咨询与建议

限定检索结果

文献类型

  • 313 篇 会议
  • 270 篇 期刊文献

馆藏范围

  • 583 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 340 篇 工学
    • 248 篇 计算机科学与技术...
    • 218 篇 软件工程
    • 72 篇 信息与通信工程
    • 46 篇 电气工程
    • 45 篇 生物工程
    • 28 篇 控制科学与工程
    • 27 篇 机械工程
    • 25 篇 生物医学工程(可授...
    • 22 篇 电子科学与技术(可...
    • 17 篇 安全科学与工程
    • 14 篇 建筑学
    • 14 篇 化学工程与技术
    • 13 篇 土木工程
    • 12 篇 光学工程
    • 11 篇 材料科学与工程(可...
    • 10 篇 交通运输工程
    • 10 篇 网络空间安全
  • 159 篇 理学
    • 72 篇 数学
    • 61 篇 生物学
    • 27 篇 物理学
    • 23 篇 统计学(可授理学、...
    • 20 篇 化学
  • 91 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 23 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 22 篇 农学
    • 14 篇 作物学
  • 21 篇 法学
    • 18 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 36 篇 semantics
  • 22 篇 feature extracti...
  • 16 篇 deep learning
  • 16 篇 training
  • 15 篇 computational mo...
  • 14 篇 accuracy
  • 14 篇 privacy
  • 13 篇 federated learni...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 11 篇 graph neural net...
  • 11 篇 codes
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 10 篇 visualization
  • 9 篇 security
  • 9 篇 measurement
  • 8 篇 deep neural netw...

机构

  • 60 篇 school of cyber ...
  • 57 篇 hubei key labora...
  • 50 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 44 篇 key laboratory o...
  • 33 篇 hubei engineerin...
  • 32 篇 college of infor...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 hubei engineerin...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 22 篇 huazhong univers...
  • 19 篇 school of softwa...
  • 18 篇 the hubei engine...
  • 17 篇 school of inform...
  • 15 篇 college of compu...
  • 15 篇 huazhong univers...

作者

  • 46 篇 zhou pan
  • 42 篇 jin hai
  • 31 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 zhang leo yu
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 12 篇 wang haoyu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 li zhen
  • 10 篇 zhang rui
  • 10 篇 wan wei
  • 10 篇 zeng yong
  • 10 篇 fang xiang
  • 10 篇 deng xianjun

语言

  • 550 篇 英文
  • 28 篇 其他
  • 4 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Hubei Engineering Research Center on Big Data Security"
583 条 记 录,以下是1-10 订阅
排序:
UARC:Unsupervised Anomalous Traffic Detection with Improved U-Shaped Autoencoder and RetNet Based Multi-clustering  26th
UARC:Unsupervised Anomalous Traffic Detection with Improved ...
收藏 引用
26th International Conference on Information and Communications security, ICICS 2024
作者: Xie, Yunyang Chen, Kai Li, Shenghui Li, Bingqian Zhang, Ning Hubei Key Laboratory of Distributed System Security Hubei Engin eering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University Technology Wuhan430074 China
With the ongoing advancement of deep learning, modern network intrusion detection systems increasingly favor utilizing deep learning networks to improve their ability to learn traffic characteristics. To address the c... 详细信息
来源: 评论
Area Coverage Reliability Evaluation for Collaborative Intelligence and Meta-Computing of Decentralized Industrial Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 13734-13745页
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Liu, Shenghao Yin, Duan Gao, Hanjun Yang, Laurence T. Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China China Mobile Communications Group Terminal Co. Beijing Department Beijing China CNNC Wuhan Nuclear Power Operation Technology Co. Cyber Security Technology Department Wuhan China
Industrial Internet of Things (IIoT) is evolving toward decentralization and autonomous operation. Nodes in decentralized IIoT collaboratively sense data and communicate to participate in meta-computing and provide di... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论
Optimizing Resource Allocation in the Internet of Vehicles: An Intelligent Vehicle-Edge-Cloud Collaboration Approach  20th
Optimizing Resource Allocation in the Internet of Vehicle...
收藏 引用
20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024
作者: Chen, Weijie Lin, Li Xiong, Jinbo Lin, Jiayi Huang, Ruihong Wang, Xing College of Computer and Cyber Security Fujian Normal University Fuzhou China Fujian Provincial University Engineering Research Center of Big Data Analysis and Application Fuzhou China
The proliferation of the Internet of Vehicles (IoV) has spurred the development of computationally intensive and latency-sensitive applications in vehicles. However, limited onboard computing resources hinder their ex... 详细信息
来源: 评论
Blockchain-Enhanced Federated Learning for Secure and Intelligent Consumer Electronics : An Overview
收藏 引用
IEEE Consumer Electronics Magazine 2025年
作者: Zhu, Chenlu Wang, Shuilong Fan, Xiaoxuan Deng, Xianjun Liu, Shenghao He, Yuanyuan Wu, Celimuge Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China The University of Electro-Communications China
With the rapid advancement of Artificial Intelligence (AI) and Internet of Things (IoT), consumer electronics have become essential in daily life. However, these devices generate and store vast amounts of personal dat... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing data  24th
Crop Classification Methods Based on Siamese CBMM-CNN Archi...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xie, Bin Zhang, Jiahao Li, Yuling Li, Yusong Dong, Xinyu College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Shijiazhuang China
Amidst global population growth and escalating food demands, real-time agricultural monitoring is crucial for ensuring food security. During the initial stages of crop growth, however, it faces significant challenges ... 详细信息
来源: 评论
Unified Grid Tagging Scheme for Aspect Sentiment Quad Prediction  31
Unified Grid Tagging Scheme for Aspect Sentiment Quad Predic...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Su, Guixin Zhang, Yongcheng Wang, Tongguan Wu, Mingmin Sha, Ying Key Laboratory of Smart Farming for Agricultural Animals Wuhan China Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education China Hubei Engineering Technology Research Center of Agricultural Big Data Wuhan China College of Informatics Huazhong Agricultural University Wuhan China
Aspect Sentiment Quad Prediction (ASQP) aims to extract all sentiment elements in quads for a given review to explain the reason for the sentiment. Previous table-filling based methods have achieved promising results ... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Multi-Hop Attention Diffusion Graph Neural Networks For Multimodal Fake News Detection
Multi-Hop Attention Diffusion Graph Neural Networks For Mult...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Zhongqiang Lu, Dongli Sha, Ying Key Laboratory of Smart Farming for Agricultural Animals Wuhan China Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education Wuhan China Hubei Engineering Technology Research Center of Agricultural Big Data Wuhan China College of Informatics Huazhong Agricultural University Wuhan China
Fake news often spreads rapidly on social media in various forms, exposing users to a large amount of misinformation and disinformation. Recently, promising results have been achieved in fake news detection. However, ... 详细信息
来源: 评论