咨询与建议

限定检索结果

文献类型

  • 480 篇 期刊文献
  • 192 篇 会议

馆藏范围

  • 672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 423 篇 工学
    • 270 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 73 篇 信息与通信工程
    • 51 篇 电气工程
    • 40 篇 控制科学与工程
    • 40 篇 化学工程与技术
    • 34 篇 生物工程
    • 33 篇 电子科学与技术(可...
    • 25 篇 光学工程
    • 24 篇 机械工程
    • 23 篇 网络空间安全
    • 20 篇 生物医学工程(可授...
    • 16 篇 核科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 土木工程
    • 12 篇 冶金工程
    • 12 篇 建筑学
  • 316 篇 理学
    • 166 篇 物理学
    • 119 篇 数学
    • 50 篇 化学
    • 43 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 14 篇 系统科学
  • 93 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 33 篇 医学
    • 25 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 24 篇 法学
    • 13 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 7 篇 教育学
  • 5 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 34 篇 hadrons
  • 16 篇 deep learning
  • 16 篇 feature extracti...
  • 15 篇 federated learni...
  • 11 篇 semantics
  • 11 篇 accuracy
  • 10 篇 hadron colliders
  • 10 篇 blockchain
  • 10 篇 branching fracti...
  • 10 篇 blockchains
  • 10 篇 privacy
  • 9 篇 smart contract
  • 9 篇 training
  • 9 篇 hadronic decays
  • 8 篇 security
  • 8 篇 bosons
  • 7 篇 deep neural netw...
  • 7 篇 particle decays
  • 7 篇 data models
  • 7 篇 robustness

机构

  • 138 篇 university of ch...
  • 126 篇 iccub universita...
  • 126 篇 infn sezione di ...
  • 126 篇 infn sezione di ...
  • 126 篇 yandex school of...
  • 126 篇 school of physic...
  • 126 篇 infn sezione di ...
  • 126 篇 infn sezione di ...
  • 126 篇 institute of par...
  • 126 篇 center for high ...
  • 124 篇 department of ph...
  • 124 篇 imperial college...
  • 123 篇 department of ph...
  • 123 篇 cavendish labora...
  • 123 篇 stfc rutherford ...
  • 121 篇 van swinderen in...
  • 121 篇 infn sezione di ...
  • 120 篇 infn sezione di ...
  • 119 篇 universiteit maa...
  • 118 篇 infn sezione di ...

作者

  • 85 篇 beiter a.
  • 85 篇 arzymatov k.
  • 85 篇 barter w.
  • 85 篇 brundu d.
  • 85 篇 bellee v.
  • 79 篇 bowcock t.j.v.
  • 79 篇 casse g.
  • 79 篇 aliouche z.
  • 79 篇 blake t.
  • 79 篇 borsato m.
  • 79 篇 betancourt c.
  • 79 篇 belin s.
  • 79 篇 afsharnia h.
  • 79 篇 boelhauve j.a.
  • 79 篇 belavin v.
  • 79 篇 bediaga i.
  • 79 篇 cali s.
  • 79 篇 amato s.
  • 79 篇 baryshnikov f.
  • 79 篇 bjørn m.

