咨询与建议

限定检索结果

文献类型

  • 443 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 621 篇 工学
    • 509 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 117 篇 信息与通信工程
    • 65 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 安全科学与工程
    • 21 篇 光学工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 15 篇 轻工技术与工程
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
  • 239 篇 理学
    • 140 篇 数学
    • 47 篇 生物学
    • 46 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 15 篇 化学
  • 142 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 7 篇 教育学
  • 3 篇 文学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 22 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 data privacy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 176 篇 the state key la...
  • 105 篇 state key labora...
  • 85 篇 state key labora...
  • 78 篇 institute of blo...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 28 篇 hangzhou high-te...
  • 26 篇 zhejiang univers...
  • 21 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 698 篇 英文
  • 159 篇 其他
  • 7 篇 中文
检索条件"机构=The state Key Laboratory of Blockchain and Data Security"
863 条 记 录,以下是41-50 订阅
排序:
Unified Video and Image Representation for Boosted Video Face Forgery Detection  27
Unified Video and Image Representation for Boosted Video Fac...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Liu, Haotian Pan, Chenhui Liu, Yang Zhao, Guoying Li, Xiaobai Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Face forgery detection is crucial in preserving the security and integrity of facial data amidst the rapid developments in face manipulation techniques and deep generative models. Existing methods for video face forge... 详细信息
来源: 评论
Research on the Design of blockchain-Based Aviation Physical and Chemical Testing System  29th
Research on the Design of Blockchain-Based Aviation Physical...
收藏 引用
29th International Conference on Computational and Experimental Engineering and Sciences, ICCES 2023
作者: Zhang, Yijian Zhang, Lu Xu, Jing Du, Jingyi Wei, Zunbo Chen, Xiaofeng Hangzhou Qulian Technology Co. Ltd. Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
As a part of aviation flight guarantee, physical and chemical testing in the aviation industry plays a very important role. The traditional physical and chemical testing industry has problems such as long process wait... 详细信息
来源: 评论
DSBT: Research on Soulbound Token Mechanism Based on Consortium blockchain and Decentralized Identity  29th
DSBT: Research on Soulbound Token Mechanism Based on Consort...
收藏 引用
29th International Conference on Computational and Experimental Engineering and Sciences, ICCES 2023
作者: Zhang, Yijian Zhang, Lu Zhang, Qing Zheng, Peiyu Jia, Xiangjuan Chen, Xiaofeng Hangzhou Qulian Technology Co. Ltd. Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Issues such as technology, application and future development based on blockchain have always been hot topics. Future forms such as Web3.0 and the Metaverse are inseparable from digital identities and virtual tokens. ... 详细信息
来源: 评论
Exemplar-Free Incremental Deepfake Detection  27
Exemplar-Free Incremental Deepfake Detection
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Xiong, Wuti Zhao, Guoying Li, Xiaobai Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Incremental Deepfake Detection (IDD) aims to continuously update models with new domain data, adapting to evolving forgery techniques. Existing works require extra buffers to store old exemplars for maintaining previo... 详细信息
来源: 评论
Metaverse Standardization: System Planning, Current Status and Prospects  29th
Metaverse Standardization: System Planning, Current Status a...
收藏 引用
29th International Conference on Computational and Experimental Engineering and Sciences, ICCES 2023
作者: Wei, Zunbo Ge, Qiang Jia, Xiangjuan Zhang, Yijian Han, Mengwei Chen, Xiaofeng Hangzhou Qulian Technology Co. Ltd. Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
In recent years, metaverse has become one of the frontier fields that countries around the world pay attention to and has gradually entered the public's field of vision. The emergence of metaverse brings new consu... 详细信息
来源: 评论
APIBeh: Learning Behavior Inclination of APIs for Malware Classification  35
APIBeh: Learning Behavior Inclination of APIs for Malware Cl...
收藏 引用
35th IEEE International Symposium on Software Reliability Engineering, ISSRE 2024
作者: Cui, Lei Zhu, Yiran Yin, Junnan Hao, Zhiyu Wang, Wei Liu, Peng Yang, Ziqi Yun, Xiaochun Zhongguancun Laboratory China Zhejiang University The State Key Laboratory of Blockchain and Data Security China China Guangxi Normal University School of Computer Science and Engineering China
Malware classification involves categorizing mal-ware samples based on their characteristics. While deep learning techniques applied to malware execution traces, mainly API calls, have shown potential in this field, t... 详细信息
来源: 评论
Nearly Optimal Regret for Decentralized Online Convex Optimization  37
Nearly Optimal Regret for Decentralized Online Convex Optimi...
收藏 引用
37th Annual Conference on Learning Theory, COLT 2024
作者: Wan, Yuanyu Wei, Tong Song, Mingli Zhang, Lijun The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Software Technology Zhejiang University Ningbo China Institute of Blockchain and Data Security Hangzhou China School of Computer Science and Engineering Southeast University Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
We investigate decentralized online convex optimization (D-OCO), in which a set of local learners are required to minimize a sequence of global loss functions using_only local computations and communications. Previous... 详细信息
来源: 评论
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Ziwei Lin, Feng Ba, Zhongjie Lu, Li Ren, Kui Zhejiang University State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology China Institute of Blockchain and Data Security Hangzhou China
Physical adversarial examples (AEs) have become an increasing threat to deploying deep neural network (DNN) models in the real world. Popular approaches adopt sticking-based or projecting-based strategies that stick t... 详细信息
来源: 评论
Association pattern-aware fusion for biological entity relationship prediction  24
Association pattern-aware fusion for biological entity relat...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Lingxiang Jia Yuchen Ying Zunlei Feng Zipeng Zhong Shaolun Yao Jiacong Hu Mingjiang Duan Xingen Wang Jie Song Mingli Song State Key Laboratory of Blockchain and Data Security Zhejiang University State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security State Key Laboratory of Blockchain and Data Security Zhejiang University and Bangsheng Technology Co Ltd.
Deep learning-based methods significantly advance the exploration of associations among triple-wise biological entities (e.g., drug-target protein-adverse reaction), thereby facilitating drug discovery and safeguardin...
来源: 评论
Threshold Huffman-Based Covert Timing Channel Detection
收藏 引用
International Journal of Network security 2025年 第1期27卷 61-71页
作者: Lin, Yuwei Chen, Yonghong Zhuang, Xiaolong Huang, Xuwen School of Computer Science and Technology Huaqiao University Fujian Xiamen361000 China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Fujian Xiamen361000 China
Network covert timing channels in computer networks evade effective detection by traditional security mechanisms such as firewalls, posing a significant threat to network security. However, most existing methods strug... 详细信息
来源: 评论