咨询与建议

限定检索结果

文献类型

  • 224 篇 期刊文献
  • 182 篇 会议

馆藏范围

  • 406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 190 篇 计算机科学与技术...
    • 154 篇 软件工程
    • 56 篇 信息与通信工程
    • 34 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 机械工程
    • 15 篇 网络空间安全
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 土木工程
  • 108 篇 理学
    • 57 篇 数学
    • 37 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 13 篇 化学
    • 6 篇 系统科学
  • 52 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 17 篇 法学
    • 12 篇 社会学
    • 5 篇 法学
  • 14 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 18 篇 semantics
  • 18 篇 privacy
  • 14 篇 feature extracti...
  • 12 篇 machine learning
  • 12 篇 security
  • 11 篇 deep learning
  • 11 篇 computational mo...
  • 10 篇 federated learni...
  • 10 篇 training
  • 9 篇 deep neural netw...
  • 9 篇 authentication
  • 8 篇 open source soft...
  • 7 篇 data privacy
  • 7 篇 network security
  • 6 篇 scalability
  • 6 篇 codes
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 object detection
  • 5 篇 prototypes

机构

  • 69 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 51 篇 school of comput...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 31 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 26 篇 school of cyber ...
  • 24 篇 hubei engineerin...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 18 篇 the hubei engine...
  • 16 篇 huazhong univers...
  • 15 篇 shenzhen huazhon...
  • 14 篇 huazhong univers...
  • 13 篇 jinyinhu laborat...
  • 13 篇 state key labora...
  • 12 篇 national enginee...
  • 10 篇 nanyang technolo...

作者

  • 49 篇 zhou pan
  • 39 篇 jin hai
  • 36 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 16 篇 deqing zou
  • 16 篇 zhou ziqi
  • 16 篇 li minghui
  • 15 篇 zou deqing
  • 12 篇 wan wei
  • 12 篇 wang haoyu
  • 12 篇 fang xiang
  • 11 篇 pan zhou
  • 11 篇 xu zichuan
  • 10 篇 jingqiang lin
  • 10 篇 shengshan hu
  • 10 篇 qu xiaoye
  • 9 篇 lu songfeng
  • 9 篇 zhang rui

语言

  • 371 篇 英文
  • 33 篇 其他
  • 2 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Hubei Engineering Research Center on Big Data Security School of cyber science and Engineering"
406 条 记 录,以下是1-10 订阅
排序:
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 498-508页
作者: Zhenkun Jin Yixuan Geng Chenlu Zhu Yunzhi Xia Xianjun Deng Lingzhi Yi Xianlan Wang Wuhan Business University 430056China Wuhan Research Institute of Post and Telecommunication Wuhan430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecuritySchool of Cyber Science and EngineeringHuazhong University of Science and TechnologyWuhan430074China Hubei Chutian Expressway Digital Technology Co.Ltd Wuhan430074China School of Information and Safety Engineering Zhongnan University of Economics and LawWuhan430073China
Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited *** energy harvesting WSN is a novel network ar... 详细信息
来源: 评论
UARC:Unsupervised Anomalous Traffic Detection with Improved U-Shaped Autoencoder and RetNet Based Multi-clustering  26th
UARC:Unsupervised Anomalous Traffic Detection with Improved ...
收藏 引用
26th International Conference on Information and Communications security, ICICS 2024
作者: Xie, Yunyang Chen, Kai Li, Shenghui Li, Bingqian Zhang, Ning Hubei Key Laboratory of Distributed System Security Hubei Engin eering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University Technology Wuhan430074 China
With the ongoing advancement of deep learning, modern network intrusion detection systems increasingly favor utilizing deep learning networks to improve their ability to learn traffic characteristics. To address the c... 详细信息
来源: 评论
Efficient and Verifiable Multi-server Framework for Secure Information Classification and Storage  20th
Efficient and Verifiable Multi-server Framework for Secure...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Guo, Ziqing Wang, Yaohui Jin, Xuanyu Wang, Xiuhua He, Yuanyuan Dai, Yueyue Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
With the rapid development of digital technology, the complexity and diversity of data sources present significant security and privacy challenges. To address these issues, this paper proposes an efficient and verifia... 详细信息
来源: 评论
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography  21
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Liao, Wei Han, Lansheng Chen, Peng Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r... 详细信息
来源: 评论
Hash Function Based on Quantum Walks with Two-Step Memory
Hash Function Based on Quantum Walks with Two-Step Memory
收藏 引用
2024 International Conference on Computing, Machine Learning and data science, CMLDS 2024
作者: Zhou, Qing Lu, Songfeng Yang, Hao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Guangdong Shenzhen China
We propose a new quantum-walk-based hash function QHF2M by combining two types of quantum walks with two-step memory and numerically test its statistical performance. The test result shows that QHF2M is on a par with ... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
Tracking Objects and Activities with Attention for Temporal Sentence Grounding  48
Tracking Objects and Activities with Attention for Temporal ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Xiong, Zeyu Liu, Daizong Zhou, Pan Zhu, Jiahao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Peking University Wangxuan Institute of Computer Technology China
Temporal sentence grounding (TSG) aims to localize the temporal segment which is semantically aligned with a natural language query in an untrimmed video. Most existing methods extract frame-grained features or object... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论