咨询与建议

限定检索结果

文献类型

  • 346 篇 会议
  • 341 篇 期刊文献

馆藏范围

  • 687 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 303 篇 计算机科学与技术...
    • 253 篇 软件工程
    • 100 篇 信息与通信工程
    • 76 篇 电气工程
    • 60 篇 生物工程
    • 50 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 20 篇 安全科学与工程
    • 17 篇 网络空间安全
    • 16 篇 土木工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 建筑学
    • 12 篇 动力工程及工程热...
  • 195 篇 理学
    • 87 篇 数学
    • 74 篇 生物学
    • 42 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 29 篇 化学
    • 11 篇 系统科学
  • 95 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 18 篇 医学
    • 14 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 22 篇 deep learning
  • 21 篇 privacy
  • 17 篇 federated learni...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 training
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 contrastive lear...
  • 9 篇 measurement

机构

  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 48 篇 school of comput...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 24 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 19 篇 school of comput...
  • 18 篇 huazhong univers...
  • 18 篇 the hubei engine...
  • 17 篇 school of cyber ...
  • 15 篇 huazhong univers...

作者

  • 47 篇 zhou pan
  • 38 篇 jin hai
  • 33 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 13 篇 wang haoyu
  • 12 篇 wan wei
  • 12 篇 fang xiang
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 shengshan hu

