咨询与建议

限定检索结果

文献类型

  • 125 篇 期刊文献
  • 121 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 148 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 43 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 68 篇 理学
    • 39 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 8 篇 化学
    • 4 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 66 篇 the state key la...
  • 42 篇 state key labora...
  • 41 篇 institute of blo...
  • 29 篇 college of compu...
  • 20 篇 zhejiang univers...
  • 19 篇 school of softwa...
  • 13 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 fujian key labor...
  • 9 篇 college of compu...
  • 9 篇 state key labora...
  • 8 篇 college of compu...
  • 8 篇 ant group
  • 8 篇 xiamen key labor...
  • 7 篇 software enginee...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 6 篇 hangzhou high-te...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 13 篇 chen jiawei
  • 12 篇 chen yuling
  • 11 篇 chen ling
  • 10 篇 mingli song
  • 10 篇 liu zhenguang
  • 10 篇 wang can
  • 9 篇 chen chun
  • 9 篇 feng yan
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 jiao yingying
  • 8 篇 feng zunlei
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 qin zhan
  • 7 篇 zunlei feng
  • 6 篇 tian hui

语言

  • 205 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=The Xiamen Key Laboratory of Data Security and Blockchain Technology"
246 条 记 录,以下是1-10 订阅
排序:
E-PRedictor: an approach for early prediction of pull request acceptance
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 380-395页
作者: Kexing CHEN Lingfeng BAO Xing HU Xin XIA Xiaohu YANG State Key Laboratory of Blockchain and Data Security Zhejiang University Software Engineering Application Technology Lab
A pull request(PR) is an event in Git where a contributor asks project maintainers to review code he/she wants to merge into a project. The PR mechanism greatly improves the efficiency of distributed software developm... 详细信息
来源: 评论
Threshold Huffman-Based Covert Timing Channel Detection
收藏 引用
International Journal of Network security 2025年 第1期27卷 61-71页
作者: Lin, Yuwei Chen, Yonghong Zhuang, Xiaolong Huang, Xuwen School of Computer Science and Technology Huaqiao University Fujian Xiamen361000 China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Fujian Xiamen361000 China
Network covert timing channels in computer networks evade effective detection by traditional security mechanisms such as firewalls, posing a significant threat to network security. However, most existing methods strug... 详细信息
来源: 评论
Solving Multi-Objective Vehicle Routing Problems with Time Windows: A Decomposition-Based Multiform Optimization Approach
收藏 引用
Tsinghua Science and technology 2024年 第2期29卷 305-324页
作者: Yiqiao Cai Zifan Lin Meiqin Cheng Peizhong Liu Ying Zhou Xiamen Key Laboratory of Data Security and Blockchain Technology College of Computer Science and TechnologyHuaqiao UniversityXiamen361021China College of Engineering Huaqiao UniversityQuanzhou362000China School of Computer Sciences Shenzhen Institute of Information TechnologyShenzhen518000China
In solving multi-objective vehicle routing problems with time windows (MOVRPTW),most existing algorithms focus on the optimization of a single problem formulation. However,little effort has been devoted to exploiting ... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
LAPAA: A Secure and Lightweight Authentication Protocol for Edge Computing Built on ASCON Algorithm  6
LAPAA: A Secure and Lightweight Authentication Protocol for ...
收藏 引用
6th International Conference on Next Generation data-Driven Networks, NGDN 2024
作者: Zhang, Linghui Zhou, Changli Wen, Jingliang HuaQiao University College of Computer Science and Technology Xiamen361021 China HuaQiao University Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China
Facing the challenges of next-generation network security, Mobile Edge Computing (MEC) serves as a decentralized model designed to meet the growing demands for data processing and reduce latency, making its security i... 详细信息
来源: 评论
Association Pattern-aware Fusion for Biological Entity Relationship Prediction  38
Association Pattern-aware Fusion for Biological Entity Relat...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jia, Lingxiang Ying, Yuchen Feng, Zunlei Zhong, Zipeng Yao, Shaolun Hu, Jiacong Duan, Mingjiang Wang, Xingen Song, Jie Song, Mingli State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Bangsheng Technology Co Ltd. China
Deep learning-based methods significantly advance the exploration of associations among triple-wise biological entities (e.g., drug-target protein-adverse reaction), thereby facilitating drug discovery and safeguardin...
来源: 评论
GROOT: Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis  24
GROOT: Generating Robust Watermark for Diffusion-Model-Based...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Weizhi Li, Yue Lin, Dongdong Tian, Hui Li, Haizhou Huaqiao University Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen China
Amid the burgeoning development of generative models like diffusion models, the task of differentiating synthesized audio from its natural counterpart grows more daunting. Deepfake detection offers a viable solution t... 详细信息
来源: 评论
A2PO: Towards Effective Offline Reinforcement Learning from an Advantage-aware Perspective  38
A2PO: Towards Effective Offline Reinforcement Learning from ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qing, Yunpeng Liu, Shunyu Cong, Jingyuan Chen, Kaixuan Zhou, Yihe Song, Mingli College of Computer Science and Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Offline reinforcement learning endeavors to leverage offline datasets to craft effective agent policy without online interaction, which imposes proper conservative constraints with the support of behavior policies to ...
来源: 评论
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for Time Series Forecasting  38
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shang, Zongjiang Chen, Ling Wu, Binqing Cui, Dongliang State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Although transformer-based methods have achieved great success in multi-scale temporal pattern interaction modeling, two key challenges limit their further development: (1) Individual time points contain less semantic...
来源: 评论
Detection of Network Time Covert Channels Based on Image Processing  23
Detection of Network Time Covert Channels Based on Image Pro...
收藏 引用
4th International Conference on Computing, Networks and Internet of Things, CNIOT 2023
作者: Huang, Xuwen Chen, Yonghong Li, Zhiqiang Zhan, Teng School of Computer Science and Technology Huaqiao University Xiamen Fujian China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen Fujian China
Network covert timing channels (NCTCs) utilize Inter-Packet Delay (IPD) encoding to hide data. It can be used for spreading malware and data leakage, posing severe threats to network security. With the increasing risk... 详细信息
来源: 评论