咨询与建议

限定检索结果

文献类型

  • 432 篇 期刊文献
  • 394 篇 会议

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 586 篇 工学
    • 480 篇 计算机科学与技术...
    • 390 篇 软件工程
    • 112 篇 信息与通信工程
    • 51 篇 电气工程
    • 48 篇 网络空间安全
    • 46 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 24 篇 机械工程
    • 23 篇 安全科学与工程
    • 20 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
    • 11 篇 交通运输工程
  • 231 篇 理学
    • 137 篇 数学
    • 46 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 15 篇 化学
  • 137 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 36 篇 法学
    • 24 篇 社会学
    • 13 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 6 篇 教育学
  • 3 篇 文学

主题

  • 29 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 23 篇 security
  • 21 篇 federated learni...
  • 18 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 14 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 protocols
  • 12 篇 data models
  • 12 篇 robustness
  • 11 篇 machine learning
  • 10 篇 public key crypt...

机构

  • 165 篇 the state key la...
  • 104 篇 state key labora...
  • 76 篇 institute of blo...
  • 74 篇 state key labora...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 53 篇 zhejiang univers...
  • 46 篇 university of ch...
  • 42 篇 state key labora...
  • 31 篇 college of compu...
  • 29 篇 state key labora...
  • 26 篇 zhejiang univers...
  • 20 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 15 篇 singapore manage...
  • 15 篇 huawei
  • 15 篇 ant group
  • 14 篇 zhejiang univers...

作者

  • 37 篇 ren kui
  • 32 篇 song mingli
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 21 篇 yang xiaohu
  • 20 篇 tian youliang
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 chen gang
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 lo david
  • 14 篇 shou lidan
  • 14 篇 chen ke
  • 13 篇 xin xia

语言

  • 725 篇 英文
  • 96 篇 其他
  • 6 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
826 条 记 录,以下是11-20 订阅
排序:
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for Time Series Forecasting  38
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shang, Zongjiang Chen, Ling Wu, Binqing Cui, Dongliang State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Although transformer-based methods have achieved great success in multi-scale temporal pattern interaction modeling, two key challenges limit their further development: (1) Individual time points contain less semantic...
来源: 评论
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowledge Graph Representation Learning Approach  38
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowl...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Qian Chen, Ling State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Temporal Knowledge Graph (TKG) representation learning aims to map temporal evolving entities and relations to embedded representations in a continuous low-dimensional vector space. However, existing approaches cannot...
来源: 评论
Towards More Practical Automation of Vulnerability Assessment  24
Towards More Practical Automation of Vulnerability Assessmen...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Pan, Shengyi Bao, Lingfeng Zhou, Jiayuan Hu, Xing Xia, Xin Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Zhejiang Hangzhou China Centre for Software Excellence Huawei KingstonON Canada Zhejiang University The State Key Laboratory of Blockchain and Data Security Zhejiang Ningbo China Huawei Zhejiang Hangzhou China
It is increasingly suggested to identify emerging software vulner-abilities (SVs) through relevant development activities (e.g., issue reports) to allow early warnings to open source software (OSS) users. However, the... 详细信息
来源: 评论
BushStore: Efficient B+Tree Group Indexing for LSM-Tree in Non-Volatile Memory  40
BushStore: Efficient B+Tree Group Indexing for LSM-Tree in N...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Wang, Zhenghao Shou, Lidan Chen, Ke Zhou, Xuan Zhejiang University The State Key Laboratory of Blockchain and Data Security China East China Normal University China
Non-Volatile Memory (NVM) offers low-latency, non-volatility, and byte-addressability, positioning it as a highly promising device for database performance enhancement. Cur-rent research primarily focuses on utilizing... 详细信息
来源: 评论
Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks  24
Pre-training by Predicting Program Dependencies for Vulnerab...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Liu, Zhongxin Tang, Zhijie Zhang, Junwei Xia, Xin Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security China Zhejiang University China Huawei China
Vulnerability analysis is crucial for software security. Inspired by the success of pre-trained models on software engineering tasks, this work focuses on using pre-training techniques to enhance the understanding of ... 详细信息
来源: 评论
Can Graph Neural Networks Expose Training data Properties? An Efficient Risk Assessment Approach  38
Can Graph Neural Networks Expose Training Data Properties? A...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yuan, Hanyang Xu, Jiarong Huang, Renhong Song, Mingli Wang, Chunping Yang, Yang Zhejiang University China Fudan University China Finvolution Group China Institute of Blockchain and Data Security China State Key Laboratory of Blockchain and Security Zhejiang University China
Graph neural networks (GNNs) have attracted considerable attention due to their diverse applications. However, the scarcity and quality limitations of graph data present challenges to their training process in practic...
来源: 评论
TimeChain: A Secure and Decentralized Off-chain Storage System for IoT Time Series data  25
TimeChain: A Secure and Decentralized Off-chain Storage Syst...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Teng, Yixiao Lv, Jiamei Wang, Ziping Gao, Yi Dong, Wei The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
blockchain-based distributed storage systems offer enhanced security, transparency, and lower costs compared to traditional centralized storage, making them ideal for peer-to-peer collaboration. However, with the tren... 详细信息
来源: 评论
Distributionally Robust Graph-based Recommendation System  24
Distributionally Robust Graph-based Recommendation System
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Wang, Bohao Chen, Jiawei Li, Changdong Zhou, Sheng Shi, Qihao Gao, Yang Feng, Yan Chen, Chun Wang, Can The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Zhejiang University Hangzhou China
With the capacity to capture high-order collaborative signals, Graph Neural Networks (GNNs) have emerged as powerful methods in Recommender Systems (RS). However, their efficacy often hinges on the assumption that tra... 详细信息
来源: 评论
PSL: Rethinking and Improving Softmax Loss from Pairwise Perspective for Recommendation  38
PSL: Rethinking and Improving Softmax Loss from Pairwise Per...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yang, Weiqin Chen, Jiawei Xin, Xin Zhou, Sheng Hu, Binbin Feng, Yan Chen, Chun Wang, Can Shandong University China Ant Group China State Key Laboratory of Blockchain and Data Security Zhejiang University China College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China
Softmax Loss (SL) is widely applied in recommender systems (RS) and has demonstrated effectiveness. This work analyzes SL from a pairwise perspective, revealing two significant limitations: 1) the relationship between...
来源: 评论
Vision Mamba Mender  38
Vision Mamba Mender
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Jiacong Cao, Anda Feng, Zunlei Zhang, Shengxuming Wang, Yi Jia, Lingxiang Song, Mingli College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Mamba, a state-space model with selective mechanisms and hardware-aware architecture, has demonstrated outstanding performance in long sequence modeling tasks, particularly garnering widespread exploration and applica...
来源: 评论