咨询与建议

限定检索结果

文献类型

  • 329 篇 期刊文献
  • 258 篇 会议

馆藏范围

  • 587 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 415 篇 工学
    • 320 篇 计算机科学与技术...
    • 247 篇 软件工程
    • 78 篇 信息与通信工程
    • 66 篇 网络空间安全
    • 43 篇 生物工程
    • 38 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 35 篇 控制科学与工程
    • 20 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 13 篇 机械工程
    • 11 篇 安全科学与工程
    • 10 篇 动力工程及工程热...
    • 10 篇 土木工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 建筑学
  • 165 篇 理学
    • 75 篇 数学
    • 49 篇 物理学
    • 46 篇 生物学
    • 18 篇 化学
    • 15 篇 统计学(可授理学、...
    • 10 篇 系统科学
  • 95 篇 管理学
    • 51 篇 图书情报与档案管...
    • 49 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 14 篇 法学
    • 11 篇 社会学
  • 12 篇 医学
    • 12 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 11 篇 军事学
    • 11 篇 军队指挥学
  • 6 篇 经济学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 33 篇 information secu...
  • 22 篇 semantics
  • 18 篇 security
  • 18 篇 cryptography
  • 15 篇 feature extracti...
  • 15 篇 trusted computin...
  • 13 篇 privacy
  • 12 篇 training
  • 11 篇 authentication
  • 10 篇 deep learning
  • 10 篇 machine learning
  • 10 篇 robustness
  • 9 篇 protocols
  • 9 篇 quantum cryptogr...
  • 8 篇 object detection
  • 8 篇 cryptanalysis
  • 8 篇 steganography
  • 8 篇 protection
  • 7 篇 data security
  • 7 篇 access control

机构

  • 193 篇 key laboratory o...
  • 57 篇 school of comput...
  • 51 篇 key laboratory o...
  • 41 篇 school of cyber ...
  • 26 篇 school of comput...
  • 24 篇 computer school ...
  • 24 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 21 篇 faculty of infor...
  • 18 篇 wuhan university...
  • 13 篇 computer school ...
  • 12 篇 collaborative in...
  • 11 篇 school of comput...
  • 11 篇 wuhan university
  • 11 篇 the key laborato...
  • 10 篇 national enginee...
  • 10 篇 the key laborato...
  • 8 篇 nanyang technolo...
  • 8 篇 school of comput...

作者

  • 54 篇 ji donghong
  • 41 篇 zhang huanguo
  • 37 篇 li fei
  • 37 篇 fei hao
  • 30 篇 wang lina
  • 25 篇 teng chong
  • 25 篇 huanguo zhang
  • 25 篇 lina wang
  • 22 篇 li bobo
  • 18 篇 wu shengqiong
  • 17 篇 fu jianming
  • 17 篇 duan lijuan
  • 16 篇 chen jing
  • 15 篇 zhao bo
  • 15 篇 li jingye
  • 14 篇 wang juan
  • 13 篇 peng guojun
  • 13 篇 wang qian
  • 13 篇 yan fei
  • 13 篇 ye dengpan

