咨询与建议

限定检索结果

文献类型

  • 491 篇 期刊文献
  • 194 篇 会议

馆藏范围

  • 685 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 278 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 77 篇 信息与通信工程
    • 58 篇 电气工程
    • 42 篇 控制科学与工程
    • 40 篇 化学工程与技术
    • 34 篇 生物工程
    • 33 篇 电子科学与技术(可...
    • 26 篇 机械工程
    • 26 篇 光学工程
    • 25 篇 网络空间安全
    • 20 篇 生物医学工程(可授...
    • 16 篇 核科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 土木工程
    • 12 篇 冶金工程
    • 12 篇 建筑学
  • 322 篇 理学
    • 167 篇 物理学
    • 121 篇 数学
    • 50 篇 化学
    • 44 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 96 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 24 篇 法学
    • 13 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 7 篇 教育学
  • 5 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 34 篇 hadrons
  • 17 篇 deep learning
  • 16 篇 feature extracti...
  • 15 篇 federated learni...
  • 12 篇 semantics
  • 12 篇 accuracy
  • 10 篇 hadron colliders
  • 10 篇 blockchain
  • 10 篇 branching fracti...
  • 10 篇 blockchains
  • 10 篇 privacy
  • 10 篇 training
  • 9 篇 smart contract
  • 9 篇 hadronic decays
  • 8 篇 security
  • 8 篇 bosons
  • 7 篇 deep neural netw...
  • 7 篇 particle decays
  • 7 篇 data models
  • 7 篇 robustness

机构

  • 138 篇 university of ch...
  • 126 篇 iccub universita...
  • 126 篇 infn sezione di ...
  • 126 篇 infn sezione di ...
  • 126 篇 yandex school of...
  • 126 篇 school of physic...
  • 126 篇 infn sezione di ...
  • 126 篇 infn sezione di ...
  • 126 篇 institute of par...
  • 125 篇 center for high ...
  • 124 篇 department of ph...
  • 124 篇 imperial college...
  • 123 篇 department of ph...
  • 123 篇 cavendish labora...
  • 123 篇 stfc rutherford ...
  • 121 篇 van swinderen in...
  • 121 篇 infn sezione di ...
  • 120 篇 infn sezione di ...
  • 119 篇 universiteit maa...
  • 118 篇 infn sezione di ...

作者

  • 85 篇 beiter a.
  • 85 篇 arzymatov k.
  • 85 篇 barter w.
  • 85 篇 brundu d.
  • 85 篇 bellee v.
  • 79 篇 bowcock t.j.v.
  • 79 篇 casse g.
  • 79 篇 aliouche z.
  • 79 篇 blake t.
  • 79 篇 borsato m.
  • 79 篇 betancourt c.
  • 79 篇 belin s.
  • 79 篇 afsharnia h.
  • 79 篇 boelhauve j.a.
  • 79 篇 belavin v.
  • 79 篇 bediaga i.
  • 79 篇 cali s.
  • 79 篇 amato s.
  • 79 篇 baryshnikov f.
  • 79 篇 bjørn m.

