咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 157 篇 期刊文献

馆藏范围

  • 321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 100 篇 计算机科学与技术...
    • 87 篇 软件工程
    • 80 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 29 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 15 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物工程
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 6 篇 水利工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
  • 102 篇 理学
    • 55 篇 物理学
    • 39 篇 数学
    • 14 篇 生物学
    • 13 篇 化学
    • 9 篇 统计学(可授理学、...
    • 4 篇 地质学
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 partial discharg...
  • 9 篇 semantics
  • 7 篇 feature extracti...
  • 7 篇 federated learni...
  • 7 篇 robustness
  • 6 篇 signal processin...
  • 6 篇 privacy
  • 6 篇 open source soft...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 sensitivity
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 insulation
  • 4 篇 speech processin...
  • 4 篇 codes
  • 4 篇 resonant frequen...
  • 4 篇 data models

机构

  • 57 篇 hubei key labora...
  • 48 篇 school of cyber ...
  • 38 篇 school of comput...
  • 29 篇 huazhong univers...
  • 29 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 15 篇 school of electr...
  • 14 篇 department of ph...
  • 14 篇 huazhong univers...
  • 14 篇 jinyinhu laborat...
  • 13 篇 hubei key labora...
  • 12 篇 state key labora...
  • 11 篇 key laboratory o...
  • 10 篇 state grid hubei...
  • 9 篇 shenzhen huazhon...

作者

  • 27 篇 jin hai
  • 19 篇 hu shengshan
  • 19 篇 hai jin
  • 17 篇 zhou pan
  • 15 篇 yang yang
  • 15 篇 zhang leo yu
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang haoyu
  • 9 篇 deng xianjun
  • 9 篇 xu peng
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 song yuxuan
  • 8 篇 zou deqing
  • 8 篇 zhao yanjie
  • 8 篇 wan wei
  • 8 篇 wu kejie
  • 8 篇 zhang zhixian
  • 8 篇 wang xianlong

