咨询与建议

限定检索结果

文献类型

  • 439 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 859 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 615 篇 工学
    • 505 篇 计算机科学与技术...
    • 403 篇 软件工程
    • 116 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 26 篇 机械工程
    • 24 篇 安全科学与工程
    • 20 篇 光学工程
    • 16 篇 化学工程与技术
    • 15 篇 动力工程及工程热...
    • 15 篇 轻工技术与工程
    • 12 篇 仪器科学与技术
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 土木工程
  • 243 篇 理学
    • 144 篇 数学
    • 47 篇 生物学
    • 45 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 15 篇 化学
  • 143 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 8 篇 教育学
  • 3 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 21 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 data privacy
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 175 篇 the state key la...
  • 105 篇 state key labora...
  • 94 篇 institute of blo...
  • 84 篇 state key labora...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 26 篇 zhejiang univers...
  • 20 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei
  • 15 篇 ant group

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 712 篇 英文
  • 141 篇 其他
  • 7 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
859 条 记 录,以下是221-230 订阅
排序:
Improved Regret for Bandit Convex Optimization with Delayed Feedback
arXiv
收藏 引用
arXiv 2024年
作者: Wan, Yuanyu Yao, Chang Song, Mingli Zhang, Lijun State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
We investigate bandit convex optimization (BCO) with delayed feedback, where only the loss value of the action is revealed under an arbitrary delay. Let n, T, d¯ denote the dimensionality, time horizon, and avera... 详细信息
来源: 评论
ThinkRepair: Self-Directed Automated Program Repair
arXiv
收藏 引用
arXiv 2024年
作者: Yin, Xin Ni, Chao Wang, Shaohua Li, Zhenhao Zeng, Limin Yang, Xiaohu The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Central University of Finance and Economics Beijing China Concordia University Toronto Canada Zhejiang University Hangzhou China Institute of Blockchain and Data Security China
Though many approaches have been proposed for Automated Program Repair (APR) and indeed achieved remarkable performance, they still have limitations in fixing bugs that require analyzing and reasoning about the logic ... 详细信息
来源: 评论
Statistical Model on CRAFT
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 698-712页
作者: WANG Caibing GUO Hao YE Dingfeng WANG Ping State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Tianjin Aerospace Zhongwei Data System Technology Co. Ltd.
Many cryptanalytic techniques for symmetric-key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext-ciphertext pairs. For example, ... 详细信息
来源: 评论
Review of data security within energy blockchain:A comprehensive analysis of storage,management,and utilization
收藏 引用
High-Confidence Computing 2024年 第3期4卷 82-102页
作者: Yunhua He Zhihao Zhou Yan Pan Fahui Chong Bin Wu Ke Xiao Hong Li School of Information Science and Technology North China University of TechnologyBeijing 100144China China Industrial Control Systems Cyber Emergency Response Team Beijing 100040China Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology Beijing 100040China Institute of Information Engineering Chinese Academy of Sciences Beijing 100195China
Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization,decentralization,democratization,and *** this evolving context,energy blockchain,aiming to enhance effici... 详细信息
来源: 评论
Dual Prompt-Based Few-Shot Learning for Automated Vulnerability Patch Localization
Dual Prompt-Based Few-Shot Learning for Automated Vulnerabil...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Junwei Zhang Xing Hu Lingfeng Bao Xin Xia Shanping Li The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China
Vulnerabilities are disclosed with corresponding patches so that users can remediate them in time. However, there are instances where patches are not released with the disclosed vulnerabilities, causing hidden dangers... 详细信息
来源: 评论
TCCT-Net: Two-Stream Network Architecture for Fast and Efficient Engagement Estimation via Behavioral Feature Signals
TCCT-Net: Two-Stream Network Architecture for Fast and Effic...
收藏 引用
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Alexander Vedernikov Puneet Kumar Haoyu Chen Tapio Seppänen Xiaobai Li Center for Machine Vision and Signal Analysis University of Oulu Finland State Key Laboratory of Blockchain and Data Security Zhejiang University China
Engagement analysis finds various applications in healthcare, education, advertisement, services. Deep Neural Networks, used for analysis, possess complex architecture and need large amounts of input data, computation... 详细信息
来源: 评论
dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone
dTEE: A Declarative Approach to Secure IoT Applications Usin...
收藏 引用
International Symposium on Information Processing in Sensor Networks (IPSN)
作者: Tong Sun Borui Li Yixiao Teng Yi Gao Wei Dong The State Key Laboratory of Blockchain and Data Security College of Computer Science Zhejiang University School of Computer Science and Engineering Southeast University
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execu... 详细信息
来源: 评论
VibSpeech: exploring practical wideband eavesdropping via bandlimited signal of vibration-based side channel  24
VibSpeech: exploring practical wideband eavesdropping via ba...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Chao Wang Feng Lin Hao Yan Tong Wu Wenyao Xu Kui Ren State Key Laboratory of Blockchain and Data Security Zhejiang University and School of Cyber Science and Technology Zhejiang University University at Buffalo the State University of New York
Vibration-based side channel is an ever-present threat to speech privacy. However, due to the target's frequency response with a rapid decay or limited sampling rate of malicious sensors, the acquired vibration si...
来源: 评论
Exploring the Capabilities of LLMs for Code Change Related Tasks
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Lishui Liu, Jiakun Liu, Zhongxin Lo, David Xia, Xin Li, Shanping The State Key Laboratory of Blockchain and Data Security Zhejiang University China Singapore Management University Singapore Singapore Zhejiang University China
Developers deal with code-change-related tasks daily, e.g., reviewing code. Pre-trained code and code-changeoriented models have been adapted to help developers with such tasks. Recently, large language models (LLMs) ... 详细信息
来源: 评论
SoK: On Gradient Leakage in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Jiacheng Hu, Jiahui Wang, Zhibo Sun, Peng Gong, Neil Zhenqiang Ren, Kui Chen, Chun The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China College of Computer Science and Electronic Engineering Hunan University China Department of Electrical and Computer Engineering Duke University United States
Federated learning (FL) facilitates collaborative model training among multiple clients without raw data exposure. However, recent studies have shown that clients’ private training data can be reconstructed from shar... 详细信息
来源: 评论