语言

  • 612 篇 英文
  • 67 篇 其他
  • 5 篇 中文
检索条件"机构=Hunan Key Laboratory of Data Science & Blockchain"
685 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
key-based data augmentation with curriculum learning for few-shot code search
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1475-1490页
作者: Zhang, Fan Peng, Manman Wu, Qiang Shen, Yuanyuan College of Computer Science and Electronic Engineering Hunan University Lushan South Road Hunan Province Changsha410082 China Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application Hunan University Lushan South Road Hunan Province Changsha410082 China
Given a natural language query, code search aims to find matching code snippets from a codebase. Recent works are mainly designed for mainstream programming languages with large amounts of training data. However, code... 详细信息
来源: 评论
Defending data Inference Attacks Against Machine Learning Models by Mitigating Prediction Distinguishability
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2687-2704页
作者: Yang, Ziqi Zhu, Yiran Wan, Jie Xiang, ChuXiao Tang, Tong Wang, Yilin Xu, Ruite Wang, Lijin Zhang, Fan Xu, Jiarong Qin, Zhan Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Institute of Blockchain and Data Security Hangzhou310027 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China Fudan University Department of Information Management and Business Intelligence Shanghai200437 China
Neural networks are vulnerable to data inference attacks, including the membership inference attack, the model inversion attack, and the attribute inference attack. In this paper, we propose PURIFIER to defend against... 详细信息
来源: 评论
Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 144-158页
作者: Zhang, Dengyong He, Ruiyi Liao, Xin Li, Feng Chen, Jiaxin Yang, Gaobo Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation the School of Computer and Communication Engineering Changsha410114 China Hunan University Changsha410082 China
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net... 详细信息
来源: 评论
Threshold Huffman-Based Covert Timing Channel Detection
收藏 引用
International Journal of Network Security 2025年 第1期27卷 61-71页
作者: Lin, Yuwei Chen, Yonghong Zhuang, Xiaolong Huang, Xuwen School of Computer Science and Technology Huaqiao University Fujian Xiamen361000 China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Fujian Xiamen361000 China
Network covert timing channels in computer networks evade effective detection by traditional security mechanisms such as firewalls, posing a significant threat to network security. However, most existing methods strug... 详细信息
来源: 评论
Controlled-source electromagnetic noise attenuation via a deep convolutional neural network and high-quality sounding curve screening mechanism
收藏 引用
Geophysics 2025年 第3期90卷 WA125-WA140页
作者: Liu, Yecheng Li, Diquan Li, Jin Zhang, Xian Central South University Monitoring Ministry of Education Key Laboratory of Metallogenic Prediction of Nonferrous Metals and Geological Environment Changsha China Hunan Provincial Key Laboratory of Non-ferrous Resources and Geological Hazard Detection Changsha China Central South University School of Geoscience and Info-physics Changsha China Hunan Normal University College of Information Science and Engineering Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha China Hunan University of Finance and Economics School of Information Technology and Management Hunan Provincial Key Laboratory of Finance & Economics Big Data Science and Technology Changsha China
Strong noise is one of the biggest challenges in controlled-source electromagnetic (CSEM) exploration, which severely affects the quality of the recorded signal. We develop a novel and effective CSEM noise attenuation... 详细信息
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators  31
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yang, Siling He, Shuibing Wang, Wenjiong Yin, Yanlong Wu, Tong Chen, Weijian Zhang, Xuechen Sun, Xian-He Feng, Dan The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States Illinois Institute of Technology United States Huazhong University of Science and Technology China Wuhan National Laboratory for Optoelectronics China
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
TCMS: A Multi-Sequence Log Parsing Method Based on Token Conversion
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 3028-3045页
作者: Wei, Mingkuan Wen, Jigang He, Shiming Xie, Kun Liang, Wei Xie, Gaogang Li, Kenli Zhu, Ziyu Hunan University Ministry of Education Key Laboratory of "Fusion Computing of Supercomputing and Artificial Intelligence" College of Computer Science and Electronics Engineering Changsha410012 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China Changsha University of Science and Technology School of Computer and Communication Engineering Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha410114 China Beijing100045 China Columbia University Electrical Engineering New YorkNY10027 United States
Detailed system operations are recorded in logs. To ensure system reliability, developers can detect system anomalies through log anomaly detection. Log parsing, which converts semi-structured log messages into struct... 详细信息
来源: 评论
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Ziwei Lin, Feng Ba, Zhongjie Lu, Li Ren, Kui Zhejiang University State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology China Institute of Blockchain and Data Security Hangzhou China
Physical adversarial examples (AEs) have become an increasing threat to deploying deep neural network (DNN) models in the real world. Popular approaches adopt sticking-based or projecting-based strategies that stick t... 详细信息
来源: 评论
How Do Recommendation Models Amplify Popularity Bias? An Analysis from the Spectral Perspective  25
How Do Recommendation Models Amplify Popularity Bias? An Ana...
收藏 引用
18th ACM International Conference on Web Search and data Mining, WSDM 2025
作者: Lin, Siyi Gao, Chongming Chen, Jiawei Zhou, Sheng Hu, Binbin Feng, Yan Chen, Chun Wang, Can Zhejiang University Hangzhou China University of Science and Technology of China Hefei China Ant Group Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Institute of Blockchain and Data Security Zhejiang University Hangzhou China
Recommendation Systems (RS) are often plagued by popularity bias. When training a recommendation model on a typically long-tailed dataset, the model tends to not only inherit this bias but often exacerbate it, resulti... 详细信息
来源: 评论