语言

  • 300 篇 英文
  • 18 篇 其他
  • 3 篇 中文
检索条件"机构=Hubei Key Laboratory of Distributed System Security"
321 条 记 录,以下是301-310 订阅
排序:
k-TEVS: A k-Times E-Voting Scheme on Blockchain with Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年
作者: Liu, Yang He, Debiao Luo, Min Wang, Lianhai Peng, Cong The School of Cyber Science and Engineering Wuhan University Wuhan430072 China The Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen518172 China The School of Cyber Science and Engineering Wuhan University Wuhan China The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan250014 China The Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai200232 China The Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
Robust State Estimator Based on Hyperbolic Cosine Function
Robust State Estimator Based on Hyperbolic Cosine Function
收藏 引用
IEEE Power and Energy Society General Meeting
作者: Yanbo Chen Jin Ma Ji Zhang State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources and Beijing Engineering Research Center of Energy Electric Power Information Security School of Electrical & Electronic Engineering North China Electric Power Univ e School of Electrical and Information Engineering University of Sydney Economic & Technology Research Institute of Hubei Electric Power Company
In this paper, a novel robust state estimator based on hyperbolic cosine function (COSH) is proposed considering the uncertainty in the measurements. Simulations based on the IEEE benchmark systems demonstrate that th... 详细信息
来源: 评论
Quantum reversible circuits for multiplicative inverse
收藏 引用
EPJ Quantum Technology 2022年 第1期9卷 1-17页
作者: Luo, Qing-bin Yang, Guo-wu Li, Xiao-yu Li, Qiang Department of Computer Science and Technology School of Information Engineering Hubei Minzu University Enshi China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big data research Center & School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China
The synthesis of quantum circuits for multiplicative inverse over $\operatorname{GF}(2^{8})$ are discussed in this paper. We first convert the multiplicative inverse operation in $\operatorname{GF}(2^{8})$ to arithmet...
来源: 评论
Active power regulation control of grid-tied system for transient stability enhancement
Active power regulation control of grid-tied system for tran...
收藏 引用
12th International Conference on Renewable Power Generation (RPG 2023)
作者: Y. Ling M. Huang X. Fu X. Zha H. Zhang J. Deng Hubei Key Laboratory of Power Equipment & System Security for Integrated Energy School of Electrical Engineering and Automation Wuhan University Wuhan People's Republic of China China Electric Power Research Institute Nanjing People's Republic of China Power Research Institute of State Grid Shaanxi Electric Power Company Limited Xi'an People's Republic of China
With the high penetration of renewable energy sources, the grid stiffness goes weak. When the fault occurs, the system trends to be unstable in the weak grid. To enhance the transient stability of the system, it is vi...
来源: 评论
Correction to: A Tree-type Multiparty Quantum key Agreement Protocol Against Collusive Attacks
收藏 引用
International Journal of Theoretical Physics 2023年 第5期62卷 1-1页
作者: Yang, Hao Lu, Songfeng Zhu, Jianxin Wu, Junjun Zhou, Qing Li, Tong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center On Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen China College of Management Shenzhen University Shenzhen China
来源: 评论
Secure and Privacy-preserving Data-sharing Framework based on Blockchain Technology for Al-Najaf/Iraq Oil Refinery
Secure and Privacy-preserving Data-sharing Framework based o...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Samir M. Umran SongFeng Lu Zaid Ameen Abduljabbar Zhi Lu Bingyan Feng Lu Zheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Ministry of Industry and Minerals Iraqi Cement State Company Baghdad Iraq Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen China College of Education for Pure Sciences University of Basrah Technical Computer Engineering Department Al-Kunooze University College Basrah Iraq School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Wuhan Huazhong Numerical Control Co. Ltd Industrial Internet Research Institute Wuhan China College of Computer Science South-Central University for Nationalities Wuhan China
The Industrial Internet of Things or Industry 4.0 efficiently enhances the manufacturing process in terms of raising productivity, system performance, cost reduction, and building large-scale systems. It enables the c...
来源: 评论
Simulation of Nuclear Reactor Accident Scenarios using Physics-Informed Neural Networks and Transfer-Learning
Simulation of Nuclear Reactor Accident Scenarios using Physi...
收藏 引用
Electronic Information Engineering and Computer Science (EIECS), 2021 International Conference on
作者: Yang Yu Yufei Xie Wenlin Wang Guohua Wu Haitao Lan Enbo Lin Ping An Zibin Sun Haichuan Zhang Yixian Wu National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha China Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Chengdu China School of Automation Wuhan University of Technology Wuhan China Sino-German College of Intelligent Manufacturing Shenzhen Technology University Shenzhen China Institute of Automotive Engineers Hubei University of Automotive Technology Shiyan China Nuclear Power Institute of China Chengdu China
In a Loss of Coolant Accident (LOCA), reactor core temperatures can rise rapidly, leading to potential fuel damage and radioactive material release. This research presents a groundbreaking method that combines the pow... 详细信息
来源: 评论
Unbalanced incomplete multi-view clustering via the scheme of view evolution: Weak views are meat;strong views do eat
arXiv
收藏 引用
arXiv 2020年
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Oliver The School of Computer Science and Technology Key Laboratory of Information Storage System Ministry of Education of China Huazhong University of Science and Technology Wuhan430074 China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Incomplete multi-view clustering is an important technique to deal with real-world incomplete multi-view data. Previous methods assume that all views have the same incompleteness, i.e., balanced incompleteness. Howeve... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Simulation of Propagation Pattern of Partial Discharge’s Ultrasonic Signal in Oil-Immersed Transformer
Simulation of Propagation Pattern of Partial Discharge’s Ul...
收藏 引用
Advanced Electrical Equipment and Reliable Operation (AEERO), International Conference on
作者: Guochao Qian Qingjun Peng Zhongchang Wang Yuepei Zou Jiali Lei Zhixian Zhang Kejie Wu Yuxuan Song Electric Power Research Institute of Yunnan Power Grid Corporation Kunming Yunnan China Three Gorges Water Conservancy Project Cascade Dispatching Communication Center Yichang Hubei China Kunming Power Supply Bureau of Yunnan Power Grid Co. Ltd Kunming Yunnan China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing China
The breakdown of insulation caused by partial discharge inside the transformer is an important cause of transformer failure. Ultrasonic detection is a common method for detecting and positioning partial discharge in t... 详细信息
来源: 评论