咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 151 篇 期刊文献

馆藏范围

  • 315 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 197 篇 工学
    • 99 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 78 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 29 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 14 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 6 篇 水利工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
  • 99 篇 理学
    • 53 篇 物理学
    • 39 篇 数学
    • 14 篇 生物学
    • 12 篇 化学
    • 9 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 robustness
  • 6 篇 signal processin...
  • 6 篇 federated learni...
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 5 篇 privacy
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...
  • 4 篇 data models

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 14 篇 department of ph...
  • 14 篇 huazhong univers...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 zhang leo yu
  • 14 篇 yang yang
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 9 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian
  • 8 篇 wang xianlong

语言

  • 294 篇 英文
  • 18 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
315 条 记 录,以下是11-20 订阅
排序:
Five-dimensional Floquet topological semimetals with emergent Yang monopoles and linked Weyl surfaces
收藏 引用
Physical Review B 2025年 第4期111卷 045302-045302页
作者: Zheng-Rong Liu Rui Chen Bin Zhou Department of Physics Hubei University Wuhan 430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan 430062 China
Recently, Floquet topological matter has attracted significant attention for its potential to reveal novel topological phases inaccessible in static systems. In this paper, we investigate the effect of a time-periodic... 详细信息
来源: 评论
Circular Power Balancing Topology and Power Flow Optimization Strategy for Solving PV Power Mismatch Problem of Modular MVDC Converters
收藏 引用
IEEE Transactions on Power Electronics 2025年 第7期40卷 9933-9943页
作者: Zhuang, Yizhan Liu, Fei Zhu, Hongxi Diao, Xiaoguang Zhang, Yiming Sun, Yuan Fuzhou University School of Electrical Engineering and Automation Fuzhou350108 China Wuhan University Hubei Key Laboratory of Power Equipment & System Security for Integrated Energy School of Electrical Engineering and Automation Wuhan430072 China Minjiang University College of Physics and Electronic Information Engineering Fuzhou350108 China
Power balancing topology is an effective solution to the photovoltaic power mismatch problem in a medium voltage dc system. However, the existing power balancing topologies are all based on a chain structure, in which... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Yuan, Zenghui Shi, Jiawen Zhou, Pan Gong, Neil Zhenqiang Sun, Lichao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China Duke University United States Lehigh University United States
Multi-modal large language models (MLLMs) extend large language models (LLMs) to process multi-modal information, enabling them to generate responses to image-text inputs. MLLMs have been incorporated into diverse mul...
来源: 评论
The Regular Ricci-Inverse Cosmology with Multiple Anticurvature Scalars
arXiv
收藏 引用
arXiv 2025年
作者: Mou, Yicen School of Physics Hubei University Hubei Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education China
We investigate the modified gravity in which the Lagrangian of gravity is a function of the trace of the n-th matrix power of Ricci tensor in a Friedmann–Lemaître–Robertson–Walker(FLRW) spacetime. When n is ne... 详细信息
来源: 评论
Privacy Law Enforcement Under Centralized Governance: A Qualitative Analysis of Four Years’ Special Privacy Rectification Campaigns
arXiv
收藏 引用
arXiv 2025年
作者: Jing, Tao Li, Yao Ye, Jingzhou Wang, Jie Wang, Xueqiang School of Cyber Science and Engineering Huazhong University of Science and Technology China JinYinHu Laboratory China University of Central Florida United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
In recent years, major privacy laws like the GDPR have brought about positive changes. However, challenges remain in enforcing the laws, particularly due to under-resourced regulators facing a large number of potentia... 详细信息
来源: 评论
COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control systems
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Zhaonan Zhao, Yanjie Wei, Chen Wan, Zirui Liu, Yue Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Monash University Melbourne Australia Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Version control systems are commonly used to manage open-source software, in which each commit may introduce new vulnerabilities or fix existing ones. Researchers have developed various tools for detecting vulnerabili... 详细信息
来源: 评论
Fast resistivity imaging of transient electromagnetic using an extreme learning machine
收藏 引用
Soft Computing 2025年 第2期29卷 1121-1131页
作者: Li, Ruiyou Zhang, Yong Li, Guang Li, Ruiheng Hu, Jia Li, Min School of Software and Internet of Things Engineering Jiangxi University of Finance and Economics NanChang330013 China School of Geophysics and Measurement Control Technology East China University of Technology NanChang330013 China School of Information Engineering Hubei University of Economics Wuhan430205 China The State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing400044 China
The transient electromagnetic method (TEM) is widely used in geophysical exploration. In TEM data interpretation, nonlinear inversion plays an important role. However, traditional TEM nonlinear inversion adopts the OC... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Query recovery from easy to hard: jigsaw attack against SSE  24
Query recovery from easy to hard: jigsaw attack against SSE
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Hao Nie Wei Wang Peng Xu Xianglong Zhang Laurence T. Yang Kaitai Liang Huazhong University of Science and Technology Huazhong University of Science and Technology and Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering and JinYinHu Laboratory and State Key Laboratory of Cryptology Huazhong University of Science and Technology and St. Francis Xavier University Delft University of Technology
Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge rela...
来源: 评论