart Grid (IoT-SG) is an emerging paradigm that enables the bi-direction communication of IoT devices and hardware to efficiently collect and transmit the consumer's information over the Internet. How... 详细信息
来源: 评论
Towards making deep learning-based vulnerability detectors robust
arXiv
收藏 引用
arXiv 2021年
作者: Li, Zhen Tang, Jing Zou, Deqing Chen, Qian Xu, Shouhuai Zhang, Chao Li, Yichen Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The University of Texas at San Antonio San AntonioTX78249 United States The University of Colorado Colorado Springs Colorado SpringsCO80918 United States Tsinghua University Beijing100084 China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Automatically detecting software vulnerabilities in source code is an important problem that has attracted much attention. In particular, deep learning-based vulnerability detectors, or DL-based detectors, are attract... 详细信息
来源: 评论
Dual consistent constraint via disentangled consistency and complementarity for multi-view clustering
收藏 引用
Neurocomputing 2025年 641卷
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论
Dual Consistent Constraint via Disentangled Consistency and Complementarity for Multi-view Clustering
arXiv
收藏 引用
arXiv 2025年
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论