咨询与建议

限定检索结果

文献类型

  • 432 篇 期刊文献
  • 394 篇 会议

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 586 篇 工学
    • 480 篇 计算机科学与技术...
    • 390 篇 软件工程
    • 112 篇 信息与通信工程
    • 51 篇 电气工程
    • 48 篇 网络空间安全
    • 46 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 24 篇 机械工程
    • 23 篇 安全科学与工程
    • 20 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
    • 11 篇 交通运输工程
  • 231 篇 理学
    • 137 篇 数学
    • 46 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 15 篇 化学
  • 137 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 36 篇 法学
    • 24 篇 社会学
    • 13 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 6 篇 教育学
  • 3 篇 文学

主题

  • 29 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 23 篇 security
  • 21 篇 federated learni...
  • 18 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 14 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 protocols
  • 12 篇 data models
  • 12 篇 robustness
  • 11 篇 machine learning
  • 10 篇 public key crypt...

机构

  • 165 篇 the state key la...
  • 104 篇 state key labora...
  • 76 篇 institute of blo...
  • 74 篇 state key labora...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 53 篇 zhejiang univers...
  • 46 篇 university of ch...
  • 42 篇 state key labora...
  • 31 篇 college of compu...
  • 29 篇 state key labora...
  • 26 篇 zhejiang univers...
  • 20 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 15 篇 singapore manage...
  • 15 篇 huawei
  • 15 篇 ant group
  • 14 篇 zhejiang univers...

作者

  • 37 篇 ren kui
  • 32 篇 song mingli
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 21 篇 yang xiaohu
  • 20 篇 tian youliang
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 chen gang
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 lo david
  • 14 篇 shou lidan
  • 14 篇 chen ke
  • 13 篇 xin xia

语言

  • 725 篇 英文
  • 96 篇 其他
  • 6 篇 中文
检索条件"机构=The state Key Laboratory of Blockchain and Data Security"
826 条 记 录,以下是31-40 订阅
排序:
An Online Learning Prediction System for MOOCs Using Deep Learning Approaches  10
An Online Learning Prediction System for MOOCs Using Deep Le...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Fan, Guangyu Guo, Jiajia Cheng, Songlin Yang, Dingyu Shanghai Dianji University School of Electronic Information Shanghai China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China
Using Internet, artificial intelligence and other technologies, online learning such as MOOCs provides us with new learning platforms and methods. In the paper, a transformer-based model for online learning prediction... 详细信息
来源: 评论
International Standardization of blockchain and Distributed Ledger Technology:Overlaps,Gaps and Challenges
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第11期137卷 1491-1523页
作者: Xiangjuan Jia Jing Xu Mengwei Han Qing Zhang Lu Zhang Xiaofeng Chen Department of Standardization and Research Project Management Hangzhou Qulian Technology Co.Ltd.Hangzhou310000China State Key Laboratory of Blockchain and Data Security Zhejiang UniversityHangzhou310000China
As one of the most concerned digital technologies in recent years,blockchain and distributed ledger technology are an important driving force for a new round of technological *** is currently in the process of acceler... 详细信息
来源: 评论
A Student Emotions Recognition Based Online Texts with Large Language Models for Learning Prediction
A Student Emotions Recognition Based Online Texts with Large...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Fan, Guangyu Zhang, Shikun Cheng, Songlin Yang, Dingyu Shanghai Dianji University School of Electronic Information Shanghai China Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou China
with the rapid development of artificial intelligence (AI) and Large Language Models (LLM) technologies, it offers innovative approaches to model and analyze to predict student performance with educational behavior an... 详细信息
来源: 评论
An Emotion Recognition with Online Learning data Using Deep Learning Approaches
An Emotion Recognition with Online Learning Data Using Deep ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Fan, Guangyu Guo, Jiajia Cheng, Songlin Yang, Dingyu Shanghai Dianji University School of Electronic Information Shanghai China Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou China
Emotion recognition helps teachers to obtain students' emotional states and their learning progress in their study. Many deep learning-based technologies, such as convolutional neural networks (CNN) and large lang... 详细信息
来源: 评论
SmartLite: A DBMS-based Serving System for DNN Inference in Resource-constrained Environments  50th
SmartLite: A DBMS-based Serving System for DNN Inference in ...
收藏 引用
50th International Conference on Very Large data Bases, VLDB 2024
作者: Lin, Qiuru Wu, Sai Zhao, Junbo Dai, Jian Shi, Meng Chen, Gang Li, Feifei The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang University China Alibaba Group China
Many IoT applications require the use of multiple deep neural networks (DNNs) to perform various tasks on low-cost edge devices with limited computation resources. However, existing DNN model serving platforms, such a... 详细信息
来源: 评论
Fast Query Answering by Labeling Index on Uncertain Graphs  40
Fast Query Answering by Labeling Index on Uncertain Graphs
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Wang, Zeyu Shi, Qihao Chen, Jiawei Wang, Can Song, Mingli Wang, Xinyu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Hangzhou City University Hangzhou China Bangsun Technology Hangzhou China
Given the ubiquity of Uncertain Graphs (UGs), the field of UG mining has garnered increasing attention. Among various mining tasks, query processing stands out as the most fundamental and crucial. Current methods for ... 详细信息
来源: 评论
Biometric Authentication Based on Enhanced Remote Photoplethysmography Signal Morphology  18
Biometric Authentication Based on Enhanced Remote Photopleth...
收藏 引用
18th IEEE International Joint Conference on Biometrics, IJCB 2024
作者: Sun, Zhaodong Li, Xiaobai Komulainen, Jukka Zhao, Guoying Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou China University of Oulu Center for Machine Vision and Signal Analysis Oulu Finland
Remote photoplethysmography (rPPG) is a non-contact method for measuring cardiac signals from facial videos, offering a convenient alternative to contact photoplethysmography (cPPG) obtained from contact sensors. Rece... 详细信息
来源: 评论
dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone  23
dTEE: A Declarative Approach to Secure IoT Applications Usin...
收藏 引用
23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2024
作者: Sun, Tong Li, Borui Teng, Yixiao Gao, Yi Dong, Wei Zhejiang University The State Key Laboratory of Blockchain and Data Security College of Computer Science China Southeast University School of Computer Science and Engineering China
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execu... 详细信息
来源: 评论
Unified Video and Image Representation for Boosted Video Face Forgery Detection  27
Unified Video and Image Representation for Boosted Video Fac...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Liu, Haotian Pan, Chenhui Liu, Yang Zhao, Guoying Li, Xiaobai Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Face forgery detection is crucial in preserving the security and integrity of facial data amidst the rapid developments in face manipulation techniques and deep generative models. Existing methods for video face forge... 详细信息
来源: 评论
NLCTables: A dataset for Marrying Natural Language Conditions with Table Discovery
arXiv
收藏 引用
arXiv 2025年
作者: Cui, Lingxi Li, Huan Chen, Ke Shou, Lidan Chen, Gang The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
With the growing abundance of repositories containing tabular data, discovering relevant tables for in-depth analysis remains a challenging task. Existing table discovery methods primarily retrieve desired tables base... 详细信息
来源: 评论