咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 156 篇 期刊文献

馆藏范围

  • 320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 100 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 80 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 30 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 15 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 6 篇 水利工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
  • 102 篇 理学
    • 54 篇 物理学
    • 39 篇 数学
    • 14 篇 生物学
    • 13 篇 化学
    • 9 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...
  • 4 篇 data models

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 14 篇 department of ph...
  • 14 篇 huazhong univers...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 9 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian
  • 8 篇 wang xianlong

语言

  • 299 篇 英文
  • 18 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
320 条 记 录,以下是101-110 订阅
排序:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
MalWuKong: Towards Fast, Accurate, and Multilingual Detectio...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Ningke Li Shenao Wang Mingxi Feng Kailong Wang Meizhen Wang Haoyu Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
In the face of increased threats within software registries and management systems, we address the critical need for effective malicious code detection. In this paper, we propose an innovative approach that integrates...
来源: 评论
Large Language Model Supply Chain: A Research Agenda
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Shenao Zhao, Yanjie Hou, Xinyi Wang, Haoyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
The rapid advancement of large language models (LLMs) has revolutionized artificial intelligence, introducing unprecedented capabilities in natural language processing and multimodal content generation. However, the i... 详细信息
来源: 评论
WaDec: Decompiling WebAssembly Using Large Language Model
arXiv
收藏 引用
arXiv 2024年
作者: She, Xinyu Zhao, Yanjie Wang, Haoyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
WebAssembly (abbreviated Wasm) has emerged as a cornerstone of web development, offering a compact binary format that allows high-performance applications to run at near-native speeds in web browsers. Despite its adva... 详细信息
来源: 评论
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Wei Liao Lansheng Han Peng Chen Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r...
来源: 评论
AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring
AutoSlicer: Automatic Program Partitioning for Securing Sens...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Weizhong Qiang Hao Luo Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Legacy programs are normally monolithic (that is, all code runs in a single process and is not partitioned), and a bug in a program may result in the entire program being vulnerable and therefore untrusted. Program pa... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
SMPC Task Decomposition: A Theory for Accelerating Secure Multi-party Computation Task
arXiv
收藏 引用
arXiv 2023年
作者: Feng, Yuanqing Bai, Tao Lu, Songfeng Tang, Xueming Wu, Junjun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Today, we are in the era of big data, and data are becoming more and more important, especially private data. Secure Multi-party Computation (SMPC) technology enables parties to perform computing tasks without reveali... 详细信息
来源: 评论
Quantum-inspired Hash Function Based on Parity-dependent Quantum Walks with Memory
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Qing Tang, Xueming Lu, Songfeng Yang, Hao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
In this paper, we develop a generic controlled alternate quantum walk model (called CQWM-P) by combining parity-dependent quantum walks with distinct arbitrary memory lengths and then construct a quantum-inspired hash... 详细信息
来源: 评论
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification
arXiv
收藏 引用
arXiv 2024年
作者: Qin, Zeqing Wu, Yiwei Han, Lansheng School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China
Large Language Models (LLMs) have shown great promise in vulnerability identification. As C/C++ comprises half of the Open-Source Software (OSS) vulnerabilities over the past decade and updates in OSS mainly occur thr... 详细信息
来源: 评论
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optimization in Intelligent Transportation IoT  19
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optim...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Yi, Lingzhi Luo, Bin Zhu, Chenlu Deng, Xianjun Xia, Yunzhi Wu, Hengshan Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China University of South China School of Civil Engineering Hengyang421001 China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Hubei Chutian Expressway Digital Technology Co. Ltd Wuhan430074 China
The integration of Internet of Things (IoT)-based highway bridge structural health monitoring (HBSHM) and intelligent transportation systems (ITS) plays an essential role in detecting damage for large and complex brid... 详细信息
来源: 评论