咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 157 篇 期刊文献

馆藏范围

  • 321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 100 篇 计算机科学与技术...
    • 87 篇 软件工程
    • 80 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 29 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 15 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 6 篇 水利工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
  • 102 篇 理学
    • 55 篇 物理学
    • 39 篇 数学
    • 14 篇 生物学
    • 13 篇 化学
    • 9 篇 统计学(可授理学、...
    • 4 篇 地质学
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...
  • 4 篇 data models

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 14 篇 department of ph...
  • 14 篇 huazhong univers...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 9 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian
  • 8 篇 wang xianlong

语言

  • 300 篇 英文
  • 18 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
321 条 记 录,以下是251-260 订阅
排序:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Few-Shot Camouflaged Object Segmentation
Few-Shot Camouflaged Object Segmentation
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Ziqiu Wang Yuying Li Yang Yang Yamin Li Gaoyang Liu Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In the domain of computer vision, Camouflaged Object Segmentation (COS) is a crucial task aimed at identifying objects that blend into their surroundings, with applications spanning diverse sectors such as military, m... 详细信息
来源: 评论
A Continuous Verification Mechanism for Clients in Federated Unlearning to Defend the Right to be Forgotten
A Continuous Verification Mechanism for Clients in Federated...
收藏 引用
International Symposium on Parallel and distributed Processing with Applications, ISPA
作者: Shanshan Chen Jun Liu Yuying Li Yamin Li Yang Yang Gaoyang Liu Chen Wang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In Federated Learning (FL), the regulatory need for the "right to be forgotten" requires efficient Federated Unlearning (FU) methods, which enable FL models to unlearn appointed training data. Associating wi... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论