咨询与建议

限定检索结果

文献类型

  • 443 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 621 篇 工学
    • 509 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 117 篇 信息与通信工程
    • 65 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 安全科学与工程
    • 21 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
  • 239 篇 理学
    • 140 篇 数学
    • 47 篇 生物学
    • 46 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 15 篇 化学
  • 142 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 7 篇 教育学
  • 3 篇 文学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 22 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 176 篇 the state key la...
  • 105 篇 state key labora...
  • 85 篇 state key labora...
  • 78 篇 institute of blo...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 28 篇 hangzhou high-te...
  • 26 篇 zhejiang univers...
  • 21 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 698 篇 英文
  • 159 篇 其他
  • 7 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
863 条 记 录,以下是201-210 订阅
排序:
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance  2
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
2nd International Conference on Big data and Privacy Computing, BDPC 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论
Disentangled Table-Graph Representation for Interpretable Transmission Line Fault Location  39
Disentangled Table-Graph Representation for Interpretable Tr...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yu, Na Deng, Yutong Liu, Shunyu Chen, Kaixuan Zheng, Tongya Song, Mingli State Key Laboratory of Blockchain and Data Security Zhejiang University China Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security China Nanyang Technological Univerisity Singapore Big Graph Center Hangzhou City University China
The fault location task in power grids is crucial for maintaining social order and ensuring public safety. However, existing methods that rely on tabular state records often neglect the intrinsic topological influence... 详细信息
来源: 评论
The Communication-Friendly Privacy-Preserving Machine Learning against Malicious Adversaries
arXiv
收藏 引用
arXiv 2024年
作者: Lu, Tianpei Zhang, Bingsheng Li, Lichun Ren, Kui State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang University Hangzhou China Ant Group Hangzhou China
—With the increasing emphasis on privacy regulations, such as GDPR, protecting individual privacy and ensuring compliance have become critical concerns for both individuals and organizations. Privacy-preserving machi... 详细信息
来源: 评论
Unbiased Multi-Label Learning from Crowdsourced Annotations  41
Unbiased Multi-Label Learning from Crowdsourced Annotations
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Xia, Mingxuan Huang, Zenan Wu, Runze Lyu, Gengyu Zhao, Junbo Chen, Gang Wang, Haobo School of Software Technology Zhejiang University Ningbo China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Fuxi AI Lab NetEase Inc. Hangzhou China Faculty of Information Technology Beijing University of Technology Beijing China
This work studies the novel Crowdsourced Multi-Label Learning (CMLL) problem, where each instance is related to multiple true labels but the model only receives unreliable labels from different annotators. Although a ... 详细信息
来源: 评论
MTVHunter: Smart Contracts Vulnerability Detection Based on Multi-Teacher Knowledge Translation  39
MTVHunter: Smart Contracts Vulnerability Detection Based on ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sun, Guokai Zhuang, Yuan Zhang, Shuo Feng, Xiaoyu Liu, Zhenguang Zhang, Liguo College of Computer Science and Technology Harbin Engineering University Heilongjiang China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China
Smart contracts, closely intertwined with cryptocurrency transactions, have sparked widespread concerns about considerable financial losses of security issues. To counteract this, a variety of tools have been develope... 详细信息
来源: 评论
Transformer doctor: diagnosing and treating vision transformers  24
Transformer doctor: diagnosing and treating vision transform...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Jiacong Hu Hao Chen Kejia Chen Yang Gao Jingwen Ye Xingen Wang Mingli Song Zunlei Feng College of Computer Science and Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University College of Computer Science and Technology Zhejiang University School of Software Technology Zhejiang University Bangsheng Technology Co. Ltd. Electrical and Computer Engineering National University of Singapore College of Computer Science and Technology Zhejiang University and Bangsheng Technology Co. Ltd. College of Computer Science and Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security School of Software Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security
Due to its powerful representational capabilities, Transformers have gradually become the mainstream model in the field of machine vision. However, the vast and complex parameters of Transformers impede researchers fr...
来源: 评论
Exploiting Library Vulnerability via Migration Based Automating Test Generation
Exploiting Library Vulnerability via Migration Based Automat...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zirui Chen Xing Hu Xin Xia Yi Gao Tongtong Xu David Lo Xiaohu Yang The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Huawei China Singapore Management University Singapore
In software development, developers extensively utilize third-party libraries to avoid implementing existing functionalities. When a new third-party library vulnerability is disclosed, project maintainers need to dete... 详细信息
来源: 评论
ℬ4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests
ℬ4: Towards Optimal Assessment of Plausible Code Solutions ...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Mouxiang Chen Zhongxin Liu He Tao Yusu Hong David Lo Xin Xia Jianling Sun The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Zhejiang University Hangzhou China Singapore Management University Singapore Singapore
Selecting the best code solution from multiple generated ones is an essential task in code generation, which can be achieved by using some reliable validators (e.g., developer-written test cases) for assistance. Since... 详细信息
来源: 评论
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-Context Learning
arXiv
收藏 引用
arXiv 2024年
作者: Mai, Yubo Gao, Zhipeng Hu, Xing Bao, Lingfeng Liu, Yu Sun, Jianling The State Key Laboratory of Blockchain and Data Security Zhejiang University China Shanghai Institute for Advanced Study of Zhejiang University China
Nowadays, more and more developers resort to Stack Overflow for solutions (e.g., code snippets) when they encounter technical problems. Although domain experts provide huge amounts of valuable solutions in Stack Overf... 详细信息
来源: 评论
Multiscale Representation Enhanced Temporal Flow Fusion Model for Long-Term Workload Forecasting
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Shiyu Chu, Zhixuan Sun, Yinbo Liu, Yu Guo, Yuliang Chen, Yang Jian, Huiyang Ma, Lintao Lu, Xingyu Zhou, Jun Ant Group Zhejiang Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou China
Accurate workload forecasting is critical for efficient resource management in cloud computing systems, enabling effective scheduling and autoscaling. Despite recent advances with transformer-based forecasting models,... 详细信息
来源: 评论