咨询与建议

限定检索结果

文献类型

  • 439 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 859 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 615 篇 工学
    • 505 篇 计算机科学与技术...
    • 403 篇 软件工程
    • 116 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 53 篇 电气工程
    • 50 篇 网络空间安全
    • 37 篇 电子科学与技术(可...
    • 35 篇 生物工程
    • 26 篇 机械工程
    • 24 篇 安全科学与工程
    • 20 篇 光学工程
    • 16 篇 化学工程与技术
    • 15 篇 动力工程及工程热...
    • 15 篇 轻工技术与工程
    • 12 篇 仪器科学与技术
    • 12 篇 交通运输工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 土木工程
  • 243 篇 理学
    • 144 篇 数学
    • 47 篇 生物学
    • 45 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 15 篇 化学
  • 143 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 军事学
  • 10 篇 医学
  • 9 篇 农学
  • 8 篇 教育学
  • 3 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 privacy
  • 28 篇 semantics
  • 27 篇 blockchain
  • 26 篇 security
  • 21 篇 federated learni...
  • 19 篇 deep learning
  • 17 篇 data privacy
  • 17 篇 codes
  • 17 篇 feature extracti...
  • 17 篇 accuracy
  • 15 篇 cloud computing
  • 15 篇 cryptography
  • 13 篇 differential pri...
  • 13 篇 protocols
  • 13 篇 data models
  • 13 篇 training
  • 12 篇 computational mo...
  • 12 篇 robustness
  • 11 篇 authentication
  • 11 篇 graph neural net...

机构

  • 175 篇 the state key la...
  • 105 篇 state key labora...
  • 94 篇 institute of blo...
  • 84 篇 state key labora...
  • 71 篇 data assurance a...
  • 70 篇 school of cyber ...
  • 55 篇 zhejiang univers...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 30 篇 college of compu...
  • 29 篇 state key labora...
  • 26 篇 zhejiang univers...
  • 20 篇 school of softwa...
  • 18 篇 state key labora...
  • 18 篇 data assurance a...
  • 18 篇 information secu...
  • 16 篇 zhejiang univers...
  • 15 篇 singapore manage...
  • 15 篇 huawei
  • 15 篇 ant group

作者

  • 39 篇 song mingli
  • 38 篇 ren kui
  • 23 篇 xia xin
  • 23 篇 qin zhan
  • 22 篇 tian youliang
  • 21 篇 yang xiaohu
  • 20 篇 youliang tian
  • 20 篇 hu xing
  • 19 篇 chen yuling
  • 18 篇 chen gang
  • 18 篇 lin jingqiang
  • 17 篇 chen jiawei
  • 17 篇 liu zhenguang
  • 17 篇 chen chun
  • 17 篇 li yiming
  • 16 篇 liu zhongxin
  • 16 篇 wang can
  • 15 篇 shou lidan
  • 15 篇 lo david
  • 15 篇 chen ke