语言

  • 547 篇 英文
  • 27 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Aerospace Information Security and Trusted Computing"
587 条 记 录,以下是1-10 订阅
排序:
HGNN-ETC: Higher-Order Graph Neural Network Based on Chronological Relationships for Encrypted Traffic Classification
收藏 引用
Computers, Materials & Continua 2024年 第11期81卷 2643-2664页
作者: Rongwei Yu Xiya Guo Peihao Zhang Kaijuan Zhang Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Encrypted traffic plays a crucial role in safeguarding network security and user ***,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic *** metho... 详细信息
来源: 评论
SPIDER:Speeding up Side-Channel Vulnerability Detection via Test Suite Reduction
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 47-58页
作者: Fei Yan Rushan Wu Liqiang Zhang Yue Cao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Side-channel attacks allow adversaries to infer sensitive information,such as cryptographic keys or private user data,by monitoring unintentional information leaks of running *** side-channel detection methods can ide... 详细信息
来源: 评论
Omni-Detection of Adversarial Examples with Diverse Magnitudes
收藏 引用
China Communications 2024年 第12期21卷 139-151页
作者: Ke Jianpeng Wang Wenqi Yang Kang Wang Lina Ye Aoshuang Wang Run Key Laboratory of Aerospace Information Security and Trusted Computing(Wuhan University) Ministry of EducationWuhan 430072China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China
Deep neural networks(DNNs)are poten-tially susceptible to adversarial examples that are ma-liciously manipulated by adding imperceptible pertur-bations to legitimate inputs,leading to abnormal be-havior of *** of meth... 详细信息
来源: 评论
A clustering and generative adversarial networks-based hybrid approach for imbalanced data classification
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第6期14卷 8003-8018页
作者: Ding, Hongwei Cui, Xiaohui School of Cyber Science and Engineering Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Wuhan China
Imbalanced data often exists in related fields such as banking, insurance, security and medical care. The imbalanced distribution of data will lead to the deviation of decision-making, making it easy for a small numbe... 详细信息
来源: 评论
Generalize Audio Deepfake Algorithm Recognition via Attribution Enhancement
Generalize Audio Deepfake Algorithm Recognition via Attribut...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Zhigang Ye, Dengpan Li, Jingyang Deng, Jiacheng Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China
The development of voice cloning techniques has made forgery audios indistinguishable, posing an urgency to trace their sources. Many existing works focus on improving identification accuracy for audio deepfake algori... 详细信息
来源: 评论
Harnessing Dimensional Contrast and information Compensation for Sentence Embedding Enhancement
Harnessing Dimensional Contrast and Information Compensation...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: He, Kang Ding, Yuzhe Li, Bobo Wang, Haining Li, Fei Teng, Chong Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China
Unsupervised sentence embedding learning excels through positive sample construction and instance-level contrastive learning (ICL). However, this approach can lead to over-compression and dimensional contamination fro... 详细信息
来源: 评论
NCRE: A Benchmark for Document-level Nominal Compound Relation Extraction  31
NCRE: A Benchmark for Document-level Nominal Compound Relati...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Cao, Jincheng Li, Bobo Liu, Jiang Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China
Entity and relation extraction is a conventional task in the field of information extraction. Existing work primarily focuses on detecting specific relations between entities, often constrained to particular fields an... 详细信息
来源: 评论
Enhancing Cross-Document Event Coreference Resolution by Discourse Structure and Semantic information  30
Enhancing Cross-Document Event Coreference Resolution by Dis...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Gao, Qiang Li, Bobo Meng, Zixiang Li, Yunlong Zhou, Jun Li, Fei Teng, Chong Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China
Existing cross-document event coreference resolution models, which either compute mention similarity directly or enhance mention representation by extracting event arguments (such as location, time, agent, and patient... 详细信息
来源: 评论
Transferable and Robust Dynamic Adversarial Attack against Object Detection Models
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16171-16180页
作者: Wang, Xinxin Chen, Jing Zhang, Zijun He, Kun Wu, Zongru Du, Ruiying Li, Qiao Liu, Gongshen Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Shanghai Jiao Tong University Department of Electronic Information and Electrical Engineering Shanghai201100 China
Object detection models have been widely deployed in physical world applications, and they are vulnerable to adversarial attacks. However, most adversarial attacks are implemented in a white-box setting, and under ide... 详细信息
来源: 评论
PowerDetector:Malicious PowerShell Script Family Classification Based on Multi-Modal Semantic Fusion and Deep Learning
收藏 引用
China Communications 2023年 第11期20卷 202-224页
作者: Xiuzhang Yang Guojun Peng Dongni Zhang Yuhang Gao Chenguang Li School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationWuhan 430072China School of Information Guizhou University of Finance and EconomicsGuiyang 550025China
Power Shell has been widely deployed in fileless malware and advanced persistent threat(APT)attacks due to its high stealthiness and live-off-theland ***,existing works mainly focus on deobfuscation and malicious dete... 详细信息
来源: 评论