咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 6 篇 federated learni...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是131-140 订阅
排序:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinki...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chao Chen Kun-Yu Lin Chang-Dong Wang Dong Huang Guangdong Key Laboratory of Information Security Technology Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China College of Mathematics and Informatics South China Agricultural University Guangzhou China
Nonlinear clustering has attracted an increasing amount of attention recently. In this paper, we propose a new nonlinear clustering method based on Cluster Shrinking and Border Detection (CSBD). Unlike most existing c... 详细信息
来源: 评论
information security audit system based on unlisted words
收藏 引用
Journal of Computational information Systems 2007年 第4期3卷 1489-1494页
作者: Wu, Ronghui Yu, Fei Li, Renfa Xu, Cheng Yue, Guangxue College of Computer and Communication Hunan University Changsha 410082 China Guangdong Province Key Lab. of Electronic Commerce Market Application Technology Guangdong University of Business Studies Guangzhou 510320 China State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100049 China
This paper proposes a filtering technology based on content. This technology constructs an estimation function, and estimates the candidate properties, then chooses several properties with the highest value which are ... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
FLARE: Towards Universal dataset Purification against Backdoor Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Hou, Linshan Luo, Wei Hua, Zhongyun Chen, Songhua Yu Zhang, Leo Li, Yiming School of Computer Science and Technology Harbin Institute of Technology Guangdong Shenzhen518055 China School of Information Technology Deakin University Australia Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong Shenzhen518055 China School of Information and Communication Technology Griffith University Southport Gold CoastQLD4215 Australia College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep neural networks (DNNs) are susceptible to backdoor attacks, where adversaries poison datasets with adversary-specified triggers to implant hidden backdoors, enabling malicious manipulation of model predictions. D... 详细信息
来源: 评论
An efficient parallel topic-sensitive expert finding algorithm using spark
An efficient parallel topic-sensitive expert finding algorit...
收藏 引用
IEEE International Conference on Big data
作者: Yao-Ming Yang Chang-Dong Wang Jian-Huang Lai Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing China Guangdong Key Laboratory of Information Security Technology China School of Data and Computer Science Sun Yat-sen University Guangzhou P. R. China
Expert finding is an important technique to obtain the user authority ranking in community question answering (CQA) websites. ZhihuRank is a topic-sensitive expert finding algorithm, which is based on both LDA and Pag... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlab.led data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论