咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 161 篇 期刊文献

馆藏范围

  • 325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 205 篇 工学
    • 106 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 83 篇 电气工程
    • 48 篇 电子科学与技术(可...
    • 31 篇 信息与通信工程
    • 29 篇 控制科学与工程
    • 24 篇 机械工程
    • 18 篇 动力工程及工程热...
    • 17 篇 材料科学与工程(可...
    • 13 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 8 篇 网络空间安全
    • 7 篇 安全科学与工程
    • 5 篇 光学工程
    • 5 篇 水利工程
  • 99 篇 理学
    • 54 篇 物理学
    • 40 篇 数学
    • 13 篇 生物学
    • 11 篇 化学
    • 10 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 15 篇 huazhong univers...
  • 14 篇 department of ph...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 10 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 yang laurence t.
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian

语言

  • 299 篇 英文
  • 21 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
325 条 记 录,以下是261-270 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Ranking on Heterogeneous Manifold for Multimodal Information Retrieval
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhenkun Jin Xingshi Wan Xin Nie Xinlei Zhou Yuanyuan Yi Gefei Zhou Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China School of Journalism and Information Communication Huazhong University of Science and Technology Wuhan China School of Computer Science & Technology Huazhong University of Science and Technology Wuhan China
In light of recent advancements in Internet of Multimedia Things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS...
来源: 评论
Secure and Privacy-preserving Data-sharing Framework based on Blockchain Technology for Al-Najaf/Iraq Oil Refinery  19
Secure and Privacy-preserving Data-sharing Framework based o...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Umran, Samir M. Lu, SongFeng Abduljabbar, Zaid Ameen Lu, Zhi Feng, Bingyan Zheng, Lu Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Iraqi Cement State Company Ministry of Industry and Minerals Baghdad10011 Iraq Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China University of Basrah College of Education for Pure Sciences Iraq Al-Kunooze University College Technical Computer Engineering Department Basrah Iraq Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Industrial Internet Research Institute Wuhan Huazhong Numerical Control Co. Ltd Wuhan430074 China South-Central University for Nationalities College of Computer Science Wuhan430074 China
The Industrial Internet of Things or Industry 4.0 efficiently enhances the manufacturing process in terms of raising productivity, system performance, cost reduction, and building large-scale systems. It enables the c... 详细信息
来源: 评论
FedCSA: Boosting the Convergence Speed of Federated Unlearning under Data Heterogeneity
FedCSA: Boosting the Convergence Speed of Federated Unlearni...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhen Wang Daniyal M Alghazzawi Li Cheng Gaoyang Liu Chen Wang Zeng Cheng Yang Yang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China King Abdulaziz University Jeddah Saudi Arabia Huazhong University of Science and Technology Wuhan China
The exponential growth of the Internet and the widespread availability of personal data have raised significant concerns regarding personal privacy and societal security. In response, the “right to be forgotten” has...
来源: 评论
Anomalous Hall effects in magnetic weak topological insulator films
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Rui Yi, Xiao-Xia Zhou, Bin Xu, Dong-Hui Department of Physics Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan430062 China Department of Physics Chongqing Key Laboratory for Strongly Coupled Physics Chongqing University Chongqing400044 China Center of Quantum Materials and Devices Chongqing University Chongqing400044 China
The interplay between magnetism and strong topological insulator gives rise to distinct new topological phases and various intriguing phenomena, attracting significant attention in recent years. However, magnetic effe... 详细信息
来源: 评论
Simulation of Propagation Pattern of Partial Discharge's Ultrasonic Signal in Oil-Immersed Transformer
Simulation of Propagation Pattern of Partial Discharge's Ult...
收藏 引用
2021 International Conference on Advanced Electrical Equipment and Reliable Operation, AEERO 2021
作者: Qian, Guochao Peng, Qingjun Wang, Zhongchang Zou, Yuepei Lei, Jiali Zhang, Zhixian Wu, Kejie Song, Yuxuan Electric Power Research Institute of Yunnan Power Grid Corporation Yunnan Kunming China Three Gorges Water Conservancy Project Cascade Dispatching Communication Center Hubei Yichang China Kunming Power Supply Bureau of Yunnan Power Grid Co. Ltd Yunnan Kunming China Chongqing University State Key Laboratory of Power Transmission Equipment System Security and New Technology Chongqing China
The breakdown of insulation caused by partial discharge inside the transformer is an important cause of transformer failure. Ultrasonic detection is a common method for detecting and positioning partial discharge in t... 详细信息
来源: 评论