咨询与建议

限定检索结果

文献类型

  • 443 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 621 篇 工学
    • 509 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 117 篇 信息与通信工程
    • 65 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 安全科学与工程
    • 21 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
  • 239 篇 理学
    • 140 篇 数学
    • 47 篇 生物学
    • 46 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 15 篇 化学
  • 142 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 7 篇 教育学
  • 3 篇 文学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 22 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 176 篇 the state key la...
  • 105 篇 state key labora...
  • 85 篇 state key labora...
  • 78 篇 institute of blo...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 28 篇 hangzhou high-te...
  • 26 篇 zhejiang univers...
  • 21 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 698 篇 英文
  • 159 篇 其他
  • 7 篇 中文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security"
863 条 记 录,以下是81-90 订阅
排序:
JUMPCODER: Go Beyond Autoregressive Coder via Online Modification
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Mouxiang Tian, Hao Liu, Zhongxin Ren, Xiaoxue Sun, Jianling The State Key Laboratory of Blockchain and Data Security Zhejiang University China
While existing code large language models (code LLMs) exhibit impressive capabilities in code generation, their autoregressive sequential generation inherently lacks reversibility. This limitation hinders them from ti... 详细信息
来源: 评论
In Situ Neural Relational Schema Matcher
In Situ Neural Relational Schema Matcher
收藏 引用
International Conference on data Engineering
作者: Xingyu Du Gongsheng Yuan Sai Wu Gang Chen Peng Lu The State Key Laboratory of Blockchain and Data Security Zhejiang University China
The scarcity of training data restricts a neural network from capturing schema diversity and intricacies, hindering schema-matching models' generalization capabilities. In this paper, we propose ISResMat, a framew... 详细信息
来源: 评论
COGSQL: A Cognitive Framework for Enhancing Large Language Models in Text-to-SQL Translation  39
COGSQL: A Cognitive Framework for Enhancing Large Language M...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yuan, Hongwei Tang, Xiu Chen, Ke Shou, Lidan Chen, Gang Li, Huan The State Key Laboratory of Blockchain and Data Security Zhejiang University China Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security China
Large language models (LLMs) have significantly advanced the performance of various natural language processing tasks, including text-to-SQL. Current LLM-based text-to-SQL schemes mainly focus on improving the underst... 详细信息
来源: 评论
Automated Unit Test Refactoring
arXiv
收藏 引用
arXiv 2024年
作者: Gao, Yi Hu, Xing Yang, Xiaohu Xia, Xin The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Test smells arise from poor design practices and insufficient domain knowledge, which can lower the quality of test code and make it harder to maintain and update. Manually refactoring of test smells is time-consuming... 详细信息
来源: 评论
GROOT: Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis  24
GROOT: Generating Robust Watermark for Diffusion-Model-Based...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Weizhi Li, Yue Lin, Dongdong Tian, Hui Li, Haizhou Huaqiao University Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen China
Amid the burgeoning development of generative models like diffusion models, the task of differentiating synthesized audio from its natural counterpart grows more daunting. Deepfake detection offers a viable solution t... 详细信息
来源: 评论
Secure and Revocable Multi-authority CP-ABE for Mobile Cloud Computing  24th
Secure and Revocable Multi-authority CP-ABE for Mobile Clo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Junyang Yan, Hongyang Koe, Arthur Sandor Voundi Deng, Weichu Zhong, Zhengxi Guangdong Key Laboratory of Blockchain Security Institute of Artificial Intelligence Guangzhou University Guangzhou China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China
Mobile cloud computing (MCC) enhances mobile device capabilities with cloud-based resources, allowing mobile users to outsource more data to the cloud to enjoy services of interest. It uses ciphertext policy attribute... 详细信息
来源: 评论
Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Yuchen Chen, Chen Lyu, Lingjuan Jin, Yaochu Chen, Gang The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Sony AI Westlake University China
Federated Learning (FL) is notorious for its vulnerability to Byzantine attacks. Most current Byzantine defenses share a common inductive bias: among all the gradients, the densely distributed ones are more likely to ... 详细信息
来源: 评论
Drift-aware Anomaly Detection for Non-stationary Time Series
Drift-aware Anomaly Detection for Non-stationary Time Series
收藏 引用
2023 IEEE International Conference on Big data, Bigdata 2023
作者: Gao, Yang Li, Ying Li, Yang Feng, Zunlei Song, Mingli Wang, Xingyu Chen, Chun Zhejiang University Hangzhou China The State Key Laboratory of Blockchain and Data Security Hangzhou China ZJU-Bangsun Joint Research Center Hangzhou China
Anomaly detection of time series is vital in various scenarios with explosively growing time series data. However, the non-stationary time series degrade the performance of current anomaly detection methods, where dat... 详细信息
来源: 评论
Enhancing Semi-Supervised Learning via Representative and Diverse Sample Selection  38
Enhancing Semi-Supervised Learning via Representative and Di...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shao, Qian Kang, Jiangrui Chen, Qiyuan Li, Zepeng Xu, Hongxia Cao, Yiwen Liang, Jiajuan Wu, Jian College of Computer Science & Technology Liangzhu Laboratory Zhejiang University China BNU-HKBU United International College China WeDoctor Cloud China The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Semi-Supervised Learning (SSL) has become a preferred paradigm in many deep learning tasks, which reduces the need for human labor. Previous studies primarily focus on effectively utilising the labelled and unlabeled ...
来源: 评论
CDS: An Anti-Aging Calibratable Digital Sensor for Detecting Multiple Types of Fault Injection Attacks  24
CDS: An Anti-Aging Calibratable Digital Sensor for Detecting...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Chen, Zhiyuan Yang, Kun Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University China School of Cyber Science and Technology Zhejiang University China ZJU-Hangzhou Global Scientific and Technological Innovation Center China
Fault injection attacks (FIAs) are a class of active physical attacks that inject faults into computing devices to deliberately change their intended behaviors for malicious purposes such as security feature circumven... 详细信息
来源: 评论