咨询与建议

限定检索结果

文献类型

  • 541 篇 期刊文献
  • 486 篇 会议

馆藏范围

  • 1,027 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 654 篇 工学
    • 465 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 电气工程
    • 82 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 44 篇 机械工程
    • 42 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 33 篇 交通运输工程
    • 27 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 25 篇 化学工程与技术
    • 23 篇 材料科学与工程(可...
    • 22 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 326 篇 理学
    • 161 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 25 篇 化学
    • 24 篇 系统科学
  • 180 篇 管理学
    • 102 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 31 篇 基础医学(可授医学...
    • 30 篇 临床医学
  • 31 篇 法学
    • 22 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 25 篇 deep learning
  • 22 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 19 篇 computational mo...
  • 19 篇 accuracy
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 16 篇 graph neural net...
  • 15 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 neural networks
  • 12 篇 deep neural netw...
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 correlation

机构

  • 57 篇 hubei key labora...
  • 53 篇 school of comput...
  • 47 篇 school of cyber ...
  • 41 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 36 篇 jiangsu key labo...
  • 33 篇 national enginee...
  • 29 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 guangdong provin...
  • 15 篇 university of ch...

作者

  • 36 篇 xu xiaolong
  • 29 篇 jin hai
  • 27 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 wang guoyin
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 949 篇 英文
  • 72 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1027 条 记 录,以下是1-10 订阅
排序:
HTOTP: Honey Time-Based One-Time Passwords
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4438-4453页
作者: Ding, Zixuan Wang, Ding Nankai University College of Cryptology and Cyber Science Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin300350 China Chinese Academy of Sciences Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Beijing100085 China
One-Time Passwords (OTPs) play a crucial role in Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA) by adding an additional layer of security. OTPs effectively reduce the risk of static passwords be... 详细信息
来源: 评论
Low-temperature direct ethanol solid oxide fuel cells based on LiNi0.8Co0.15Al0.05O2-δ electrodes
收藏 引用
International Journal of Hydrogen Energy 2025年 130卷 242-248页
作者: Lei, Yaoyi Fang, Jingtong Xu, Yifan Wang, Xunying Xia, Chen Wang, Baoyuan Dong, Wenjing Key Laboratory of Intelligent Sensing System and Security of the Ministry of Education Hubei Key Laboratory of Micro-Nanoelectronic Materials and Devices School of Microelectronics Hubei University Wuhan430062 China
Solid oxide fuel cells (SOFCs) are environmentally friendly energy conversion devices that can be operated by using hydrogen and various hydrocarbons as fuels. Among those hydrocarbon fuels, ethanol has garnered wides... 详细信息
来源: 评论
Optimal Linear Codes With Few Weights From Simplicial Complexes
收藏 引用
IEEE Transactions on Information Theory 2025年 第5期71卷 3531-3543页
作者: Chen, Bing Xu, Yunge Hu, Zhao Li, Nian Zeng, Xiangyong Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Wuhan430062 China Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Wuhan430062 China State Key Laboratory of Integrated Service Networks Xi’an710071 China Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Key Laboratory of Intelligent Sensing System and Security Ministry of Education Wuhan430062 China
Recently, constructions of optimal linear codes from simplicial complexes have attracted much attention and some related nice works were presented. Let q be a prime power. In this paper, by using the simplicial comple... 详细信息
来源: 评论
Wireless Charging Scheduling for Long-term Utility Optimization
收藏 引用
ACM Transactions on Sensor Networks 2025年 第1期21卷 1-31页
作者: Xu, Jia Chen, Wenbin Dai, Haipeng Xu, Lijie Xiao, Fu Liu, Linfeng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China The State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have inve... 详细信息
来源: 评论
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage system for Large Language Model Inference  23
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Chen, Weijian He, Shuibing Qu, Haoyang Zhang, Ruidong Yang, Siling Chen, Ping Zheng, Yi Huai, Baoxing Chen, Gang The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Huawei Cloud China
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
RIGIDITY RESULTS OF SPACE-LIKE SUBMANIFOLDS WITH PARALLEL GAUSSIAN MEAN CURVATURE VECTOR
收藏 引用
Tohoku Mathematical Journal 2025年 第1期77卷 105-118页
作者: Wang, Huijuan FACULTY OF MATHEMATICS AND STATISTICS KEY LABORATORY OF APPLIED MATHEMATICS OF HUBEI PROVINCE KEY LABORATORY OF INTELLIGENT SENSING SYSTEM AND SECURITY MINISTRY OF EDUCATION HUBEI UNIVERSITY WUHAN China
In this paper, we study the space-like submanifolds with parallel Gaussian mean curvature vector in pseudo-Euclidean space. We establish a relevant Omori-Yau maximum principle for these space-like submanifolds which i... 详细信息
来源: 评论
LeapGNN: Accelerating Distributed GNN Training Leveraging Feature-Centric Model Migration  23
LeapGNN: Accelerating Distributed GNN Training Leveraging Fe...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Chen, Weijian He, Shuibing Qu, Haoyang Zhang, Xuechen The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States
Distributed training of graph neural networks (GNNs) has become a crucial technique for processing large graphs. Prevalent GNN frameworks are model-centric, necessitating the transfer of massive graph vertex features ... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments  2nd
Secure Multi-way Join Query and Its Bench-Marking with Tru...
收藏 引用
2nd International Conference on data security and Privacy Protection, DSPP 2024
作者: Zhao, Yi Zhao, Sen Lv, Siyi School of Cyber Engineering Xidian University Xi’an China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Because of server-untrustable model in outsourcing encrypted database system, it’s fatal for data owners to keep their data confidential under complex query operations performed by database servers. Trusted... 详细信息
来源: 评论