咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是121-130 订阅
排序:
The security and Privacy of Mobile Edge computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Ru Li Aimin Li Rong Fei Xie Guo Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ...
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
SecPQ: Secure Prediction Queries on Encrypted Outsourced Databases
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Liang, Jinwen Guo, Song Hong, Zicong Zhou, Enyuan Zhang, Chuan Xiao, Bin Hong Kong Polytechnic University Hung Hom Department of Computing Kowloon Hong Kong Hong Kong University of Science and Technology Clear Water Bay Department of Computer Science and Engineering Kowloon Hong Kong Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong China
Prediction queries have revolutionized data search by integrating machine learning models and traditional data processing operations for advanced analytics. However, existing prediction query frameworks for outsourced... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
Measuring data reconstruction defenses in collaborative inference systems  22
Measuring data reconstruction defenses in collaborative infe...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Mengda Yang Ziang Li Juan Wang Hongxin Hu Ao Ren Xiaoyang Xu Wenzhe Yi Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Department of Computer Science and Engineering University at Buffalo SUNY College of Computer Science Chongqing University
The collaborative inference systems are designed to speed up the prediction processes in edge-cloud scenarios, where the local devices and the cloud system work together to run a complex deep-learning model. However, ...
来源: 评论
Model-Driven Channel Estimation Network for Orthogonal Time-Frequency Space Systems
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Qian Chen, Xingke Tao, Qin Qian, Li Ping Kam, Pooi-Yuen Wu, Yuan Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Hangzhou Normal University School of Information Science and Technology Hangzhou311121 China School of Science and Engineering Shenzhen518172 China Center for Advanced Microelectronic Devices Suzhou215123 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science China
Orthogonal time-frequency space (OTFS) modulation has garnered significant attention in wireless communications, particularly in high-mobility scenarios, due to its exceptional resilience to Doppler shifts. While the ... 详细信息
来源: 评论
CellSecure: Securing Image Data in Industrial internet-of-Things via Cellular Automata and Chaos-Based Encryption
arXiv
收藏 引用
arXiv 2023年
作者: Ali, Hassan Khan, Muhammad Shahbaz Driss, Maha Ahmad, Jawad Buchanan, William J. Pitropakis, Nikolaos Department of Electrical Engineering HITEC University Taxila Taxila Pakistan School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh United Kingdom Robotics and Internet-of-Things Laboratory Prince Sultan University Riyadh Saudi Arabia RIADI Laboratory National School of Computer Sciences University of Manouba Manouba Tunisia
In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT application... 详细信息
来源: 评论
pFedCal: Lightweight Personalized Federated Learning with Adaptive Calibration Strategy
收藏 引用
IEEE Transactions on Services computing 2025年
作者: Deng, Dongshang Wu, Xuangou Zhang, Tao Xiang, Chaocan Zhao, Wei Xu, Minrui Kang, Jiawen Han, Zhu Niyato, Dusit Anhui University of Technology School of Computer Science and Technology Anhui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Ma'anshan243002 China Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Anhui Provincial Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui243002 China Chongqing University College of Computer Science Chongqing400044 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore Guangdong University of Technology School of Automation Guangzhou510062 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Federated learning (FL) is a promising artificial intelligence framework that enables clients to collectively train models with data privacy. However, in real-world scenarios, to construct practical FL frameworks, sev... 详细信息
来源: 评论