咨询与建议

限定检索结果

文献类型

  • 302 篇 期刊文献
  • 271 篇 会议

馆藏范围

  • 573 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 360 篇 工学
    • 252 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 78 篇 信息与通信工程
    • 67 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 25 篇 化学工程与技术
    • 24 篇 机械工程
    • 19 篇 安全科学与工程
    • 15 篇 材料科学与工程(可...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 11 篇 交通运输工程
  • 164 篇 理学
    • 67 篇 数学
    • 54 篇 生物学
    • 29 篇 物理学
    • 27 篇 化学
    • 22 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 11 篇 大气科学
  • 82 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 35 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 22 篇 医学
    • 16 篇 临床医学
  • 21 篇 法学
    • 15 篇 社会学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 农学
  • 2 篇 军事学
  • 1 篇 文学

主题

  • 33 篇 semantics
  • 23 篇 feature extracti...
  • 20 篇 deep learning
  • 15 篇 computational mo...
  • 15 篇 federated learni...
  • 14 篇 accuracy
  • 14 篇 privacy
  • 13 篇 training
  • 12 篇 codes
  • 11 篇 blockchain
  • 10 篇 data privacy
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 10 篇 security
  • 10 篇 data models
  • 9 篇 deep neural netw...
  • 9 篇 network security
  • 9 篇 measurement
  • 9 篇 open source soft...
  • 9 篇 robustness

机构

  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 53 篇 shandong provinc...
  • 51 篇 school of comput...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 18 篇 huazhong univers...
  • 18 篇 the hubei engine...
  • 15 篇 national enginee...
  • 15 篇 huazhong univers...
  • 14 篇 shenzhen huazhon...
  • 13 篇 jinyinhu laborat...

作者

  • 46 篇 zhou pan
  • 45 篇 jin hai
  • 37 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 13 篇 wang haoyu
  • 12 篇 wan wei
  • 12 篇 fang xiang
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 10 篇 zhang rui
  • 10 篇 xu zichuan
  • 10 篇 zeng yong

语言

  • 513 篇 英文
  • 52 篇 其他
  • 8 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=National Engineering Research Center of Big Data Collaborative Security Technology"
573 条 记 录,以下是11-20 订阅
排序:
Multi-Dimensional Training Optimization for Efficient Federated Synergy Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6243-6258页
作者: Fu, Shucun Dong, Fang Chen, Runze Shen, Dian Zhang, Jinghui He, Qiang Southeast University School of Computer Science and Engineering Nanjing China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China
Edge learning (EL) is an end-to-edge collaborative learning paradigm enabling devices to participate in model training and data analysis, opening countless opportunities for edge intelligence. As a promising EL framew... 详细信息
来源: 评论
Intelligent Smishing Detection System for Massive Users  9
Intelligent Smishing Detection System for Massive Users
收藏 引用
9th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2023
作者: Li, Qiang Zhang, Jianxin Zhou, Nan Ming, Liang Zhao, Bo Du, Yuejin Zhong, Li Li, Jia Beijing Qihoo Technology Co. Ltd Beijing100015 China National Engineering Research Center of Big Data Collaborative Security Technology Beijing100015 China WuHan University School of Cyber Science and Engineering WuHan430064 China
Smishing has always been an important means of black-gray drainage. Currently, interception measures are primarily deployed at the network communication layer of SMS transmission. In response, black-gray industry orga... 详细信息
来源: 评论
Clustering Network Based on Pre-Clustering center Codebook  18
Clustering Network Based on Pre-Clustering Center Codebook
收藏 引用
18th International Conference on Intelligent Systems and Knowledge engineering, ISKE 2023
作者: An, Qiulong Wu, Jianning Huang, Tianqiang Huang, Liqing Luo, Haifeng Ye, Feng College of Computer and Cyber Security Fujian Normal University Digital Fujian Institute of Big Data Security Technology Fujian Provincial Engineering Research Center of Big Data Analysis and Application Fuzhou China
Most existing deep clustering models attempt to group similar datas by using autoencoders to simultaneously minimize the clustering loss and reconstruction losses. However, these methods do not impose any constraints ... 详细信息
来源: 评论
On the security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
A U-Shaped Multi-Scale Network for Defocus Blur Detection  17
A U-Shaped Multi-Scale Network for Defocus Blur Detection
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical engineering and Informatics, CISP-BMEI 2024
作者: Li, Longrui Huang, Liqing College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Digital Fujian Institute of Big Data Security Technology Fuzhou350117 China Fujian Provincial Engineering Research Center of Big Data Analysis and Application Fuzhou350117 China
Defocus blur detection (DBD) aims at accurately extract the in-focus sharp regions in natural images. Despite significant progress, the presence of uniform regions and gradient boundaries remain two of the most challe... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
A First Look at LLM-powered Smartphones  39
A First Look at LLM-powered Smartphones
收藏 引用
39th ACM/IEEE International Conference on Automated Software engineering Workshops, ASEW 2024
作者: Wu, Liangxuan Zhao, Yanjie Wang, Chao Liu, Tianming Wang, Haoyu Huazhong University of Science and Technology Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
The integration of Large Language Models (LLMs) into edge devices such as smartphones represents a significant leap in mobile technology, promising enhanced user experiences and novel functionalities. This paper prese... 详细信息
来源: 评论
Efficient and Verifiable Multi-server Framework for Secure Information Classification and Storage  20th
Efficient and Verifiable Multi-server Framework for Secure...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Guo, Ziqing Wang, Yaohui Jin, Xuanyu Wang, Xiuhua He, Yuanyuan Dai, Yueyue Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
With the rapid development of digital technology, the complexity and diversity of data sources present significant security and privacy challenges. To address these issues, this paper proposes an efficient and verifia... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论