咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 156 篇 期刊文献

馆藏范围

  • 320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 100 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 80 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 30 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 15 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 6 篇 水利工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
  • 102 篇 理学
    • 54 篇 物理学
    • 39 篇 数学
    • 14 篇 生物学
    • 13 篇 化学
    • 9 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...
  • 4 篇 data models

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 14 篇 department of ph...
  • 14 篇 huazhong univers...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 9 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian
  • 8 篇 wang xianlong

语言

  • 299 篇 英文
  • 18 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
320 条 记 录,以下是211-220 订阅
排序:
F-P Ultrasonic Sensor Based on Three-Beam Support Cantilever Structure
F-P Ultrasonic Sensor Based on Three-Beam Support Cantilever...
收藏 引用
Advanced Electrical Equipment and Reliable Operation (AEERO), International Conference on
作者: Kejie Wu Weigen Chen Zhixian Zhang Yuxuan Song Fan Liu Tianhe Yang State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing China State Grid Hubei Electric Power Research Institute Wuhan Hubei China
Based on the principle of F-P (Fabry-Perot) interference, this paper designs a three-beam support cantilever optical fiber F-P sensor. Three beam support cantilever structure improves the sensitivity of detecting GIS ... 详细信息
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Reliability Analysis of Multi-Terminal VSC-HVDC Based on Semi-Markov Process
Reliability Analysis of Multi-Terminal VSC-HVDC Based on Sem...
收藏 引用
Power Electronics and Application Symposium (PEAS), IEEE International
作者: Kang Li Meng Huang Xiaoming Zha Hubei Key Laboratory of Power Equipment & System Security for Integrated Energy of School (of Wuhan University) School of Electrical Engineering and Automation (of Wuhan University) Wuhan China
Reliability analysis of VSC- HVDC is the premise of safe and stable operation of power system. Firstly, based on the analysis of MMC structure, an MMC reliability model considering subcomponent fault parameters was co...
来源: 评论
Poisoned LangChain: Jailbreak LLMs by LangChain
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Ziqiu Liu, Jun Zhang, Shengkai Yang, Yang Wuhan University of Technology Wuhan China Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Hubei University Wuhan China
With the development of Natural Language Processing (NLP), Large Language Models (LLMs) are becoming increasingly popular. LLMs are integrating more into everyday life, raising public concerns about their security vul... 详细信息
来源: 评论
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Feng Li, Shaofei Jiang, Peng Li, Ding Wang, Haoyu Huang, Liangyi Xiao, Xusheng Chen, Jiedong Luo, Xiapu Guo, Yao Chen, Xiangqun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science Peking University China Arizona State University United States Sangfor Technologies Inc. China The Hong Kong Polytechnic University Hong Kong
Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial for future APT defenses. Despite the fact that numerous new techniques to improve P-EDR systems have been proposed in academia, it is...
来源: 评论
NODLINK: An Online system for Fine-Grained APT Attack Detection and Investigation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Shaofei Dong, Feng Xiao, Xusheng Wang, Haoyu Shao, Fei Chen, Jiedong Guo, Yao Chen, Xiangqun Li, Ding School of Computer Science Peking University China Arizona State University United States Case Western Reserve University United States Sangfor Technologies Inc. China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios... 详细信息
来源: 评论
Study on Improvement of Receiving Grid DC transmission feeding location Selection Method Using Principal Component Analysis  7
Study on Improvement of Receiving Grid DC transmission feedi...
收藏 引用
7th IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2024
作者: Zhong, Qidi Ma, Yulong Wang, Shuai Shi, Lei Bai, Siyou Li, Zihan Peng, Xiaotao State Grid Economic and Technological Research Institute Beijing China State Grid Ningxia Electric Power Company Yichuan China Wuhan University Hubei Key Laboratory of Power Equipment & System Security for Integrated Energy School of Electrical Engineering and Automation Wuhan China Wuhan University School of Electrical Engineering and Automation Wuhan China
Multiple DC transmission feeding in receiving power grid brings huge risk to the stable operation of the power grid. It is of great significance to plan the DC feeding point economically and reasonably under the premi... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论