咨询与建议

限定检索结果

文献类型

  • 302 篇 期刊文献
  • 271 篇 会议

馆藏范围

  • 573 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 360 篇 工学
    • 252 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 78 篇 信息与通信工程
    • 67 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 25 篇 化学工程与技术
    • 24 篇 机械工程
    • 19 篇 安全科学与工程
    • 15 篇 材料科学与工程(可...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 11 篇 交通运输工程
  • 164 篇 理学
    • 67 篇 数学
    • 54 篇 生物学
    • 29 篇 物理学
    • 27 篇 化学
    • 22 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 11 篇 大气科学
  • 82 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 35 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 22 篇 医学
    • 16 篇 临床医学
  • 21 篇 法学
    • 15 篇 社会学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 农学
  • 2 篇 军事学
  • 1 篇 文学

主题

  • 33 篇 semantics
  • 23 篇 feature extracti...
  • 20 篇 deep learning
  • 15 篇 computational mo...
  • 15 篇 federated learni...
  • 14 篇 accuracy
  • 14 篇 privacy
  • 13 篇 training
  • 12 篇 codes
  • 11 篇 blockchain
  • 10 篇 data privacy
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 10 篇 security
  • 10 篇 data models
  • 9 篇 deep neural netw...
  • 9 篇 network security
  • 9 篇 measurement
  • 9 篇 open source soft...
  • 9 篇 robustness

机构

  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 53 篇 shandong provinc...
  • 51 篇 school of comput...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 18 篇 huazhong univers...
  • 18 篇 the hubei engine...
  • 15 篇 national enginee...
  • 15 篇 huazhong univers...
  • 14 篇 shenzhen huazhon...
  • 13 篇 jinyinhu laborat...

作者

  • 46 篇 zhou pan
  • 45 篇 jin hai
  • 37 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 13 篇 wang haoyu
  • 12 篇 wan wei
  • 12 篇 fang xiang
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 10 篇 zhang rui
  • 10 篇 xu zichuan
  • 10 篇 zeng yong

语言

  • 513 篇 英文
  • 52 篇 其他
  • 8 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=National Engineering Research Center of Big Data Collaborative Security Technology"
573 条 记 录,以下是1-10 订阅
排序:
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
Science China(Information Sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
COMET ■: “cone of experience” enhanced large multimodal model for mathematical problem generation
收藏 引用
Science China(Information Sciences) 2024年 第12期67卷 97-98页
作者: Sannyuya LIU Jintian FENG Zongkai YANG Yawei LUO Qian WAN Xiaoxuan SHEN Jianwen SUN National Engineering Research Center of Educational Big Data Central China Normal University Faculty of Artificial Intelligence in Education Central China Normal University School of Software Technology Zhejiang University
The impact of generative artificial intelligence on education is unprecedented [1]. researchers have been exploring possibilities of combining the large multimodal model(LMM)with the teaching process. Specifically, Lu... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 498-508页
作者: Zhenkun Jin Yixuan Geng Chenlu Zhu Yunzhi Xia Xianjun Deng Lingzhi Yi Xianlan Wang Wuhan Business University 430056China Wuhan Research Institute of Post and Telecommunication Wuhan430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecuritySchool of Cyber Science and EngineeringHuazhong University of Science and TechnologyWuhan430074China Hubei Chutian Expressway Digital Technology Co.Ltd Wuhan430074China School of Information and Safety Engineering Zhongnan University of Economics and LawWuhan430073China
Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited *** energy harvesting WSN is a novel network ar... 详细信息
来源: 评论
TIPS:Tailored Information Extraction in Public security Using Domain-Enhanced Large Language Model
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 2555-2572页
作者: Yue Liu Qinglang Guo Chunyao Yang Yong Liao School of Cyber Science and Technology University of Science and Technology of ChinaHefei230026China National Engineering Research Center for Public Safety Risk Perception and Control by Big Data China Academy of Electronics and Information TechnologyBeijing100041China
Processing police incident data in public security involves complex natural language processing(NLP)tasks,including information *** data contains extensive entity information—such as people,locations,and events—whil... 详细信息
来源: 评论
UARC:Unsupervised Anomalous Traffic Detection with Improved U-Shaped Autoencoder and RetNet Based Multi-clustering  26th
UARC:Unsupervised Anomalous Traffic Detection with Improved ...
收藏 引用
26th International Conference on Information and Communications security, ICICS 2024
作者: Xie, Yunyang Chen, Kai Li, Shenghui Li, Bingqian Zhang, Ning Hubei Key Laboratory of Distributed System Security Hubei Engin eering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University Technology Wuhan430074 China
With the ongoing advancement of deep learning, modern network intrusion detection systems increasingly favor utilizing deep learning networks to improve their ability to learn traffic characteristics. To address the c... 详细信息
来源: 评论
mVulPreter: A Multi-Granularity Vulnerability Detection System With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论