咨询与建议

限定检索结果

文献类型

  • 543 篇 期刊文献
  • 486 篇 会议

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 656 篇 工学
    • 464 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 电气工程
    • 82 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电子科学与技术(可...
    • 44 篇 机械工程
    • 44 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 33 篇 交通运输工程
    • 27 篇 网络空间安全
    • 26 篇 化学工程与技术
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 22 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 164 篇 数学
    • 87 篇 生物学
    • 83 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 26 篇 化学
    • 24 篇 系统科学
  • 179 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 89 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 31 篇 法学
    • 22 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 25 篇 deep learning
  • 22 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 19 篇 computational mo...
  • 19 篇 accuracy
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 16 篇 graph neural net...
  • 15 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 correlation

机构

  • 57 篇 hubei key labora...
  • 53 篇 school of comput...
  • 47 篇 school of cyber ...
  • 41 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 36 篇 jiangsu key labo...
  • 33 篇 national enginee...
  • 29 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 guangdong provin...
  • 15 篇 university of ch...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 26 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 wang guoyin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 949 篇 英文
  • 74 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1029 条 记 录,以下是41-50 订阅
排序:
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
SRv6-INT Enabled Network Monitoring and Measurement: Toward High-Yield Network Observability for Digital Twin  3rd
SRv6-INT Enabled Network Monitoring and Measurement: Toward...
收藏 引用
3rd International Conference on Machine Learning, Cloud Computing and intelligent Mining, MLCCIM 2024
作者: Zhang, Xu Feng, Chuan Han, Pengchao Liu, Wei Gong, Xiaoxue Zhang, Qiupei Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China School of Information Engineering Guangdong University of Technology Guangzhou510006 China
Network monitoring and measurement is an important part of realizing the network digital twin. However, it introduces the problem of high cost when obtaining the status data of physical networks. Therefore, to efficie... 详细信息
来源: 评论
A new class of S-boxes with optimal Feistel boomerang uniformity
收藏 引用
Cryptography and Communications 2025年 1-13页
作者: Lu, Yuxuan Mesnager, Sihem Li, Nian Wang, Lisha Zeng, Xiangyong Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education the Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Hubei University Wuhan China Department of Mathematics University of Paris VIII Saint-Denis France Laboratory of Analysis Geometry and Applications (LAGA) University Sorbonne Paris Nord CNRS UMR 7539 Villetaneuse France Télém Paris Palaiseau France Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China
The Feistel Boomerang Connectivity Table ( $$\textrm{FBCT}$$ ), which is the Feistel version of the Boomerang Connectivity Table ( $$\textrm{BCT}$$ ), plays a role in analyzing block ciphers’ ability to withstand str...
来源: 评论
Exploring the Robustness: Hierarchical Federated Learning Framework for Object Detection of UAV Cluster
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Xingyu Zhang, Wenzhe Liu, Linfeng Xu, Jia Nanjing University of Posts and Telecommunications School of Computer Science and Technology Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
The deployment of Unmanned Aerial Vehicle (UAV) cluster is an available solution for object detection missions. In the harsh environment, UAV cluster could suffer from some significant threats (e.g., forest fire hazar... 详细信息
来源: 评论
Task Offloading Scheduling and Privacy Protection Optimization in Vehicular Edge Computing Based on Double Deep Q-Network  18th
Task Offloading Scheduling and Privacy Protection Optimizat...
收藏 引用
18th China Conference on Wireless Sensor Networks, CWSN 2024
作者: Weifeng, Lu Saijun, Yang Jia, Xu Lijie, Xu Lingyun, Jiang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Xianlin Street Jiangsu Nanjing210023 China
As the applications and services within vehicular networking systems become increasingly diverse, vehicles with limited computing resources face challenges in handling these computationally intensive and latency-sensi... 详细信息
来源: 评论
Multimodal Summarization with Modality-Aware Fusion and Summarization Ranking  24th
Multimodal Summarization with Modality-Aware Fusion and Su...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Ye, Xuming Chaomurilige Liu, Zheng Luo, Haoyu Dong, Jun Luo, Yingzhe Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance of MOE Minzu University of China Beijing China Hainan International College of Minzu University of China Li’an International Education Innovation pilot Zone Hainan572499 China Faculty of Data Science City University of Macau Macau China
Existing multimodal summarization methods primarily focus on multimodal fusion to efficiently utilize the visual information for summarization. However, they fail to exploit the deep interaction between textual and vi... 详细信息
来源: 评论
Blockchain-Enhanced Federated Learning for Secure and intelligent Consumer Electronics : An Overview
收藏 引用
IEEE Consumer Electronics Magazine 2025年
作者: Zhu, Chenlu Wang, Shuilong Fan, Xiaoxuan Deng, Xianjun Liu, Shenghao He, Yuanyuan Wu, Celimuge Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China The University of Electro-Communications China
With the rapid advancement of Artificial Intelligence (AI) and Internet of Things (IoT), consumer electronics have become essential in daily life. However, these devices generate and store vast amounts of personal dat... 详细信息
来源: 评论
A label-guided contrastive capsule network for few-shot text classification
收藏 引用
Neural Computing and Applications 2025年 1-26页
作者: Xu, Yang Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Few-shot text classification involves transferring knowledge from a limited dataset to perform classification tasks in unseen domains. Existing metric-based meta-learning models, such as prototypical networks, have sh... 详细信息
来源: 评论
The Regular Ricci-Inverse Cosmology with Multiple Anticurvature Scalars
arXiv
收藏 引用
arXiv 2025年
作者: Mou, Yicen School of Physics Hubei University Hubei Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education China
We investigate the modified gravity in which the Lagrangian of gravity is a function of the trace of the n-th matrix power of Ricci tensor in a Friedmann–Lemaître–Robertson–Walker(FLRW) spacetime. When n is ne... 详细信息
来源: 评论
Mining User–Item Interactions via Knowledge Graph for Recommendation
收藏 引用
ACM Transactions on Recommender systems 2025年 第3期3卷 1-19页
作者: Shenghao Liu Lingyun Lu Bang Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology (HUST) Wuhan China
Introducing a Knowledge Graph (KG) to facilitate a recommender system has become a tendency in recent years. Many existing methods leverage KGs to obtain side information of items to promote item representation learni... 详细信息
来源: 评论