咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 157 篇 期刊文献

馆藏范围

  • 321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 100 篇 计算机科学与技术...
    • 87 篇 软件工程
    • 80 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 29 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 15 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 6 篇 水利工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
  • 102 篇 理学
    • 55 篇 物理学
    • 39 篇 数学
    • 14 篇 生物学
    • 13 篇 化学
    • 9 篇 统计学(可授理学、...
    • 4 篇 地质学
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...
  • 4 篇 data models

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 14 篇 department of ph...
  • 14 篇 huazhong univers...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 9 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian
  • 8 篇 wang xianlong

语言

  • 300 篇 英文
  • 18 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
321 条 记 录,以下是191-200 订阅
排序:
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论
An Intelligent Recognition Algorithm for Urban Utility Tunnel Surface Intrusion via Spatio-temporal-spectral Joint Information Extraction with FPN Network
An Intelligent Recognition Algorithm for Urban Utility Tunne...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Tao He Zhijun Yan Shixiong Zhang Deming Liu Hao Li Qizhen Sun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan P. R. China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan P. R. China
An intelligent recognition algorithm for utility tunnel surface intrusion based on spatio-temporal-spectral joint information extraction with FPN network is proposed. Finally, the average recognition accuracy of 93.8%... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
Threshold Signature Scheme Based on Non-internative Diffie-Hellman Signature
Threshold Signature Scheme Based on Non-internative Diffie-H...
收藏 引用
International Conference on Networking and distributed Computing (ICNDC)
作者: Xiuqun Wang Lican Huang Key Laboratory of Information System Security Ministry of Education Tsinghua University Beijing China Institute of Network and Distributed Computing Zhejiang Science and Technology University Hangzhou China
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the... 详细信息
来源: 评论
A Novel Path Planning Algorithm for Multi-Agent Collaboration in Finite Space
A Novel Path Planning Algorithm for Multi-Agent Collaboratio...
收藏 引用
IEEE International Conference on Communication and Information systems (ICCIS)
作者: Yihan Xu Tian Cao Xiaotong Shi Manchester Metropolitan Joint Institute Hubei University Wuhan China Ministry of Education Key Laboratory of Intelligent Sensing System and Security (Hubei University) School of Artificial Intelligence HuBei University Wuhan China
Multi-agent collaboration can complete tasks that are difficult for a single agent to handle, making a big difference on the battlefield, in healthcare, and in other domains. Effective path planning is an important fa... 详细信息
来源: 评论
High recovery with fewer injections: practical binary volumetric injection attacks against dynamic searchable encryption  23
High recovery with fewer injections: practical binary volume...
收藏 引用
Proceedings of the 32nd USENIX Conference on security Symposium
作者: Xianglong Zhang Wei Wang Peng Xu Laurence T. Yang Kaitai Liang Huazhong University of Science and Technology Huazhong University of Science and Technology and Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology and St. Francis Xavier University Delft University of Technology
Searchable symmetric encryption enables private queries over an encrypted database, but it can also result in information leakages. Adversaries can exploit these leakages to launch injection attacks (Zhang et al., USE...
来源: 评论
SYNERGISTIC CONTROL-BASED CONTROL STRATEGY FOR OPTIMIZING THE COORDINATED INERTIA SUPPORT OF WIND FARMS TO THE RECEIVING GRID VIA VSC-HVDC  12
SYNERGISTIC CONTROL-BASED CONTROL STRATEGY FOR OPTIMIZING TH...
收藏 引用
12th International Conference on Renewable Power Generation, RPG 2023
作者: Tan, Junmi Peng, Xiaotao Wang, Xiaoli Li, Xutao Yang, Jun Hubei Key Laboratory of Power Equipment & System Security for Integrated Energy School of Electrical Engineering and Automation Wuhan University Wuhan430073 China School of Electrical Engineering and Automation Wuhan University Wuhan430072 China State Grid Ningxia Electric Power Research Institute Yinchuan750001 China
In order to solve the problem of inertia reduction of the receiving power grid caused by feeding new energy source, an inertia coordination control optimization strategy for wind farm via VSC-HVDC based on cooperative... 详细信息
来源: 评论
Impedance Reconstruction Based Damping Control Strategy for Variable Speed Pumped Storage Unit  26
Impedance Reconstruction Based Damping Control Strategy for ...
收藏 引用
26th International Conference on Electrical Machines and systems, ICEMS 2023
作者: Chuang, Kaihsun Jin, Yifang Zhang, Yuanzhi Hu, Renzhi Luan, Yihang Sun, Jianjun Wuhan University School of Electrical Engineering and Automation Hubei Key Laboratory of Power Equipment and System Security for Integrated Energy Wuhan China State Grid Liaoning Electric Power Supply Co. State Grid Liaoning Electric Power Supply Co. Ltd Liaoning Liaoning China
The complicated interactions between multi-time scale control loops of grid side converter (GSC) and machine-side converter (MSC) inevitably caused system instability under weak-grid conditions. The main reasons for c... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论