咨询与建议

限定检索结果

文献类型

  • 166 篇 会议
  • 165 篇 期刊文献

馆藏范围

  • 331 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 211 篇 工学
    • 111 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 86 篇 电气工程
    • 48 篇 电子科学与技术(可...
    • 34 篇 信息与通信工程
    • 30 篇 控制科学与工程
    • 25 篇 机械工程
    • 18 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 14 篇 化学工程与技术
    • 13 篇 仪器科学与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 9 篇 网络空间安全
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 8 篇 安全科学与工程
    • 7 篇 光学工程
    • 5 篇 水利工程
  • 102 篇 理学
    • 55 篇 物理学
    • 42 篇 数学
    • 13 篇 生物学
    • 12 篇 化学
    • 10 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...

机构

  • 58 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 15 篇 huazhong univers...
  • 14 篇 department of ph...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 10 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 yang laurence t.
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian

语言

  • 303 篇 英文
  • 23 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
331 条 记 录,以下是231-240 订阅
排序:
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
A neighborhood union condition for the existence of a spanning tree without degree 2 vertices
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yibo Dong, Fengming Hu, Xiaolan Liu, Huiqing Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education China National Institute of Education Nanyang Technological University Singapore School of Mathematics and Statistics Hubei Key Laboratory of Mathematical Sciences Central China Normal University Wuhan430079 China
For a connected graph G, a spanning tree T of G is called a homeomorphically irreducible spanning tree (HIST) if T has no vertices of degree 2. In this paper, we show that if G is a graph of order n ≥ 270 and |N(u) ...
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
GENERATING IS BELIEVING: MEMBERSHIP INFERENCE ATTACKS AGAINST RETRIEVAL-AUGMENTED GENERATION
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yuying Liu, Gaoyang Wang, Chen Yang, Yang Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
Retrieval-Augmented Generation (RAG) is a state-of-the-art technique that mitigates issues such as hallucinations and knowledge staleness in Large Language Models (LLMs) by retrieving relevant knowledge from an extern... 详细信息
来源: 评论
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optimization in Intelligent Transportation IoT
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optim...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Lingzhi Yi Bin Luo Chenlu Zhu Xianjun Deng Yunzhi Xia Hengshan Wu School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China School of Civil Engineering University of South China Hengyang China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Chutian Expressway Digital Technology Co. Ltd Wuhan China
The integration of Internet of Things (IoT)-based highway bridge structural health monitoring (HBSHM) and intelligent transportation systems (ITS) plays an essential role in detecting damage for large and complex brid...
来源: 评论