咨询与建议

限定检索结果

文献类型

  • 432 篇 期刊文献
  • 394 篇 会议

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 586 篇 工学
    • 480 篇 计算机科学与技术...
    • 390 篇 软件工程
    • 112 篇 信息与通信工程
    • 51 篇 电气工程
    • 48 篇 网络空间安全
    • 46 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 24 篇 机械工程
    • 23 篇 安全科学与工程
    • 20 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
    • 11 篇 交通运输工程
  • 231 篇 理学
    • 137 篇 数学
    • 46 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 15 篇 化学
  • 137 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 36 篇 法学
    • 24 篇 社会学
    • 13 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 6 篇 教育学
  • 3 篇 文学

主题

  • 29 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 23 篇 security
  • 21 篇 federated learni...
  • 18 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 14 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 protocols
  • 12 篇 data models
  • 12 篇 robustness
  • 11 篇 machine learning
  • 10 篇 public key crypt...

机构

  • 165 篇 the state key la...
  • 104 篇 state key labora...
  • 76 篇 institute of blo...
  • 74 篇 state key labora...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 53 篇 zhejiang univers...
  • 46 篇 university of ch...
  • 42 篇 state key labora...
  • 31 篇 college of compu...
  • 29 篇 state key labora...
  • 26 篇 zhejiang univers...
  • 20 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 15 篇 singapore manage...
  • 15 篇 huawei
  • 15 篇 ant group
  • 14 篇 zhejiang univers...

作者

  • 37 篇 ren kui
  • 32 篇 song mingli
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 21 篇 yang xiaohu
  • 20 篇 tian youliang
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 chen gang
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 lo david
  • 14 篇 shou lidan
  • 14 篇 chen ke
  • 13 篇 xin xia

语言

  • 725 篇 英文
  • 96 篇 其他
  • 6 篇 中文
检索条件"机构=The state Key Laboratory of Blockchain and Data Security"
826 条 记 录,以下是21-30 订阅
排序:
Non-stationary Online Convex Optimization with Arbitrary Delays  41
Non-stationary Online Convex Optimization with Arbitrary Del...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wan, Yuanyu Yao, Chang Song, Mingli Zhang, Lijun The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Software Technology Zhejiang University Ningbo China Institute of Blockchain and Data Security Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Online convex optimization (OCO) with arbitrary delays, in which gradients or other information of functions could be arbitrarily delayed, has received increasing attention recently. Different from previous studies th...
来源: 评论
Improved Regret for Bandit Convex Optimization with Delayed Feedback  38
Improved Regret for Bandit Convex Optimization with Delayed ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wan, Yuanyu Yao, Chang Song, Mingli Zhang, Lijun School of Software Technology Zhejiang University Ningbo China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
We investigate bandit convex optimization (BCO) with delayed feedback, where only the loss value of the action is revealed under an arbitrary delay. Let n, T, d¯ denote the dimensionality, time horizon, and avera...
来源: 评论
Exploiting Library Vulnerability via Migration Based Automating Test Generation  24
Exploiting Library Vulnerability via Migration Based Automat...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Chen, Zirui Hu, Xing Xia, Xin Gao, Yi Xu, Tongtong Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei China Singapore Management University Singapore
In software development, developers extensively utilize third-party libraries to avoid implementing existing functionalities. When a new third-party library vulnerability is disclosed, project maintainers need to dete... 详细信息
来源: 评论
HyperMR: Efficient Hypergraph-enhanced Matrix Storage on Compute-in-Memory Architecture
收藏 引用
Proceedings of the ACM on Management of data 2025年 第1期3卷 1-27页
作者: Yifan Wu Ke Chen Gang Chen Dawei Jiang Huan Li Lidan Shou The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China & Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Matrix-vector multiplication (MVM) operations, essential for modern hardware architectures, suffer from heavy I/O overheads and costly serial multiply-add operations. The emerging Compute-in-Memory (CIM) architecture ... 详细信息
来源: 评论
Streamlining Java Programming: Uncovering Well-Formed Idioms with Idiomine  24
Streamlining Java Programming: Uncovering Well-Formed Idioms...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Yang, Yanming Hu, Xing Xia, Xin Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security China Zhejiang University China Singapore Management University Singapore
Code idioms are commonly used patterns, techniques, or practices that aid in solving particular problems or specific tasks across multiple software projects. They can improve code quality, performance, and maintainabi... 详细信息
来源: 评论
Dual-Perspective Activation: Efficient Channel Denoising via Joint Forward-Backward Criterion for Artificial Neural Networks  38
Dual-Perspective Activation: Efficient Channel Denoising via...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qiu, Tian Gao, Chenchao Feng, Zunlei Lei, Jie Hu, Bingde Wang, Xingen Gao, Yi Song, Mingli State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Dalian University of Technology China Zhejiang University of Technology China Bangsheng Technology Co. Ltd. China
The design of Artificial Neural Network (ANN) is inspired by the working patterns of the human brain. Connections in biological neural networks are sparse, as they only exist between few neurons. Meanwhile, the sparse...
来源: 评论
Cross-modality Information Check for Detecting Jailbreaking in Multimodal Large Language Models
Cross-modality Information Check for Detecting Jailbreaking ...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Xu, Yue Qi, Xiuyuan Qin, Zhan Wang, Wenjie School of Information Science and Technology ShanghaiTech University China The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Multimodal Large Language Models (MLLMs) extend the capacity of LLMs to understand multimodal information comprehensively, achieving remarkable performance in many vision-centric tasks. Despite that, recent studies ha...
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators  31
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yang, Siling He, Shuibing Wang, Wenjiong Yin, Yanlong Wu, Tong Chen, Weijian Zhang, Xuechen Sun, Xian-He Feng, Dan The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States Illinois Institute of Technology United States Huazhong University of Science and Technology China Wuhan National Laboratory for Optoelectronics China
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
Dual Prompt-Based Few-Shot Learning for Automated Vulnerability Patch Localization  31
Dual Prompt-Based Few-Shot Learning for Automated Vulnerabil...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Zhang, Junwei Hu, Xing Bao, Lingfeng Xia, Xin Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Software Engineering Application Technology Lab Huawei China
Vulnerabilities are disclosed with corresponding patches so that users can remediate them in time. However, there are instances where patches are not released with the disclosed vulnerabilities, causing hidden dangers... 详细信息
来源: 评论