语言

  • 624 篇 英文
  • 58 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
687 条 记 录,以下是541-550 订阅
排序:
A novel binary modified beluga whale optimization algorithm using ring crossover and probabilistic state mutation for enhanced bladder cancer diagnosis
收藏 引用
Informatics in Medicine Unlocked 2024年 50卷
作者: Gharaibeh, Hasan Alawad, Noor Aldeen Nasayreh, Ahmad Al Mamlook, Rabia Emhamed Makhadmeh, Sharif Naser Bashkami, Ayah Abualigah, Laith Ezugwu, Absalom E. Computer Science Department Faculty of Information Technology and Computer Sciences Yarmouk University Irbid 21163 Jordan Department of Business Administration Trine University IN United States Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libya Department of Information Technology King Abdullah II School of Information Technology The University of Jordan Amman 11942 Jordan Department Medical Laboratory Sciences – Faculty of Science Al Balqa Applied University Salt 19117 Jordan Department of Cyber Security and Cloud Computing Faculty of Information Technology Applied Science Private University Amman 11937 Jordan Artificial Intelligence and Sensing Technologies (AIST) Research Center University of Tabuk Tabuk 71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq 25113 Jordan MEU Research Unit Middle East University Amman 11831 Jordan Applied science research center Applied science private university Amman 11931 Jordan Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura 140401 India Unit for Data Science and Computing North-West University 11 Hofman Street Potchefstroom 2520 South Africa Artificial Intelligence Research Center (AIRC) College of Engineering and Information Technology Ajman University Ajman P.O. Box 346 United Arab Emirates
Bladder cancer (BC) remains a significant global health challenge, requiring the development of accurate predictive models for diagnosis. In this study, a new Binary Modified White Whale Optimization (B-MBWO) algorith... 详细信息
来源: 评论
Ensuring data Confidentiality with a Secure XTS-AES Design in Flash Translation Layer  5
Ensuring Data Confidentiality with a Secure XTS-AES Design i...
收藏 引用
5th IEEE International Conference on Cloud Computing and Big data Analytics, ICCCBDA 2020
作者: Zhang, Qionglu Jia, Shijie He, Junlin Zhao, Xinyi Xia, Luning Niu, Yingjiao Jing, Jiwu State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Beijing Certificate Authority Corporation Limited Beijing China
Nowadays sensitive data are commonly stored on personal mobile devices (e.g., laptops and smartphones) or public cloud storage platforms. data on these platforms are commonly protected with strong cryptography like fu... 详细信息
来源: 评论
Multi-Pair Temporal Sentence Grounding via Multi-Thread Knowledge Transfer Network
arXiv
收藏 引用
arXiv 2024年
作者: Fang, Xiang Fang, Wanlong Wang, Changshuo Liu, Daizong Tang, Keke Dong, Jianfeng Zhou, Pan Li, Beibei Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science of Technology Wuhan China Sichuan University China Nanyang Technological University Singapore Peking University China Guangzhou University China Zhejiang Gongshang University China
Given some video-query pairs with untrimmed videos and sentence queries, temporal sentence grounding (TSG) aims to locate query-relevant segments in these videos. Although previous respectable TSG methods have achieve... 详细信息
来源: 评论
Auction based clustered federated learning in mobile edge computing system
arXiv
收藏 引用
arXiv 2021年
作者: Lu, Renhao Zhang, Weizhe Li, Qiong Zhong, Xiaoxiong Vasilakos, Athanasios V. School of Computer Science and Technology Harbin Institute of Technology Harbin China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China School of Electrical and Data Engineering University of Technology Sydney Australia Department of Computer Science and Technology Fuzhou University Fuzhou350116 China Department of Computer Science Electrical and Space Engineering Lulea University of Technology Lulea97187 Sweden
In recent years, mobile clients’ computing ability and storage capacity have greatly improved, efficiently dealing with some applications locally. Federated learning is a promising distributed machine learning soluti... 详细信息
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
DAMIA: Leveraging domain adaptation as a defense against membership inference attacks
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Hongwei Luo, Weiqi Zeng, Guoqiang Weng, Jian Zhang, Yue Yang, Anjia College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China
Deep Learning (DL) techniques allow one to train a model from a dataset, and the model can be adopted to solve tasks. DL has attracted much interest given its fancy performance and potential market value, while securi... 详细信息
来源: 评论
Adaptive Fine-grained Access Control Method in Social Internet of Things
收藏 引用
International Journal of Network security 2021年 第1期23卷 42-48页
作者: Zhang, Hongbin Ma, Pengcheng Liu, Bin School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal China School of Economics and Management Hebei University of Science China Technology Research Center of Big Data and Social Computing Hebei University of Science China
Social Internet of Things (SloT), as a new carrier of integration of social and Internet of Things, applies the research results of social networks from different aspects of the Internet of Things. Different types of ... 详细信息
来源: 评论
An improved method of algal-bloom discrimination in Taihu Lake using Sentinel-1A data  6
An improved method of algal-bloom discrimination in Taihu La...
收藏 引用
6th Asia-Pacific Conference on Synthetic Aperture Radar, APSAR 2019
作者: Wu, Lin Sun, Mengwei Min, Lin Zhao, Jianhui Li, Ning Guo, Zhengwei College of Computer and Information Engineering Henan University Kaifeng475004 China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng475004 China Henan Engineering Research Center of Intelligent Technology and Application Kaifeng475004 China
The algal bloom is a prominent manifestation of water pollution. Synthetic aperture radar (SAR) shows an advantage in water monitoring due to its characteristic of all-time and all-weather. The water regions where alg... 详细信息
来源: 评论
µVulDeePecker: A deep learning-based system for multiclass vulnerability detection
arXiv
收藏 引用
arXiv 2020年
作者: Zou, Deqing Wang, Sujuan Xu, Shouhuai Li, Zhen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Texas at San Antonio San AntonioTX78249 United States
Fine-grained software vulnerability detection is an important and challenging problem. Ideally, a detection system (or detector) not only should be able to detect whether or not a program contains vulnerabilities, but... 详细信息
来源: 评论
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes
Extending Registration and Authentication Processes of FIDO2...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chengqian Guo Quanwei Cai Qiongxiao Wang Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering CAS Data Assurance and Communication Security Research Center CAS School of Cyber Security University of Chinese Academy of Sciences School of Cyber Security University of Science and Technology of China
FIDO2, the newest set of FIDO specifications, enables the user to leverage an external authenticator for the authentication in both mobile and desktop environments (referred to as user agent). For the secure registrat... 详细信息
来源: 评论