咨询与建议

限定检索结果

文献类型

  • 443 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 621 篇 工学
    • 509 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 117 篇 信息与通信工程
    • 65 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 安全科学与工程
    • 21 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
  • 239 篇 理学
    • 140 篇 数学
    • 47 篇 生物学
    • 46 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 15 篇 化学
  • 142 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 7 篇 教育学
  • 3 篇 文学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 22 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 176 篇 the state key la...
  • 105 篇 state key labora...
  • 85 篇 state key labora...
  • 78 篇 institute of blo...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 28 篇 hangzhou high-te...
  • 26 篇 zhejiang univers...
  • 21 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 698 篇 英文
  • 159 篇 其他
  • 7 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
863 条 记 录,以下是121-130 订阅
排序:
A2PO: Towards Effective Offline Reinforcement Learning from an Advantage-aware Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Qing, Yunpeng Liu, Shunyu Cong, Jingyuan Chen, Kaixuan Zhou, Yihe Song, Mingli College of Computer Science and Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Offline reinforcement learning endeavors to leverage offline datasets to craft effective agent policy without online interaction, which imposes proper conservative constraints with the support of behavior policies to ... 详细信息
来源: 评论
Automating Zero-Shot Patch Porting for Hard Forks
arXiv
收藏 引用
arXiv 2024年
作者: Pan, Shengyi Hu, Xing Wang, You Xia, Xin Liu, Zhongxin Li, Shanping The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Ningbo China Zhejiang University Hangzhou China Huawei Hangzhou China
Forking is a typical way of code reuse, which provides a simple way for developers to create a variant software (denoted as hard fork) by copying and modifying an existing codebase. Despite of the benefits, forking al... 详细信息
来源: 评论
Local Differentially Private Heavy Hitter Detection in data Streams with Bounded Memory
收藏 引用
Proceedings of the ACM on Management of data 2024年 第1期2卷 1-27页
作者: Xiaochen Li Weiran Liu Jian Lou Yuan Hong Lei Zhang Zhan Qin Kui Ren The State Key Laboratory of Blockchain and Data Security Zhejiang university Hangzhou China Alibaba Group Beijing China Zhejiang University Hangzhou China University of Connecticut Mansfield USA Alibaba Group Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Top-k frequent items detection is a fundamental task in data stream mining. Many promising solutions are proposed to improve memory efficiency while still maintaining high accuracy for detecting the Top-k items. Despi... 详细信息
来源: 评论
SoK: On the Role and Future of AIGC Watermarking in the Era of Gen-AI
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Kui Yang, Ziqi Lu, Li Liu, Jian Li, Yiming Wan, Jie Zhao, Xiaodi Feng, Xianheng Shao, Shuo The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China College of Computing and Data Science Nanyang Technological University Singapore
The rapid advancement of AI technology, particularly in generating AI-generated content (AIGC), has transformed numerous fields, e.g., art video generation, but also brings new risks, including the misuse of AI for mi... 详细信息
来源: 评论
MicGuard: a comprehensive detection system against out-of-band injection attacks for different level microphone-based devices  24
MicGuard: a comprehensive detection system against out-of-ba...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Tiantian Liu Feng Lin Zhongjie Ba Li Lu Zhan Qin Kui Ren State Key Laboratory of Blockchain and Data Security Zhejiang University School of Cyber Science and Technology Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security
The integration of microphones into sensors and systems, serving as input interfaces to intelligent applications and industrial manufacture, has raised public concerns regarding their input perception. Studies have un...
来源: 评论
REFINE: INVERSION-FREE BACKDOOR DEFENSE VIA MODEL REPROGRAMMING
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Yukun Shao, Shuo Huang, Enhao Li, Yiming Chen, Pin-Yu Qin, Zhan Ren, Kui State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Nanyang Technological University Singapore IBM Research United States
Backdoor attacks on deep neural networks (DNNs) have emerged as a significant security threat, allowing adversaries to implant hidden malicious behaviors during the model training phase. Pre-processing-based defense, ... 详细信息
来源: 评论
Non-stationary online convex optimization with arbitrary delays  24
Non-stationary online convex optimization with arbitrary del...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Yuanyu Wan Chang Yao Mingli Song Lijun Zhang The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China and School of Software Technology Zhejiang University Ningbo China and Hangzhou High- Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China and Hangzhou High- Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China and The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Online convex optimization (OCO) with arbitrary delays, in which gradients or other information of functions could be arbitrarily delayed, has received increasing attention recently. Different from previous studies th...
来源: 评论
CSCHECKER: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web  24
CSCHECKER: Revisiting GDPR and CCPA Compliance of Cookie Ban...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Zhang, Mingxue Meng, Wei Zhou, You Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University China ZJU-Hangzhou Global Scientific and Technological Innovation Center Zhejiang University Hangzhou311215 China The Chinese University of Hong Kong Hong Kong
Privacy regulations like GDPR and CCPA have greatly affected online advertising and tracking strategies. To comply with the regulations, websites need to display consent management UIs (i.e., cookie banners) implement... 详细信息
来源: 评论
Vision mamba mender  24
Vision mamba mender
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Jiacong Hu Anda Cao Zunlei Feng Shengxuming Zhang Yi Wang Lingxiang Jia Mingli Song College of Computer Science and Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University College of Computer Science and Technology Zhejiang University School of Software Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security School of Software Technology Zhejiang University College of Computer Science and Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security
Mamba, a state-space model with selective mechanisms and hardware-aware architecture, has demonstrated outstanding performance in long sequence modeling tasks, particularly garnering widespread exploration and applica...
来源: 评论
FESR - Framework to evaluate Software Reliability based on software metrics  24
FESR - Framework to evaluate Software Reliability based on s...
收藏 引用
8th International Conference on High Performance Compilation, Computing and Communications, HP3C 2024
作者: Fahad, Hurriya Ahmed, Irfan Mahmood, Jabar Saman Batool, Khadija Ali, Qasim Department of Computer Science University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou310007 China
Evaluating reliability of software is hot concern for decision makers and software engineers seeing as if we assess, it cannot be mastered. It is common that reliability of system stratum could be employed for evaluat... 详细信息
来源: 评论