语言

  • 712 篇 英文
  • 141 篇 其他
  • 7 篇 中文
检索条件"机构=The state Key Laboratory of Blockchain and Data Security"
859 条 记 录,以下是71-80 订阅
排序:
MUT: Human-in-the-Loop Unit Test Migration  24
MUT: Human-in-the-Loop Unit Test Migration
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Gao, Yi Hu, Xing Xu, Tongtong Xia, Xin Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Hangzhou China School of Computing and Information Systems Singapore Management University Hangzhou China
Test migration, which enables the reuse of test cases crafted with knowledge and creativity by testers across various platforms and programming languages, has exhibited effectiveness in mobile app testing. However, un... 详细信息
来源: 评论
Transformer Doctor: Diagnosing and Treating Vision Transformers  38
Transformer Doctor: Diagnosing and Treating Vision Transform...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Jiacong Chen, Hao Chen, Kejia Gao, Yang Ye, Jingwen Wang, Xingen Song, Mingli Feng, Zunlei College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China National University of Singapore Singapore State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Bangsheng Technology Co. Ltd. China
Due to its powerful representational capabilities, Transformers have gradually become the mainstream model in the field of machine vision. However, the vast and complex parameters of Transformers impede researchers fr...
来源: 评论
Uncertainty-Aware Graph Structure Learning  25
Uncertainty-Aware Graph Structure Learning
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Han, Shen Zhou, Zhiyao Chen, Jiawei Hao, Zhezheng Zhou, Sheng Wang, Gang Feng, Yan Chen, Chun Wang, Can The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Northwestern Polytechnical University Xi’an China Zhejiang University Hangzhou China Bangsun Technology Hangzhou China College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China
Graph Neural Networks (GNNs) have become a prominent approach for learning from graph-structured data. However, their effectiveness can be significantly compromised when the graph structure is suboptimal. To address t... 详细信息
来源: 评论
Automating Comment Generation for Smart Contract from Bytecode
arXiv
收藏 引用
arXiv 2025年
作者: Xiang, Jianhang Gao, Zhipeng Bao, Lingfeng Hu, Xing Chen, Jiayuan Xia, Xin The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Shanghai China Blockchain and Data Security Research Institute Hangzhou China The Ohio State Univeristy Columbus United States
Recently, smart contracts have played a vital role in automatic financial and business transactions. To help end users without programming background to better understand the logic of smart contracts, previous studies... 详细信息
来源: 评论
Robust Watermarks Leak: Channel-Aware Feature Extraction Enables Adversarial Watermark Manipulation
arXiv
收藏 引用
arXiv 2025年
作者: Ba, Zhongjie Zhang, Yitao Cheng, Peng Gong, Bin Zhang, Xinyu Wang, Qinglong Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Watermarking plays a key role in the provenance and detection of AI-generated content. While existing methods prioritize robustness against real-world distortions (e.g., JPEG compression and noise addition), we reveal... 详细信息
来源: 评论
SELF-EXPLAINED keyWORDS EMPOWER LARGE LANGUAGE MODELS FOR CODE GENERATION
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Lishui Chen, Mouxiang Liu, Zhongxin The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Large language models (LLMs) have achieved impressive performance in code generation. However, due to the long-tail distribution of LLMs’ training data, low-frequency terms are typically underrepresented in the train... 详细信息
来源: 评论
SWAT: ASystem-Wide Approach to Tunable Leakage Mitigation in Encrypted data Stores  50th
SWAT: ASystem-Wide Approach to Tunable Leakage Mitigation in...
收藏 引用
50th International Conference on Very Large data Bases, VLDB 2024
作者: Zheng, Leqian Xu, Lei Wang, Cong Wang, Sheng Hu, Yuke Qin, Zhan Li, Feifei Ren, Kui City University of Hong Kong Hong Kong Nanjing University of Science and Technology China Alibaba Group China Zhejiang University The State Key Laboratory of Blockchain and Data Security China
Numerous studies have underscored the significant privacy risks associated with various leakage patterns in encrypted data stores. While many solutions have been proposed to mitigate these leak ages, they either (1) i... 详细信息
来源: 评论
Locally Private Estimator for Degree Distribution with Laplacian Mechanism  10
Locally Private Estimator for Degree Distribution with Lapla...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Li, Jiayu Hu, Yuke Li, Xiaoguang Zhou, Shiqi Wang, Yuxiang Li, Fenghua Niu, Ben Institute of Information Engineering Chinese Academy of Sciences China University of Chinese Academy of Sciences School of Cyber Security China Key Laboratory of Cyberspace Security Defense China Zhejiang University The State Key Laboratory of Blockchain and Data Security China Xidian University School of Cyber Engineering China
Local differential privacy (LDP) provides a solution such that an untrusted server can achieve privacy-preserving data analysis. Node degree is one of the most fundamental metrics in graph data analysis. Existing LDP-... 详细信息
来源: 评论
Fast ODE-based Sampling for Diffusion Models in Around 5 Steps
Fast ODE-based Sampling for Diffusion Models in Around 5 Ste...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zhenyu Zhou Defang Chen Can Wang Chun Chen The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Sampling from diffusion models can be treated as solving the corresponding ordinary differential equations (ODEs), with the aim of obtaining an accurate solution with as few number of function evaluations (NFE) as pos... 详细信息
来源: 评论
Imperceptible but Forgeable: Practical Invisible Watermark Forgery via Diffusion Models
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Ziping Shuai, Chao Ba, Zhongjie Cheng, Peng Qin, Zhan Wang, Qinglong Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Invisible watermarking is critical for content provenance and accountability in Generative AI. Although commercial companies have increasingly committed to using watermarks, the robustness of existing watermarking sch... 详细信息
来源: 评论