咨询与建议

限定检索结果

文献类型

  • 490 篇 期刊文献
  • 216 篇 会议

馆藏范围

  • 706 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 444 篇 工学
    • 286 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 80 篇 信息与通信工程
    • 54 篇 电气工程
    • 51 篇 控制科学与工程
    • 40 篇 化学工程与技术
    • 34 篇 电子科学与技术(可...
    • 34 篇 生物工程
    • 25 篇 光学工程
    • 25 篇 网络空间安全
    • 24 篇 机械工程
    • 21 篇 生物医学工程(可授...
    • 16 篇 核科学与技术
    • 15 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 12 篇 冶金工程
  • 321 篇 理学
    • 167 篇 物理学
    • 122 篇 数学
    • 50 篇 化学
    • 43 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 97 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 33 篇 医学
    • 25 篇 临床医学
  • 24 篇 法学
    • 13 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 7 篇 教育学
  • 5 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 34 篇 hadrons
  • 18 篇 deep learning
  • 17 篇 feature extracti...
  • 15 篇 federated learni...
  • 12 篇 accuracy
  • 11 篇 semantics
  • 11 篇 blockchain
  • 11 篇 privacy
  • 10 篇 hadron colliders
  • 10 篇 branching fracti...
  • 10 篇 blockchains
  • 9 篇 smart contract
  • 9 篇 security
  • 9 篇 training
  • 9 篇 hadronic decays
  • 8 篇 data models
  • 8 篇 bosons
  • 7 篇 deep neural netw...
  • 7 篇 particle decays
  • 7 篇 robustness

机构

  • 138 篇 university of ch...
  • 126 篇 iccub universita...
  • 126 篇 infn sezione di ...
  • 126 篇 infn sezione di ...
  • 126 篇 yandex school of...
  • 126 篇 school of physic...
  • 126 篇 infn sezione di ...
  • 126 篇 infn sezione di ...
  • 126 篇 institute of par...
  • 125 篇 center for high ...
  • 124 篇 department of ph...
  • 124 篇 imperial college...
  • 123 篇 department of ph...
  • 123 篇 cavendish labora...
  • 123 篇 stfc rutherford ...
  • 121 篇 van swinderen in...
  • 121 篇 infn sezione di ...
  • 120 篇 infn sezione di ...
  • 119 篇 universiteit maa...
  • 118 篇 infn sezione di ...

作者

  • 85 篇 beiter a.
  • 85 篇 arzymatov k.
  • 85 篇 barter w.
  • 85 篇 brundu d.
  • 85 篇 bellee v.
  • 79 篇 bowcock t.j.v.
  • 79 篇 casse g.
  • 79 篇 aliouche z.
  • 79 篇 blake t.
  • 79 篇 borsato m.
  • 79 篇 betancourt c.
  • 79 篇 belin s.
  • 79 篇 afsharnia h.
  • 79 篇 boelhauve j.a.
  • 79 篇 belavin v.
  • 79 篇 bediaga i.
  • 79 篇 cali s.
  • 79 篇 amato s.
  • 79 篇 baryshnikov f.
  • 79 篇 bjørn m.

