咨询与建议

限定检索结果

文献类型

  • 1,935 篇 会议
  • 1,190 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,274 篇 工学
    • 1,962 篇 计算机科学与技术...
    • 1,531 篇 软件工程
    • 590 篇 信息与通信工程
    • 374 篇 电气工程
    • 253 篇 控制科学与工程
    • 219 篇 网络空间安全
    • 153 篇 生物工程
    • 147 篇 电子科学与技术(可...
    • 131 篇 安全科学与工程
    • 125 篇 机械工程
    • 101 篇 生物医学工程(可授...
    • 100 篇 交通运输工程
    • 78 篇 仪器科学与技术
    • 61 篇 动力工程及工程热...
    • 59 篇 光学工程
  • 741 篇 理学
    • 441 篇 数学
    • 168 篇 生物学
    • 135 篇 统计学(可授理学、...
    • 117 篇 物理学
    • 83 篇 系统科学
    • 62 篇 化学
  • 624 篇 管理学
    • 406 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 205 篇 法学
    • 116 篇 法学
    • 95 篇 社会学
  • 129 篇 医学
    • 116 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
  • 80 篇 经济学
    • 79 篇 应用经济学
  • 37 篇 农学
  • 27 篇 教育学
  • 18 篇 军事学
  • 6 篇 艺术学
  • 5 篇 文学

主题

  • 439 篇 blockchain
  • 140 篇 blockchains
  • 132 篇 security
  • 107 篇 privacy
  • 99 篇 data privacy
  • 87 篇 federated learni...
  • 85 篇 smart contract
  • 83 篇 authentication
  • 82 篇 internet of thin...
  • 72 篇 cloud computing
  • 67 篇 feature extracti...
  • 66 篇 scalability
  • 65 篇 access control
  • 64 篇 deep learning
  • 64 篇 encryption
  • 63 篇 smart contracts
  • 62 篇 computational mo...
  • 61 篇 training
  • 60 篇 data models
  • 58 篇 protocols

机构

  • 74 篇 state key labora...
  • 64 篇 the state key la...
  • 51 篇 college of compu...
  • 50 篇 institute of blo...
  • 45 篇 tianjin key labo...
  • 42 篇 college of compu...
  • 38 篇 college of compu...
  • 38 篇 college of compu...
  • 35 篇 college of compu...
  • 33 篇 college of cyber...
  • 33 篇 college of compu...
  • 31 篇 state key labora...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 27 篇 college of compu...
  • 27 篇 state key labora...
  • 25 篇 fujian provincia...
  • 24 篇 college of compu...
  • 24 篇 college of infor...
  • 23 篇 college of compu...

作者

  • 33 篇 tian youliang
  • 30 篇 li tao
  • 30 篇 chen yuling
  • 30 篇 youliang tian
  • 25 篇 liu ximeng
  • 22 篇 xu li
  • 21 篇 niyato dusit
  • 20 篇 yuling chen
  • 19 篇 ding yong
  • 18 篇 ren kui
  • 17 篇 liu zhenguang
  • 16 篇 liu yang
  • 16 篇 xiong jinbo
  • 15 篇 song mingli
  • 15 篇 wang yujue
  • 15 篇 weng jian
  • 15 篇 tao li
  • 14 篇 ma jianfeng
  • 14 篇 li yiming
  • 14 篇 peng changgen

语言

  • 2,728 篇 英文
  • 378 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The State Key Laboratory of Blockchain and Data Security College of Computer Science"
3130 条 记 录,以下是1-10 订阅
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Advancing Loss Functions in Recommender Systems: A Comparative Study with a Rényi Divergence-Based Solution  39
Advancing Loss Functions in Recommender Systems: A Comparati...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Shengjia Chen, Jiawei Li, Changdong Zhou, Sheng Shi, Qihao Feng, Yan Chen, Chun Wang, Can State Key Laboratory of Blockchain and Data Security Zhejiang University China College of Computer Science Zhejiang University China Institute of Blockchain and Data Security China
Loss functions play a pivotal role in optimizing recommendation models. Among various loss functions, Softmax Loss (SL) and Cosine Contrastive Loss (CCL) are particularly effective. Their theoretical connections and d...
来源: 评论
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for Time Series Forecasting  38
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shang, Zongjiang Chen, Ling Wu, Binqing Cui, Dongliang State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Although transformer-based methods have achieved great success in multi-scale temporal pattern interaction modeling, two key challenges limit their further development: (1) Individual time points contain less semantic...
来源: 评论
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowledge Graph Representation Learning Approach  38
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowl...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Qian Chen, Ling State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Temporal Knowledge Graph (TKG) representation learning aims to map temporal evolving entities and relations to embedded representations in a continuous low-dimensional vector space. However, existing approaches cannot...
来源: 评论
A2PO: Towards Effective Offline Reinforcement Learning from an Advantage-aware Perspective  38
A2PO: Towards Effective Offline Reinforcement Learning from ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qing, Yunpeng Liu, Shunyu Cong, Jingyuan Chen, Kaixuan Zhou, Yihe Song, Mingli College of Computer Science and Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Offline reinforcement learning endeavors to leverage offline datasets to craft effective agent policy without online interaction, which imposes proper conservative constraints with the support of behavior policies to ...
来源: 评论
blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
MTVHunter: Smart Contracts Vulnerability Detection Based on Multi-Teacher Knowledge Translation  39
MTVHunter: Smart Contracts Vulnerability Detection Based on ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sun, Guokai Zhuang, Yuan Zhang, Shuo Feng, Xiaoyu Liu, Zhenguang Zhang, Liguo College of Computer Science and Technology Harbin Engineering University Heilongjiang China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China
Smart contracts, closely intertwined with cryptocurrency transactions, have sparked widespread concerns about considerable financial losses of security issues. To counteract this, a variety of tools have been develope... 详细信息
来源: 评论
Solving Multi-Objective Vehicle Routing Problems with Time Windows: A Decomposition-Based Multiform Optimization Approach
收藏 引用
Tsinghua science and Technology 2024年 第2期29卷 305-324页
作者: Yiqiao Cai Zifan Lin Meiqin Cheng Peizhong Liu Ying Zhou Xiamen Key Laboratory of Data Security and Blockchain Technology College of Computer Science and TechnologyHuaqiao UniversityXiamen361021China College of Engineering Huaqiao UniversityQuanzhou362000China School of Computer Sciences Shenzhen Institute of Information TechnologyShenzhen518000China
In solving multi-objective vehicle routing problems with time windows (MOVRPTW),most existing algorithms focus on the optimization of a single problem formulation. However,little effort has been devoted to exploiting ... 详细信息
来源: 评论
Association Pattern-enhanced Molecular Representation Learning  39
Association Pattern-enhanced Molecular Representation Learni...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Jia, Lingxiang Ying, Yuchen Qiu, Tian Yao, Shaolun Xue, Liang Lei, Jie Song, Jie Song, Mingli Feng, Zunlei State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Computing Science and Artificial Intelligence College Suzhou City University China College of Computer Science Zhejiang University of Technology China
The applicability of drug molecules in various clinical scenarios is significantly influenced by a diverse range of molecular properties. By leveraging self-supervised conditions such as atom attributes and interatomi...
来源: 评论
dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone  23
dTEE: A Declarative Approach to Secure IoT Applications Usin...
收藏 引用
23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2024
作者: Sun, Tong B., Li Y., Teng Y., Gao W., Dong Zhejiang University The State Key Laboratory of Blockchain and Data Security College of Computer Science China Southeast University School of Computer Science and Engineering China
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execu... 详细信息
来源: 评论