咨询与建议

限定检索结果

文献类型

  • 432 篇 期刊文献
  • 394 篇 会议

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 586 篇 工学
    • 480 篇 计算机科学与技术...
    • 390 篇 软件工程
    • 112 篇 信息与通信工程
    • 51 篇 电气工程
    • 48 篇 网络空间安全
    • 46 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 24 篇 机械工程
    • 23 篇 安全科学与工程
    • 20 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
    • 11 篇 交通运输工程
  • 231 篇 理学
    • 137 篇 数学
    • 46 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 15 篇 化学
  • 137 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 36 篇 法学
    • 24 篇 社会学
    • 13 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 6 篇 教育学
  • 3 篇 文学

主题

  • 29 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 23 篇 security
  • 21 篇 federated learni...
  • 18 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 14 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 protocols
  • 12 篇 data models
  • 12 篇 robustness
  • 11 篇 machine learning
  • 10 篇 public key crypt...

机构

  • 165 篇 the state key la...
  • 104 篇 state key labora...
  • 76 篇 institute of blo...
  • 74 篇 state key labora...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 53 篇 zhejiang univers...
  • 46 篇 university of ch...
  • 42 篇 state key labora...
  • 31 篇 college of compu...
  • 29 篇 state key labora...
  • 26 篇 zhejiang univers...
  • 20 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 15 篇 singapore manage...
  • 15 篇 huawei
  • 15 篇 ant group
  • 14 篇 zhejiang univers...

作者

  • 37 篇 ren kui
  • 32 篇 song mingli
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 21 篇 yang xiaohu
  • 20 篇 tian youliang
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 chen gang
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 lo david
  • 14 篇 shou lidan
  • 14 篇 chen ke
  • 13 篇 xin xia

语言

  • 725 篇 英文
  • 96 篇 其他
  • 6 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
826 条 记 录,以下是61-70 订阅
排序:
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
A2PO: towards effective offline reinforcement learning from an advantage-aware perspective  24
A2PO: towards effective offline reinforcement learning from ...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Yunpeng Qing Shunyu Liu Jingyuan Cong Kaixuan Chen Yihe Zhou Mingli Song College of Computer Science and Technology Zhejiang University State Key Laboratory of Blockchain and Data Security Zhejiang University State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security
Offline reinforcement learning endeavors to leverage offline datasets to craft effective agent policy without online interaction, which imposes proper conservative constraints with the support of behavior policies to ...
来源: 评论
Can Small Language Models Reliably Resist Jailbreak Attacks? A Comprehensive Evaluation
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenhui Xu, Huiyu Wang, Zhibo He, Zeqing Zhu, Ziqi Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Small language models (SLMs) have emerged as promising alternatives to large language models (LLMs) due to their low computational demands, enhanced privacy guarantees and comparable performance in specific domains th... 详细信息
来源: 评论
MUT: Human-in-the-Loop Unit Test Migration  24
MUT: Human-in-the-Loop Unit Test Migration
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Gao, Yi Hu, Xing Xu, Tongtong Xia, Xin Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Hangzhou China School of Computing and Information Systems Singapore Management University Hangzhou China
Test migration, which enables the reuse of test cases crafted with knowledge and creativity by testers across various platforms and programming languages, has exhibited effectiveness in mobile app testing. However, un... 详细信息
来源: 评论
Transformer Doctor: Diagnosing and Treating Vision Transformers  38
Transformer Doctor: Diagnosing and Treating Vision Transform...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Jiacong Chen, Hao Chen, Kejia Gao, Yang Ye, Jingwen Wang, Xingen Song, Mingli Feng, Zunlei College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China National University of Singapore Singapore State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Bangsheng Technology Co. Ltd. China
Due to its powerful representational capabilities, Transformers have gradually become the mainstream model in the field of machine vision. However, the vast and complex parameters of Transformers impede researchers fr...
来源: 评论
Automating Comment Generation for Smart Contract from Bytecode
arXiv
收藏 引用
arXiv 2025年
作者: Xiang, Jianhang Gao, Zhipeng Bao, Lingfeng Hu, Xing Chen, Jiayuan Xia, Xin The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Shanghai China Blockchain and Data Security Research Institute Hangzhou China The Ohio State Univeristy Columbus United States
Recently, smart contracts have played a vital role in automatic financial and business transactions. To help end users without programming background to better understand the logic of smart contracts, previous studies... 详细信息
来源: 评论
SELF-EXPLAINED keyWORDS EMPOWER LARGE LANGUAGE MODELS FOR CODE GENERATION
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Lishui Chen, Mouxiang Liu, Zhongxin The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Large language models (LLMs) have achieved impressive performance in code generation. However, due to the long-tail distribution of LLMs’ training data, low-frequency terms are typically underrepresented in the train... 详细信息
来源: 评论
Robust Watermarks Leak: Channel-Aware Feature Extraction Enables Adversarial Watermark Manipulation
arXiv
收藏 引用
arXiv 2025年
作者: Ba, Zhongjie Zhang, Yitao Cheng, Peng Gong, Bin Zhang, Xinyu Wang, Qinglong Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Watermarking plays a key role in the provenance and detection of AI-generated content. While existing methods prioritize robustness against real-world distortions (e.g., JPEG compression and noise addition), we reveal... 详细信息
来源: 评论
SWAT: ASystem-Wide Approach to Tunable Leakage Mitigation in Encrypted data Stores  50th
SWAT: ASystem-Wide Approach to Tunable Leakage Mitigation in...
收藏 引用
50th International Conference on Very Large data Bases, VLDB 2024
作者: Zheng, Leqian Xu, Lei Wang, Cong Wang, Sheng Hu, Yuke Qin, Zhan Li, Feifei Ren, Kui City University of Hong Kong Hong Kong Nanjing University of Science and Technology China Alibaba Group China Zhejiang University The State Key Laboratory of Blockchain and Data Security China
Numerous studies have underscored the significant privacy risks associated with various leakage patterns in encrypted data stores. While many solutions have been proposed to mitigate these leak ages, they either (1) i... 详细信息
来源: 评论
Locally Private Estimator for Degree Distribution with Laplacian Mechanism  10
Locally Private Estimator for Degree Distribution with Lapla...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Li, Jiayu Hu, Yuke Li, Xiaoguang Zhou, Shiqi Wang, Yuxiang Li, Fenghua Niu, Ben Institute of Information Engineering Chinese Academy of Sciences China University of Chinese Academy of Sciences School of Cyber Security China Key Laboratory of Cyberspace Security Defense China Zhejiang University The State Key Laboratory of Blockchain and Data Security China Xidian University School of Cyber Engineering China
Local differential privacy (LDP) provides a solution such that an untrusted server can achieve privacy-preserving data analysis. Node degree is one of the most fundamental metrics in graph data analysis. Existing LDP-... 详细信息
来源: 评论