语言

  • 605 篇 英文
  • 94 篇 其他
  • 7 篇 中文
检索条件"机构=Hunan Key Laboratory of Data Science & Blockchain"
706 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
key-based data augmentation with curriculum learning for few-shot code search
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1475-1490页
作者: Zhang, Fan Peng, Manman Wu, Qiang Shen, Yuanyuan College of Computer Science and Electronic Engineering Hunan University Lushan South Road Hunan Province Changsha410082 China Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application Hunan University Lushan South Road Hunan Province Changsha410082 China
Given a natural language query, code search aims to find matching code snippets from a codebase. Recent works are mainly designed for mainstream programming languages with large amounts of training data. However, code... 详细信息
来源: 评论
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for Time Series Forecasting  38
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shang, Zongjiang Chen, Ling Wu, Binqing Cui, Dongliang State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Although transformer-based methods have achieved great success in multi-scale temporal pattern interaction modeling, two key challenges limit their further development: (1) Individual time points contain less semantic...
来源: 评论
A2PO: Towards Effective Offline Reinforcement Learning from an Advantage-aware Perspective  38
A2PO: Towards Effective Offline Reinforcement Learning from ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qing, Yunpeng Liu, Shunyu Cong, Jingyuan Chen, Kaixuan Zhou, Yihe Song, Mingli College of Computer Science and Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Offline reinforcement learning endeavors to leverage offline datasets to craft effective agent policy without online interaction, which imposes proper conservative constraints with the support of behavior policies to ...
来源: 评论
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowledge Graph Representation Learning Approach  38
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowl...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Qian Chen, Ling State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Temporal Knowledge Graph (TKG) representation learning aims to map temporal evolving entities and relations to embedded representations in a continuous low-dimensional vector space. However, existing approaches cannot...
来源: 评论
Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 144-158页
作者: Zhang, Dengyong He, Ruiyi Liao, Xin Li, Feng Chen, Jiaxin Yang, Gaobo Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation the School of Computer and Communication Engineering Changsha410114 China Hunan University Changsha410082 China
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net... 详细信息
来源: 评论
Encrypted Network Traffic Detection Based on blockchain and Federated Learning  4
Encrypted Network Traffic Detection Based on Blockchain and ...
收藏 引用
4th International Conference on blockchain Technology and Information Security, ICBCTIS 2024
作者: Liu, Wei Cui, Wentao She, Wei Tian, Zhao School of Cyber Science and Engineering Zhengzhou University Henan Key Laboratory of Network Cryptography Technology Zhengzhou Key Laboratory of Blockchain and Data Intelligence Zhengzhou China School of Cyber Science and Engineering Zhengzhou University Zhengzhou China School of Cyber Science and Engineering Zhengzhou University Zhengzhou Key Laboratory of Blockchain and Data Intelligence Zhengzhou China
In recent years, encrypted malicious traffic has significantly threatened network security. Deep learning offers a viable solution for feature extraction, but its accuracy depends on data volume, and traffic data vari... 详细信息
来源: 评论
Visual abstraction of dynamic network via improved multi-class blue noise sampling
收藏 引用
Frontiers of Computer science 2023年 第1期17卷 171-185页
作者: Yanni PENG Xiaoping FAN Rong CHEN Ziyao YU Shi LIU Yunpeng CHEN Ying ZHAO Fangfang ZHOU School of Computer Science and Engineering Central South UniversityChangsha 410083China Institute of Big Data Hunan University of Finance and EconomicsChangsha 410205China Rail Data Research and Application Key Laboratory of Hunan Province Changsha 410083China
Massive sequence view (MSV) is a classic timeline-based dynamic network visualization approach. However, it is vulnerable to visual clutter caused by overlapping edges, thereby leading to unexpected misunderstanding o... 详细信息
来源: 评论
Threshold Huffman-Based Covert Timing Channel Detection
收藏 引用
International Journal of Network Security 2025年 第1期27卷 61-71页
作者: Lin, Yuwei Chen, Yonghong Zhuang, Xiaolong Huang, Xuwen School of Computer Science and Technology Huaqiao University Fujian Xiamen361000 China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Fujian Xiamen361000 China
Network covert timing channels in computer networks evade effective detection by traditional security mechanisms such as firewalls, posing a significant threat to network security. However, most existing methods strug... 详细信息
来源: 评论
Cross-modality Information Check for Detecting Jailbreaking in Multimodal Large Language Models
Cross-modality Information Check for Detecting Jailbreaking ...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Xu, Yue Qi, Xiuyuan Qin, Zhan Wang, Wenjie School of Information Science and Technology ShanghaiTech University China The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Multimodal Large Language Models (MLLMs) extend the capacity of LLMs to understand multimodal information comprehensively, achieving remarkable performance in many vision-centric tasks. Despite that, recent studies ha...
来源: 评论