咨询与建议

限定检索结果

文献类型

  • 443 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 621 篇 工学
    • 509 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 117 篇 信息与通信工程
    • 65 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 安全科学与工程
    • 21 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
  • 239 篇 理学
    • 140 篇 数学
    • 47 篇 生物学
    • 46 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 15 篇 化学
  • 142 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 7 篇 教育学
  • 3 篇 文学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 22 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 176 篇 the state key la...
  • 105 篇 state key labora...
  • 85 篇 state key labora...
  • 78 篇 institute of blo...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 28 篇 hangzhou high-te...
  • 26 篇 zhejiang univers...
  • 21 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 698 篇 英文
  • 159 篇 其他
  • 7 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
863 条 记 录,以下是101-110 订阅
排序:
Joint Decision Network with Modality-Specific and Dual Interactive Features for Fake News Detection  31st
Joint Decision Network with Modality-Specific and Dual Int...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Wu, Fei Zhou, Ruixuan Ji, Yimu Jing, Xiao-Yuan Nanjing University of Posts and Telecommunications Nanjing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang China Guangdong University of Petrochemical Technology Maoming China Wuhan University Wuhan China
Fake news detection has achieved considerable progress in recent years, especially since multi-modal information was considered. However, most methods concentrate on feature-level inter-modal interaction and fusion, w... 详细信息
来源: 评论
Preventing the Popular Item Embedding Based Attack in Federated Recommendations  40
Preventing the Popular Item Embedding Based Attack in Federa...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Zhang, Jun Li, Huan Rong, Dazhong Zhao, Yan Chen, Ke Shou, Lidan Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Aalborg University Department of Computer Science Aalborg Denmark
Privacy concerns have led to the rise of federated recommender systems (FRS), which can create personalized models across distributed clients. However, FRS is vulnerable to poisoning attacks, where malicious users man... 详细信息
来源: 评论
PipeCo: Pipelining Cold Start of Deep Learning Inference Services on Serverless Platforms
收藏 引用
Proceedings of the ACM on Measurement and Analysis of Computing Systems 2025年 第2期9卷 1-23页
作者: Jiaang Duan Shiyou Qian Hanwen Hu Dingyu Yang Jian Cao Guangtao Xue Shanghai Jiao Tong University Shanghai China The State Key Laboratory of Blockchain and Data Security Zhejiang University Shanghai China
The fusion of serverless computing and deep learning (DL) has led to serverless inference, offering a promising approach for developing and deploying scalable and cost-efficient deep learning inference services (DLISs... 详细信息
来源: 评论
Learning a Mini-Batch Graph Transformer via Two-Stage Interaction Augmentation  27
Learning a Mini-Batch Graph Transformer via Two-Stage Intera...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Li, Wenda Chen, Kaixuan Liu, Shunyu Zheng, Tongya Huang, Wenjie Song, Mingli State Key Laboratory of Blockchain and Security Zhejiang University China School of Software Technology Zhejiang University China Institute of Blockchain and Data Security China Big Graph Center School of Computer and Computing Science Hangzhou City University China College of Computer Science and Technology Zhejiang University Hangzhou China
Mini-batch Graph Transformer (MGT), as an emerging graph learning model, has demonstrated significant advantages in semi-supervised node prediction tasks with improved computational efficiency and enhanced model robus... 详细信息
来源: 评论
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations
收藏 引用
IEEE Symposium on security and Privacy
作者: Zhelei Zhou Yun Li Yuchen Wang Zhaomin Yang Bingsheng Zhang Cheng Hong Tao Wei Wenguang Chen Zhejiang University Ant Group State Key Laboratory of Blockchain and Data Security & Hangzhou High-Tech Zone Binjiang Institute of Blockchain and Data Security Hangzhou China
Homomorphic Encryption (HE) allows computations on encrypted data without decryption. It can be used where the users' information are to be processed by an untrustful server, and has been a popular choice in priva... 详细信息
来源: 评论
Improving Retrieval-Augmented Code Comment Generation by Retrieving for Generation
Improving Retrieval-Augmented Code Comment Generation by Ret...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Hanzhen Lu Zhongxin Liu The State Key Laboratory of Blockchain and Data Security Zhejiang University China Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security China
Code comment generation aims to generate high-quality comments from source code automatically and has been studied for years. Recent studies proposed to integrate information retrieval techniques with neural generatio... 详细信息
来源: 评论
PS3: Precise Patch Presence Test Based on Semantic Symbolic Signature  24
PS3: Precise Patch Presence Test Based on Semantic Symbolic ...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Zhan, Qi Hu, Xing Li, Zhiyang Xia, Xin Lo, David Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China Singapore Management University Singapore
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论
DECRL: a deep evolutionary clustering jointed temporal knowledge graph representation learning approach  24
DECRL: a deep evolutionary clustering jointed temporal knowl...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Qian Chen Ling Chen State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University
Temporal Knowledge Graph (TKG) representation learning aims to map temporal evolving entities and relations to embedded representations in a continuous low-dimensional vector space. However, existing approaches cannot...
来源: 评论
LAPAA: A Secure and Lightweight Authentication Protocol for Edge Computing Built on ASCON Algorithm  6
LAPAA: A Secure and Lightweight Authentication Protocol for ...
收藏 引用
6th International Conference on Next Generation data-Driven Networks, NGDN 2024
作者: Zhang, Linghui Zhou, Changli Wen, Jingliang HuaQiao University College of Computer Science and Technology Xiamen361021 China HuaQiao University Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China
Facing the challenges of next-generation network security, Mobile Edge Computing (MEC) serves as a decentralized model designed to meet the growing demands for data processing and reduce latency, making its security i... 详细信息
来源: 评论
LeapGNN: accelerating distributed GNN training leveraging feature-centric model migration  25
LeapGNN: accelerating distributed GNN training leveraging fe...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Weijian Chen Shuibing He Haoyang Qu Xuechen Zhang The State Key Laboratory of Blockchain and Data Security Zhejiang University and Zhejiang Lab and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security and Zhejiang Key Laboratory of Big Data Intelligent Computing Washington State University Vancouver
Distributed training of graph neural networks (GNNs) has become a crucial technique for processing large graphs. Prevalent GNN frameworks are model-centric, necessitating the transfer of massive graph vertex features ...
来源: 评论