咨询与建议

限定检索结果

文献类型

  • 296 篇 期刊文献
  • 214 篇 会议

馆藏范围

  • 510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 277 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 70 篇 信息与通信工程
    • 59 篇 网络空间安全
    • 41 篇 电气工程
    • 33 篇 电子科学与技术(可...
    • 32 篇 生物工程
    • 31 篇 控制科学与工程
    • 17 篇 光学工程
    • 13 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 11 篇 机械工程
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 9 篇 建筑学
    • 9 篇 土木工程
    • 6 篇 生物医学工程(可授...
  • 136 篇 理学
    • 65 篇 数学
    • 38 篇 物理学
    • 35 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
  • 80 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 12 篇 法学
    • 9 篇 社会学
  • 10 篇 军事学
    • 9 篇 军队指挥学
  • 9 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 32 篇 information secu...
  • 18 篇 semantics
  • 15 篇 cryptography
  • 14 篇 security
  • 12 篇 trusted computin...
  • 12 篇 privacy
  • 11 篇 feature extracti...
  • 9 篇 authentication
  • 9 篇 machine learning
  • 9 篇 protocols
  • 9 篇 protection
  • 8 篇 generative adver...
  • 8 篇 cryptanalysis
  • 8 篇 steganography
  • 8 篇 robustness
  • 8 篇 training
  • 7 篇 data security
  • 7 篇 deep learning
  • 7 篇 application soft...
  • 7 篇 speech processin...

机构

  • 193 篇 key laboratory o...
  • 58 篇 school of comput...
  • 54 篇 key laboratory o...
  • 40 篇 school of cyber ...
  • 25 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 20 篇 wuhan university...
  • 19 篇 computer school ...
  • 14 篇 computer school ...
  • 11 篇 school of comput...
  • 11 篇 wuhan university
  • 11 篇 the key laborato...
  • 11 篇 collaborative in...
  • 10 篇 the key laborato...
  • 9 篇 nanyang technolo...
  • 9 篇 wuhan university...
  • 8 篇 school of comput...
  • 8 篇 key laboratory o...
  • 7 篇 department of ke...

作者

  • 54 篇 ji donghong
  • 40 篇 zhang huanguo
  • 37 篇 li fei
  • 37 篇 fei hao
  • 28 篇 wang lina
  • 25 篇 teng chong
  • 25 篇 huanguo zhang
  • 24 篇 lina wang
  • 22 篇 li bobo
  • 18 篇 wu shengqiong
  • 16 篇 chen jing
  • 15 篇 fu jianming
  • 15 篇 li jingye
  • 14 篇 wang juan
  • 13 篇 zhao bo
  • 13 篇 wang qian
  • 13 篇 du ruiying
  • 13 篇 ye dengpan
  • 12 篇 peng guojun
  • 12 篇 yan fei

语言

  • 476 篇 英文
  • 22 篇 其他
  • 12 篇 中文
检索条件"机构=The Key Laboratory of Aerospace Information Security and Trust Computing"
510 条 记 录,以下是1-10 订阅
排序:
Fairness is essential for robustness:fair adversarial training by identifying and augmenting hard examples
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 1-13页
作者: Ningping MOU Xinli YUE Lingchen ZHAO Qian WANG Key Laboratory of Aerospace Information Security and Trusted Computing(Ministry of Education) School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Adversarial training has been widely considered the most effective defense against adversarial ***,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,... 详细信息
来源: 评论
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 4408-4421页
作者: Lv, Yunna Tang, Long Ye, Dengpan Xie, Caiyun Deng, Jiacheng He, Yiheng Shen, Sipeng Wuhan University School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan430072 China
Deep hash-based retrieval techniques are widely used in facial retrieval systems to improve the efficiency of facial matching. However, it also carries the danger of exposing private information. Deep hash models are ... 详细信息
来源: 评论
Generalize Audio Deepfake Algorithm Recognition via Attribution Enhancement
Generalize Audio Deepfake Algorithm Recognition via Attribut...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Zhigang Ye, Dengpan Li, Jingyang Deng, Jiacheng Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China
The development of voice cloning techniques has made forgery audios indistinguishable, posing an urgency to trace their sources. Many existing works focus on improving identification accuracy for audio deepfake algori... 详细信息
来源: 评论
Transferable and Robust Dynamic Adversarial Attack against Object Detection Models
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16171-16180页
作者: Wang, Xinxin Chen, Jing Zhang, Zijun He, Kun Wu, Zongru Du, Ruiying Li, Qiao Liu, Gongshen Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Shanghai Jiao Tong University Department of Electronic Information and Electrical Engineering Shanghai201100 China
Object detection models have been widely deployed in physical world applications, and they are vulnerable to adversarial attacks. However, most adversarial attacks are implemented in a white-box setting, and under ide... 详细信息
来源: 评论
Harnessing Dimensional Contrast and information Compensation for Sentence Embedding Enhancement
Harnessing Dimensional Contrast and Information Compensation...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: He, Kang Ding, Yuzhe Li, Bobo Wang, Haining Li, Fei Teng, Chong Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China
Unsupervised sentence embedding learning excels through positive sample construction and instance-level contrastive learning (ICL). However, this approach can lead to over-compression and dimensional contamination fro... 详细信息
来源: 评论
NCRE: A Benchmark for Document-level Nominal Compound Relation Extraction  31
NCRE: A Benchmark for Document-level Nominal Compound Relati...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Cao, Jincheng Li, Bobo Liu, Jiang Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China
Entity and relation extraction is a conventional task in the field of information extraction. Existing work primarily focuses on detecting specific relations between entities, often constrained to particular fields an... 详细信息
来源: 评论
Network Intrusion Detection for Modern Smart Grids Based on Adaptive Online Incremental Learning
收藏 引用
IEEE Transactions on Smart Grid 2025年 第3期16卷 2541-2553页
作者: Lu, Qiuyu An, Kexin Li, Jun'e Wang, Jin Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China State Grid Hubei Electric Power Research Institute Energy Internet Research Center Wuhan430072 China
New and evolving cyber attacks against smart grids are emerging. This necessitates that the network intrusion detection systems (IDSs) have online learning ability. However, most existing methods struggle to handle ne... 详细信息
来源: 评论
Adaptive Early Warning Method of Cascading Failures Caused by Coordinated Cyber-Attacks
收藏 引用
CSEE Journal of Power and Energy Systems 2025年 第1期11卷 406-423页
作者: Yufei Wang June Li Jian Qiu Yangrong Chen Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan Hubei430072China China Electric Power Research Institute Beijing102209China Electric Power Planning&Engineering Institute Beijing 100120China
In order to accurately receive early warning of the cascading failures caused by coordinated cyber-attacks(CFCC)in grid cyber-physical systems(GCPS),an adaptive early warning method of CFCC is ***,the evolutionary mec... 详细信息
来源: 评论
A Very Compact and a Threshold Implementation of uBlock for Internet of Things
收藏 引用
Tsinghua Science and Technology 2025年 第5期30卷 2270-2283页
作者: Botao Liu Ming Tang Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China
The rapid proliferation of Internet of Things (IoT) devices necessitates lightweight cryptographic algorithms and their secure physical implementations. Masking, as a provably secure countermeasure against Side-Channe... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论