咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 96 篇 期刊文献

馆藏范围

  • 303 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 181 篇 工学
    • 146 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 53 篇 信息与通信工程
    • 22 篇 电气工程
    • 21 篇 生物工程
    • 15 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 11 篇 仪器科学与技术
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 7 篇 安全科学与工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 生物医学工程(可授...
    • 5 篇 化学工程与技术
  • 79 篇 理学
    • 47 篇 数学
    • 19 篇 生物学
    • 12 篇 物理学
    • 9 篇 系统科学
    • 5 篇 统计学(可授理学、...
  • 46 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 5 篇 法学
    • 5 篇 社会学
  • 7 篇 医学
    • 6 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 教育学
    • 4 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 semantics
  • 11 篇 blockchain
  • 9 篇 network security
  • 9 篇 accuracy
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 neural networks
  • 7 篇 image enhancemen...
  • 7 篇 optimization
  • 7 篇 petri nets
  • 7 篇 predictive model...
  • 7 篇 codes
  • 7 篇 protocols
  • 7 篇 federated learni...
  • 7 篇 cloud computing
  • 6 篇 transformers
  • 6 篇 servers
  • 6 篇 benchmark testin...

机构

  • 42 篇 shaanxi key labo...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 24 篇 the state key la...
  • 18 篇 institute of blo...
  • 11 篇 xi'an university...
  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 8 篇 shaanxi key labo...
  • 7 篇 department of co...
  • 7 篇 college of compu...
  • 7 篇 shaanxi key labo...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 school of comput...
  • 6 篇 college of infor...
  • 6 篇 shaanxi key labo...
  • 6 篇 shaanxi key labo...
  • 5 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 jin haiyan
  • 13 篇 li wei
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xiaoxue liu
  • 9 篇 shen yulong
  • 9 篇 qingqi pei
  • 9 篇 wenjiang ji
  • 8 篇 zhu lei
  • 8 篇 jingwei liu
  • 8 篇 haonan su
  • 8 篇 dong xuewen
  • 7 篇 zhao minghua

语言

  • 273 篇 英文
  • 28 篇 其他
  • 4 篇 中文
检索条件"机构=Shaanxi Key Laboratory of BlockChain and Security Computing"
303 条 记 录,以下是1-10 订阅
排序:
Privacy Preserving Algorithm for Spectrum Sensing in Cognitive Vehicle Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 30-42页
作者: Hongning LI Tonghui HU Jiexiong CHEN Xiuqiang WU Qingqi PEI Guangzhou Institute of Technology Xidian University Guangzhou CEPREI Shaanxi Key Laboratory of Blockchain and Secure Computing
The scarcity of spectrum resources fails to meet the increasing throughput demands of vehicular networks. There is an urgent need to maximize the utilization of spectrum bands in mobile networks. To ascertain the avai... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage System for Large Language Model Inference  23
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Chen, Weijian He, Shuibing Qu, Haoyang Zhang, Ruidong Yang, Siling Chen, Ping Zheng, Yi Huai, Baoxing Chen, Gang The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Huawei Cloud China
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
收藏 引用
China Communications 2024年 第7期21卷 212-223页
作者: Wang Shuo Chu Jiang Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge State Key Laboratory of Astronautic Dynamics Xi’an Satellite Control CenterXi’an 710043China State Key Laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China Shaanxi Key Laboratory of Blockchain and Secure Computing Xidian UniversityXi’an 710071China
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching *** reverse this asymmetric advantage,a new defense idea,called Moving T... 详细信息
来源: 评论
LeapGNN: Accelerating Distributed GNN Training Leveraging Feature-Centric Model Migration  23
LeapGNN: Accelerating Distributed GNN Training Leveraging Fe...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Chen, Weijian He, Shuibing Qu, Haoyang Zhang, Xuechen The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States
Distributed training of graph neural networks (GNNs) has become a crucial technique for processing large graphs. Prevalent GNN frameworks are model-centric, necessitating the transfer of massive graph vertex features ... 详细信息
来源: 评论
blockchain-Based Privacy-Preserving and Accountable Mobile Edge Outsourcing computing Framework for the Metaverse
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2024年 第2期9卷 711-724页
作者: Li, Chunpei Liu, Chen Liu, Peng Li, Xianxian Qiu, Wangjie Lei, Lei Jin, Yanli Guangxi Normal University Key Laboratory of Educational Blockchain and Intelligent Technology Ministry of Education Guangxi Key Lab of Multi-Source Information Mining and Security Guilin541004 China Zhongguancun Laboratory China Beihang University Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing China
Mobile Edge computing (MEC) enables Metaverse Terminal Devices (MTD) to perform complex tasks, including graphic rendering and physical simulation, by leveraging low-latency outsourced computing. However, existing res... 详细信息
来源: 评论
A Novel Cross-Chain Relay Method Based on Node Trust Evaluation  18th
A Novel Cross-Chain Relay Method Based on Node Trust Evalua...
收藏 引用
18th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2023
作者: Li, Yafeng Tuo, Wantao Hu, Qiaozu Ma, Lichuan China CETC Key Laboratory of Technology on Data Link Xi’an China Xidian University and Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an China
With the increasing complexity of blockchain network business requirements, there is a growing demand for interconnection mechanisms among different blockchains, leading to the emergence of cross-chain technology. Thi... 详细信息
来源: 评论
DP-DID: A Dynamic and Proactive Decentralized Identity System
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4999-5014页
作者: Yin, Jie Xiao, Yang Chen, Qian Lim, Yong zhi Liu, Xuefeng Pei, Qingqi Zhou, Jianying Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Singapore University of Technology and Design Department of Information Systems Technology and Design Tampines 487372 Singapore Xidian University State Key Laboratory of Integrated Services Network Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China
Decentralized identity (DID) is a transformative paradigm that leverages blockchain, decentralized identifiers and verifiable credentials (VCs) to enable self-sovereign and decentralized identity management with myria... 详细信息
来源: 评论
Differential Fault Attack on GIFT
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 669-675页
作者: XIE Min TIAN Feng LI Jiaqi State Key Laboratory of Integrated Services Networks Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing
GIFT, a lightweight block cipher proposed at CHES2017, has been widely cryptanalyzed this *** paper studies the differential diffusion characteristics of round function of GIFT at first, and proposes a random nibble-b... 详细信息
来源: 评论