咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 156 篇 期刊文献

馆藏范围

  • 320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 100 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 80 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 30 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 15 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 6 篇 水利工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
  • 102 篇 理学
    • 54 篇 物理学
    • 39 篇 数学
    • 14 篇 生物学
    • 13 篇 化学
    • 9 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...
  • 4 篇 data models

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 14 篇 department of ph...
  • 14 篇 huazhong univers...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 9 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian
  • 8 篇 wang xianlong

语言

  • 299 篇 英文
  • 18 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
320 条 记 录,以下是151-160 订阅
排序:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Jian Wang, Shenao Zhao, Yanjie Hou, Xinyi Wang, Kailong Gao, Peiming Zhang, Yuanchao Wei, Chen Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
The proliferation of pre-trained models (PTMs) and datasets has led to the emergence of centralized model hubs like Hugging Face, which facilitate collaborative development and reuse. However, recent security reports ... 详细信息
来源: 评论
Study on Modelling and Its Parameter Identification Method of Doubly-Fed Wind Turbines LVRT Based on Measured Power Response Curves  12
Study on Modelling and Its Parameter Identification Method o...
收藏 引用
12th International Conference on Renewable Power Generation, RPG 2023
作者: Jia, Lingjie Peng, Xiaotao He, Jing Li, Shaolin Miao, Fenglin Hubei Key Laboratory of Power Equipment & System Security for Integrated Energy School of Electrical Engineering and Automation Wuhan University China School of Electrical Engineering and Automation Wuhan University China China Electric Power Research Institute Beijing China
With the increasingly prominent energy and environmental problems, wind power generation with its advantages of clean, flexible, sustainable and other advantages in the grid account for an increasing *** is important ... 详细信息
来源: 评论
Real-time stealth transmission via dither-based bias control
Real-time stealth transmission via dither-based bias control
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Yuanxiang Wang Weidong Shao Linsheng Zhong Xiaoxiao Dai Qi Yang Lei Deng Deming Liu Mengfan Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan China
We report a real-time 1 kbps stealthy transmission in the 10 Gbps QPSK public communication. The stealth data is embedded in dither signals of bias control. The scheme is compatible with existing optical transmission ... 详细信息
来源: 评论
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Xinyi Wei, Chen Wang, Shenao Zhao, Yanjie Gao, Peiming Zhang, Yuanchao Wang, Kailong Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China Wuhan Jinyinhu Laboratory China
The exponential growth of open-source package ecosystems, particularly NPM and PyPI, has led to an alarming increase in software supply chain poisoning attacks. Existing static analysis methods struggle with high fals... 详细信息
来源: 评论
Research and application of artificial intelligence based webshell detection model: A literature review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Mingrui Han, Lansheng Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Key Laboratory of Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
Webshell, as the"culprit" behind numerous network attacks, is one of the research hotspots in the field of cybersecurity. However, the complexity, stealthiness, and confusing nature of webshells pose signifi... 详细信息
来源: 评论
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem  23
A Large-Scale Empirical Study on Semantic Versioning in Gola...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering
作者: Wenke Li Feng Wu Cai Fu Fan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China AND Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Platform and Content Group Tencent Technology (Shenzhen) Co.Ltd Shenzhen China
Third-party libraries (TPLs) have become an essential component of software, accelerating development and reducing maintenance costs. However, breaking changes often occur during the upgrades of TPLs and prevent clien... 详细信息
来源: 评论
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem
A Large-Scale Empirical Study on Semantic Versioning in Gola...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Wenke Li Feng Wu Cai Fu Fan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Platform and Content Group Tencent Technology (Shenzhen) Co.Ltd Shenzhen China
Third-party libraries (TPLs) have become an essential component of software, accelerating development and reducing maintenance costs. However, breaking changes often occur during the upgrades of TPLs and prevent clien...
来源: 评论
Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring  21
Partial Deep Domain Adaptation for Non-Intrusive Load Monito...
收藏 引用
21st IEEE International Symposium on Parallel and distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Li, Yuying Yang, Yang Wang, Chen Liu, Runqin Jiang, Hongbo Liu, Wenping Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Wuhan China Huazhong University of Science and Technology Wuhan China China Unicom Central South Research Institute Changsha China Hunan University Changsha China Hubei University of Economics Wuhan China
With the widespread deployment of smart meters and the burgeoning integration of the Ubiquitous Power Internet of Things (UPIoT), Non-Intrusive Load Monitoring (NILM) has emerged as an essential technology, providing ... 详细信息
来源: 评论
Enhancing the MILP/MIQCP-based Automatic Search for Differential-Linear Distinguishers of Simon-Like Ciphers
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Siwei Xiang, Zejun Zeng, Xiangyong Qin, Guangxue School of Cyber Science and Technology Key Laboratory of Intelligent Sensing System and Security Hubei University Wuhan China Faculty of Mathematics and Statistics Hubei Key Laboratory of Applied Mathematics Hubei University Wuhan China
In this paper, we propose an improved method based on Mixed-Integer Linear Programming/Mixed-Integer Quadratic Constraint Programming (MILP/MIQCP) to automatically find better differential-linear (DL) distinguishers f... 详细信息
来源: 评论
MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics Against Static Malware Detection
MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactic...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Shuai He Cai Fu Hong Hu Jiahe Chen Jianqiang Lv Shuai Jiang School of Cyber Science and Engineering Huazhong Science and technology University China Hubei Key Laboratory of Distributed System Security Huazhong Science and technology University China Pennsylvania State University United States
Recent methods have demonstrated that machine learning (ML) based static malware detection models are vulnerable to adversarial attacks. However, the generated malware often fails to generalize to production-level ant... 详细信息
来源: 评论