咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 92 篇 期刊文献

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 177 篇 工学
    • 143 篇 计算机科学与技术...
    • 130 篇 软件工程
    • 52 篇 信息与通信工程
    • 21 篇 电气工程
    • 21 篇 生物工程
    • 15 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 12 篇 控制科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 网络空间安全
    • 7 篇 交通运输工程
    • 7 篇 安全科学与工程
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 化学工程与技术
  • 79 篇 理学
    • 47 篇 数学
    • 19 篇 生物学
    • 12 篇 物理学
    • 9 篇 系统科学
    • 5 篇 统计学(可授理学、...
  • 45 篇 管理学
    • 25 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 9 篇 法学
    • 5 篇 法学
    • 5 篇 社会学
  • 7 篇 医学
    • 6 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 教育学
    • 4 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 semantics
  • 11 篇 blockchain
  • 9 篇 network security
  • 9 篇 accuracy
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 neural networks
  • 7 篇 image enhancemen...
  • 7 篇 optimization
  • 7 篇 petri nets
  • 7 篇 predictive model...
  • 7 篇 codes
  • 7 篇 protocols
  • 7 篇 federated learni...
  • 7 篇 cloud computing
  • 6 篇 transformers
  • 6 篇 servers
  • 6 篇 benchmark testin...

机构

  • 42 篇 shaanxi key labo...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 24 篇 the state key la...
  • 18 篇 institute of blo...
  • 11 篇 xi'an university...
  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 8 篇 shaanxi key labo...
  • 7 篇 department of co...
  • 7 篇 college of compu...
  • 7 篇 shaanxi key labo...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 school of comput...
  • 6 篇 college of infor...
  • 6 篇 shaanxi key labo...
  • 6 篇 shaanxi key labo...
  • 5 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 13 篇 li wei
  • 13 篇 jin haiyan
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xiaoxue liu
  • 9 篇 shen yulong
  • 9 篇 qingqi pei
  • 9 篇 wenjiang ji
  • 8 篇 zhu lei
  • 8 篇 jingwei liu
  • 8 篇 haonan su
  • 8 篇 dong xuewen
  • 7 篇 zhao minghua

语言

  • 269 篇 英文
  • 28 篇 其他
  • 4 篇 中文
检索条件"机构=Shaanxi Key Laboratory of BlockChain and Security Computing"
299 条 记 录,以下是51-60 订阅
排序:
Patch is enough: naturalistic adversarial patch against vision-language pre-training models
收藏 引用
Visual Intelligence 2024年 第1期2卷 1-10页
作者: Kong, Dehong Liang, Siyuan Zhu, Xiaopeng Zhong, Yuansheng Ren, Wenqi School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen 518107 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou 310058 China School of Computing National University of Singapore Singapore 119077 Singapore Guangdong Testing Institute of Product Quality Supervision Guangzhou 510670 China
Visual language pre-training (VLP) models have demonstrated significant success in various domains, but they remain vulnerable to adversarial attacks. Addressing these adversarial vulnerabilities is crucial for enhanc... 详细信息
来源: 评论
TCS security Analysis in Intel SGX Enclave MultiThreading
TCS Security Analysis in Intel SGX Enclave MultiThreading
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Tong Cui, Xiangjie Wang, Yichuan Du, Yanning Gao, Wen School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the rapid development of Internet Technology in recent years, the demand for security support for complex applications is becoming stronger and stronger. Intel Software Guard Extensions (Intel SGX) is created as ... 详细信息
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Siling Yang Shuibing He Wenjiong Wang Yanlong Yin Tong Wu Weijian Chen Xuechen Zhang Xian-He Sun Dan Feng The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Lab Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Zhejiang Key Laboratory of Big Data Intelligent Computing Washington State University Vancouver Illinois Institute of Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
Non-IID Federated Learning Based on Global Knowledge Sharing Without Out-of-Domain Data  8
Non-IID Federated Learning Based on Global Knowledge Sharing...
收藏 引用
8th IEEE International Conference on Network Intelligence and Digital Content, IC-NIDC 2023
作者: Zhang, Yufei Xu, Tianxing Dong, Jin Tang, Lin Andrzejak, Artur Yao, Zelei Zhu, Konglin Beijing Academy of Blockchain and Edge Computing China Heidelberg University Heidelberg69120 Germany School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China Guangdong Provincial Key Laboratory of Novel Security Inteligence Technologies China
Federated learning (FL) supports collaborative training of deep learning models on distributed data. The non-independent and identically distribution (non-IID) of user data brings great challenges to FL, which may cau... 详细信息
来源: 评论
TPIA: Towards Target-specific Prompt Injection Attack against Code-oriented Large Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yuchen Yao, Hongwei Yang, Bingrun He, Yiling Li, Yiming Zhang, Tianwei Qin, Zhan State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou310007 China Institute of Blockchain and Data Security Hangzhou310053 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
Recently, code-oriented large language models (Code LLMs) have been widely and successfully exploited to simplify and facilitate programming. Unfortunately, a few pioneering works revealed that these Code LLMs are vul... 详细信息
来源: 评论
A Multi-Exposure Generation and Fusion Method for Low-Light Image Enhancement
A Multi-Exposure Generation and Fusion Method for Low-Light ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Haiyan Jin Long Li Haonan Su YuanLin Zhang ZhaoLin Xiao Bin Wang Faculty of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In the low light image enhancement, single exposure images contains a limited dynamic range, which hinders the restoration of contrast and texture. To address these problems, we propose a multi exposure generation and... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
Adaptive Compression-Encryption Scheme for Medical Image Based on Improved Compressive Sensing and Deoxyribonucleic Acid Coding-Compression
Adaptive Compression-Encryption Scheme for Medical Image Bas...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Xue, Xianglian Jin, Haiyan Zhou, Changjun Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi University of Chinese Medicine Section of Computer Teaching and Research Xianyang China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Zhejiang Normal University School of Computer Science and Technology Jinhua China
Medical images often occupy large storage space and contain patient privacy or sensitive information, which makes them difficult and unsafe to be transmitted through the network. This paper proposed an adaptive compre... 详细信息
来源: 评论
FIT-Print: Towards False-claim-resistant Model Ownership Verification via Targeted Fingerprint
arXiv
收藏 引用
arXiv 2025年
作者: Shao, Shuo Zhu, Haozhe Yao, Hongwei Li, Yiming Zhang, Tianwei Qin, Zhan Ren, Kui State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Department of Computer Science City University of Hong Kong Hong Kong College of Computing and Data Science Nanyang Technological University Singapore
Model fingerprinting is a widely adopted approach to safeguard the intellectual property rights of open-source models by preventing their unauthorized reuse. It is promising and convenient since it does not necessitat... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论