咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 99 篇 期刊文献

馆藏范围

  • 313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 190 篇 工学
    • 154 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 56 篇 信息与通信工程
    • 24 篇 电气工程
    • 21 篇 生物工程
    • 17 篇 电子科学与技术(可...
    • 17 篇 控制科学与工程
    • 15 篇 机械工程
    • 11 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 7 篇 交通运输工程
    • 7 篇 安全科学与工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 84 篇 理学
    • 49 篇 数学
    • 19 篇 生物学
    • 15 篇 物理学
    • 9 篇 系统科学
    • 6 篇 化学
    • 6 篇 统计学(可授理学、...
  • 45 篇 管理学
    • 25 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 9 篇 法学
    • 5 篇 法学
    • 5 篇 社会学
  • 7 篇 医学
    • 6 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 semantics
  • 11 篇 blockchain
  • 9 篇 network security
  • 9 篇 accuracy
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 neural networks
  • 7 篇 image enhancemen...
  • 7 篇 optimization
  • 7 篇 petri nets
  • 7 篇 predictive model...
  • 7 篇 codes
  • 7 篇 protocols
  • 7 篇 federated learni...
  • 7 篇 cloud computing
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 servers

机构

  • 43 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 36 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 27 篇 the state key la...
  • 18 篇 institute of blo...
  • 11 篇 xi'an university...
  • 11 篇 state key labora...
  • 10 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 7 篇 college of compu...
  • 7 篇 hangzhou high-te...
  • 7 篇 department of co...
  • 7 篇 college of compu...
  • 7 篇 college of compu...
  • 7 篇 shaanxi key labo...
  • 7 篇 college of xi'an...
  • 6 篇 shaanxi key labo...
  • 6 篇 xi'an university...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 18 篇 hei xinhong
  • 15 篇 haiyan jin
  • 13 篇 li wei
  • 13 篇 jin haiyan
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xiaoxue liu
  • 9 篇 shen yulong
  • 9 篇 qingqi pei
  • 9 篇 wenjiang ji
  • 8 篇 zhu lei
  • 8 篇 jingwei liu
  • 8 篇 haonan su
  • 8 篇 dong xuewen
  • 7 篇 zhao minghua

语言

  • 270 篇 英文
  • 41 篇 其他
  • 4 篇 中文
检索条件"机构=Shaanxi Key Laboratory of BlockChain and Security Computing"
313 条 记 录,以下是41-50 订阅
排序:
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
CoKV: Optimizing KV Cache Allocation via Cooperative Game
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Qiheng Zhang, Hongwei Xia, Haocheng Zhang, Jiayao Liu, Jinfei Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data China Security China Siebel School of Computing and Data Science University of Illinois Urbana-Champaign United States
Large language models (LLMs) have achieved remarkable success on various aspects of human life. However, one of the major challenges in deploying these models is the substantial memory consumption required to store ke... 详细信息
来源: 评论
BPVFL: A Bidirectional Privacy-Preserving Verifiable Federated Learning Framework with Homomorphic Encryption
BPVFL: A Bidirectional Privacy-Preserving Verifiable Federat...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Liu, Jingwei Chen, Sijing Zhu, Junrong Sun, Rong Du, Xiaojiang Guizani, Mohsen Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Xidian University State Key Laboratory of Isn Xi'an710071 China Stevens Institute of Technology Department of Electrical and Computer Engineering Hoboken United States Department of Machine Learning Abu Dhabi999041 United Arab Emirates
Federated learning, while advancing data privacy, faces risks of sensitive information leakage through parameter updates, making it susceptible to inference and data reconstruction attacks. Fraudulent behaviors by cen... 详细信息
来源: 评论
Design and implementation of handlebar defect detection method based on machine recognition
Design and implementation of handlebar defect detection meth...
收藏 引用
2024 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2024
作者: Zhang, Tong Ren, Sunan Zhang, Wenjing Liu, Yajun School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an 710048 China
As an important part of electric vehicles, handlebar installation defects are an important factor in the failure of electric vehicles. In the production process, many large-scale manufacturers still assemble the handl... 详细信息
来源: 评论
Defense Against Adversarial Attacks via Adversarial Noise Denoising Networks in Image Recognition
Defense Against Adversarial Attacks via Adversarial Noise De...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Li, Chengxuan Yang, Zhou Xiao, Yang Liu, Haozhao Zhang, Yuning Pei, Qingqi Xidian University State Key Laboratory of Integrated Services Networks Xi'an China School of Telecommunications Engineering Xidian University Xi'an China School of Cyber Engineering Xidian University Xi'an China Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an China
Deep learning-based image recognition technology has significantly advanced the development of modern industrial intelligence. However, the issue of image adversarial examples that follows has gradually garnered the a... 详细信息
来源: 评论
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: He, Yu Li, Boheng Liu, Liu Ba, Zhongjie Dong, Wei Li, Yiming Qin, Zhan Ren, Kui Chen, Chun The State Key Laboratory of Blockchain and Data Security Zhejiang University China College of Computing and Data Science Nanyang Technological University Singapore
Membership Inference Attacks (MIAs) aim to predict whether a data sample belongs to the model’s training set or not. Although prior research has extensively explored MIAs in Large Language Models (LLMs), they typical... 详细信息
来源: 评论
Channel Capacity Analysis for Diffusive Molecular Communication with a Partly Covered Comprehensive Reactive Receiver
Channel Capacity Analysis for Diffusive Molecular Communicat...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhu, Junning Liao, Xuening Wu, Zhenqiang Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Shaanxi Xi’an710048 China
Molecular communication (MC) is a technology that utilizes microscopic particles such as molecules to communicate at the microscopic scale in living organisms. The nanomachine receiver as a critical part of MC has bee... 详细信息
来源: 评论
A Channel-Wise Guidance Sparse Transformer for Effective Dark Image Enhancement
A Channel-Wise Guidance Sparse Transformer for Effective Dar...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Haiyan Jin Yifan Shuai Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Dark Image Enhancement (DIE) aims to improve contrast and restore details for captured images under low illumination. Currently, traditional Transformer methods have achieved significant performance in the DIE problem... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned blockchains
收藏 引用
IEEE Transactions on Computers 2025年 第07期74卷 2168-2182页
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong Xidian University School of Computer Science and Technology China Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China Jiangxi University of Finance and Economics School of Computing Nanchang330013 China Jiangxi University of Finance and Economics Nanchang330013 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
FSVM: Federated Support Vector Machines for Smart City  17th
FSVM: Federated Support Vector Machines for Smart City
收藏 引用
17th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2022
作者: Ma, Lichuan Tang, Lizhen Gao, Longxiang Pei, Qingqi Ding, Ming Shannxi Key Laboratory of Blockchain and Secure Computing Xidian University Xi’an China Qilu University Jinan China Information Privacy and Security Group Data61 Commonwealth Scientific and Industrial Research Organization Silicon Valley Australia
By putting digital technology and vast volume of data together, smart city becomes an emerging city paradigm for intelligent city management and operation. As one of the most popular artificial intelligent algorithms,... 详细信息
来源: 评论