咨询与建议

限定检索结果

文献类型

  • 439 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 859 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 615 篇 工学
    • 505 篇 计算机科学与技术...
    • 403 篇 软件工程
    • 116 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 26 篇 机械工程
    • 24 篇 安全科学与工程
    • 20 篇 光学工程
    • 16 篇 化学工程与技术
    • 15 篇 动力工程及工程热...
    • 15 篇 轻工技术与工程
    • 12 篇 仪器科学与技术
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 土木工程
  • 243 篇 理学
    • 144 篇 数学
    • 47 篇 生物学
    • 45 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 15 篇 化学
  • 143 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 8 篇 教育学
  • 3 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 21 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 data privacy
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 175 篇 the state key la...
  • 105 篇 state key labora...
  • 94 篇 institute of blo...
  • 84 篇 state key labora...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 26 篇 zhejiang univers...
  • 20 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei
  • 15 篇 ant group

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 712 篇 英文
  • 141 篇 其他
  • 7 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
859 条 记 录,以下是181-190 订阅
排序:
ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network  23
ConTra: A Covert Timing Channel Detection Approach for Littl...
收藏 引用
4th International Conference on Computing, Networks and Internet of Things, CNIOT 2023
作者: Li, Zhiqiang Chen, Yonghong Teng, Zhan Huang, Xuwen School of Computer Science and Technology Huaqiao University Xiamen Fujian China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen Fujian China
A covert timing channel is a technical means that enables information hiding and covert communication. Due to the fact that covert timing channels can elude detection by security defence measures, they offer a substan... 详细信息
来源: 评论
Verified Lifting of Deep learning Operators
arXiv
收藏 引用
arXiv 2024年
作者: Zhan, Qi Hu, Xing Xia, Xin Li, Shanping The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Zhejiang University Hangzhou China
Deep learning operators are fundamental components of modern deep learning frameworks. With the growing demand for customized operators, it has become increasingly common for developers to create their own. However, d... 详细信息
来源: 评论
Towards More Practical Automation of Vulnerability Assessment
Towards More Practical Automation of Vulnerability Assessmen...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Shengyi Pan Lingfeng Bao Jiayuan Zhou Xing Hu Xin Xia Shanping Li The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou Zhejiang China Centre for Software Excellence Huawei Kingston Ontario Canada The State Key Laboratory of Blockchain and Data Security Zhejiang University Ningbo Zhejiang China Huawei Hangzhou Zhejiang China
It is increasingly suggested to identify emerging software vulner-abilities (SVs) through relevant development activities (e.g., issue reports) to allow early warnings to open source software (OSS) users. However, the... 详细信息
来源: 评论
On the trajectory regularity of ODE-based diffusion sampling  24
On the trajectory regularity of ODE-based diffusion sampling
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Defang Chen Zhenyu Zhou Can Wang Chunhua Shen Siwei Lyu State Key Laboratory of Blockchain and Data Security Zhejiang University China and Hangzhou High-Tech Zone (Binjiang) Blockchain and Data Security Research Institute China Zhejiang University China University at Buffalo
Diffusion-based generative models use stochastic differential equations (SDEs) and their equivalent ordinary differential equations (ODEs) to establish a smooth connection between a complex data distribution and a tra...
来源: 评论
Enhancing Reentrancy Vulnerability Detection and Repair with a Hybrid Model Framework
Enhancing Reentrancy Vulnerability Detection and Repair with...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Mengliang Li Xiaoxue Ren Han Fu Zhuo Li Jianling Sun State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security College of Computer Science and Technology Zhejiang University State Street Technology(Zhejiang) Ltd
Smart contracts bring revolutionary changes to the credit landscape. However, their security remains intensely scrutinized due to numerous hacking incidents and inherent logical challenges. One well-known and represen... 详细信息
来源: 评论
CARAT: Contrastive Feature Reconstruction and Aggregation for Multi-Modal Multi-Label Emotion Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Peng, Cheng Chen, Ke Shou, Lidan Chen, Gang The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou310000 China
Multi-modal multi-label emotion recognition (MMER) aims to identify relevant emotions from multiple modalities. The challenge of MMER is how to effectively capture discriminative features for multiple labels from hete... 详细信息
来源: 评论
Holistic Semantic Representation for Navigational Trajectory Generation  39
Holistic Semantic Representation for Navigational Trajectory...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Cao, Ji Zheng, Tongya Guo, Qinghong Wang, Yu Dai, Junshu Liu, Shunyu Yang, Jie Song, Jie Song, Mingli Zhejiang University China Big Graph Center Hangzhou City University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Nanyang Technological Univerisity Singapore Institute of Blockchain and Data Security China
Trajectory generation has garnered significant attention from researchers in the field of spatio-temporal analysis, as it can generate substantial synthesized human mobility trajectories that enhance user privacy and ... 详细信息
来源: 评论
Cooperative Policy Agreement: Learning Diverse Policy for Offline MARL  39
Cooperative Policy Agreement: Learning Diverse Policy for Of...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Yihe Zheng, Yuxuan Hu, Yue Chen, Kaixuan Zheng, Tongya Song, Jie Song, Mingli Liu, Shunyu Zhejiang University China Nanyang Technological University Singapore State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Big Graph Center Hangzhou City University China
Offline Multi-Agent Reinforcement Learning (MARL) aims to learn optimal joint policies from pre-collected datasets without further interaction with the environment. Despite the encouraging results achieved so far, we ... 详细信息
来源: 评论
TPIA: Towards Target-specific Prompt Injection Attack against Code-oriented Large Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yuchen Yao, Hongwei Yang, Bingrun He, Yiling Li, Yiming Zhang, Tianwei Qin, Zhan State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou310007 China Institute of Blockchain and Data Security Hangzhou310053 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
Recently, code-oriented large language models (Code LLMs) have been widely and successfully exploited to simplify and facilitate programming. Unfortunately, a few pioneering works revealed that these Code LLMs are vul... 详细信息
来源: 评论
PipeCo: Pipelining Cold Start of Deep Learning Inference Services on Serverless Platforms  25
PipeCo: Pipelining Cold Start of Deep Learning Inference Ser...
收藏 引用
Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
作者: Jiaang Duan Shiyou Qian Hanwen Hu Dingyu Yang Jian Cao Guangtao Xue Shanghai Jiao Tong University Shanghai China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
The fusion of serverless computing and deep learning (DL) has led to serverless inference, offering a promising approach for developing and deploying scalable and cost-efficient deep learning inference services (DLISs... 详细信息
来源: 评论