语言

  • 602 篇 英文
  • 64 篇 其他
  • 5 篇 中文
检索条件"机构=Hunan Key Laboratory of Data Science & Blockchain"
672 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
key-based data augmentation with curriculum learning for few-shot code search
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1475-1490页
作者: Zhang, Fan Peng, Manman Wu, Qiang Shen, Yuanyuan College of Computer Science and Electronic Engineering Hunan University Lushan South Road Hunan Province Changsha410082 China Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application Hunan University Lushan South Road Hunan Province Changsha410082 China
Given a natural language query, code search aims to find matching code snippets from a codebase. Recent works are mainly designed for mainstream programming languages with large amounts of training data. However, code... 详细信息
来源: 评论
Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 144-158页
作者: Zhang, Dengyong He, Ruiyi Liao, Xin Li, Feng Chen, Jiaxin Yang, Gaobo Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation the School of Computer and Communication Engineering Changsha410114 China Hunan University Changsha410082 China
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net... 详细信息
来源: 评论
Threshold Huffman-Based Covert Timing Channel Detection
收藏 引用
International Journal of Network Security 2025年 第1期27卷 61-71页
作者: Lin, Yuwei Chen, Yonghong Zhuang, Xiaolong Huang, Xuwen School of Computer Science and Technology Huaqiao University Fujian Xiamen361000 China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Fujian Xiamen361000 China
Network covert timing channels in computer networks evade effective detection by traditional security mechanisms such as firewalls, posing a significant threat to network security. However, most existing methods strug... 详细信息
来源: 评论
Controlled-source electromagnetic noise attenuation via a deep convolutional neural network and high-quality sounding curve screening mechanism
收藏 引用
Geophysics 2025年 第3期90卷 WA125-WA140页
作者: Liu, Yecheng Li, Diquan Li, Jin Zhang, Xian Central South University Monitoring Ministry of Education Key Laboratory of Metallogenic Prediction of Nonferrous Metals and Geological Environment Changsha China Hunan Provincial Key Laboratory of Non-ferrous Resources and Geological Hazard Detection Changsha China Central South University School of Geoscience and Info-physics Changsha China Hunan Normal University College of Information Science and Engineering Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha China Hunan University of Finance and Economics School of Information Technology and Management Hunan Provincial Key Laboratory of Finance & Economics Big Data Science and Technology Changsha China
Strong noise is one of the biggest challenges in controlled-source electromagnetic (CSEM) exploration, which severely affects the quality of the recorded signal. We develop a novel and effective CSEM noise attenuation... 详细信息
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators  31
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yang, Siling He, Shuibing Wang, Wenjiong Yin, Yanlong Wu, Tong Chen, Weijian Zhang, Xuechen Sun, Xian-He Feng, Dan The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States Illinois Institute of Technology United States Huazhong University of Science and Technology China Wuhan National Laboratory for Optoelectronics China
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Ziwei Lin, Feng Ba, Zhongjie Lu, Li Ren, Kui Zhejiang University State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology China Institute of Blockchain and Data Security Hangzhou China
Physical adversarial examples (AEs) have become an increasing threat to deploying deep neural network (DNN) models in the real world. Popular approaches adopt sticking-based or projecting-based strategies that stick t... 详细信息
来源: 评论
SecureCut: Federated Gradient Boosting Decision Trees with Efficient Machine Unlearning  27th
SecureCut: Federated Gradient Boosting Decision Trees with ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Li, Bowen Zhang, Jian Li, Jie Wu, Chentao Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Yancheng Blockchain Research Institute Yancheng China Blockchain Advanced Research Center Shanghai China Shanghai Key Laboratory of Trusted Data Circulation and Governance and Web3 Shanghai China
In response to legislation, companies are now mandated to honor the right to be forgotten by erasing user data. Consequently, it has become imperative to enable data removal in Vertical Federated Learning (VFL), where... 详细信息
来源: 评论
Fake Face Detection Based on Fusion of Spatial Texture and High-Frequency Noise
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 212-221页
作者: Dengyong Zhang Feifan Qi Jiahao Chen Jiaxin Chen Rongrong Gong Yuehong Tian Lebing Zhang Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Changsha University of Science and Technology School of Computer and Communication Engineering Changsha University of Science and Technology Changsha Social Work College Changkuangao Beijing Technology Co. Ltd. School of Computer and Artificial Intelligence Huaihua University
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the... 详细信息
来源: 评论
CPAKE: Dynamic Batch Authenticated key Exchange with Conditional Privacy  24th
CPAKE: Dynamic Batch Authenticated Key Exchange with Condit...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xiang, Axin Tian, Youliang Xiong, Jinbo Ying, Zuobin Peng, Changgen State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology Guiyang550025 China Industrial School of Joint Innovation Quanzhou Vocational and Technical University Quanzhou362268 China Faculty of Data Science City University of Macau 999078 China
Authenticated key exchange (AKE) needs to be designed for realizing point-to-multipoint secure communications in blockchain networks (BNet). However, since BNet is open, untrusted and decentralized, traditional certif... 详细信息
来源: 评论