咨询与建议

限定检索结果

文献类型

  • 123 篇 期刊文献
  • 111 篇 会议

馆藏范围

  • 234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 149 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 42 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
    • 5 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 土木工程
  • 64 篇 理学
    • 37 篇 数学
    • 13 篇 生物学
    • 12 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 55 篇 管理学
    • 30 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 computational mo...
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 smart contract
  • 6 篇 robustness
  • 5 篇 codes
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 deep learning
  • 4 篇 recommender syst...
  • 4 篇 contrastive lear...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 adaptation model...
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 63 篇 the state key la...
  • 39 篇 institute of blo...
  • 39 篇 state key labora...
  • 25 篇 college of compu...
  • 19 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 school of cyber ...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 8 篇 xiamen key labor...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 12 篇 chen jiawei
  • 12 篇 chen yuling
  • 10 篇 liu zhenguang
  • 10 篇 chen ling
  • 9 篇 wang can
  • 9 篇 feng zunlei
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 chen chun
  • 8 篇 jiao yingying
  • 8 篇 feng yan
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 hu binbin
  • 7 篇 zhang hong-bo
  • 6 篇 wan yuanyu

语言

  • 196 篇 英文
  • 36 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
234 条 记 录,以下是1-10 订阅
排序:
E-PRedictor: an approach for early prediction of pull request acceptance
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 380-395页
作者: Kexing CHEN Lingfeng BAO Xing HU Xin XIA Xiaohu YANG State Key Laboratory of Blockchain and Data Security Zhejiang University Software Engineering Application Technology Lab
A pull request(PR) is an event in Git where a contributor asks project maintainers to review code he/she wants to merge into a project. The PR mechanism greatly improves the efficiency of distributed software developm... 详细信息
来源: 评论
Threshold Huffman-Based Covert Timing Channel Detection
收藏 引用
International Journal of Network security 2025年 第1期27卷 61-71页
作者: Lin, Yuwei Chen, Yonghong Zhuang, Xiaolong Huang, Xuwen School of Computer Science and Technology Huaqiao University Fujian Xiamen361000 China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Fujian Xiamen361000 China
Network covert timing channels in computer networks evade effective detection by traditional security mechanisms such as firewalls, posing a significant threat to network security. However, most existing methods strug... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Interaction Confidence Attention for Human–Object Interaction Detection
收藏 引用
International Journal of Computer Vision 2025年 1-20页
作者: Zhang, Hong-Bo Lin, Wang-Kai Su, Hang Lei, Qing Liu, Jing-Hua Du, Ji-Xiang Department of Computer Science and Technology Huaqiao University Xiamen361021 China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen361021 China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao University Xiamen361021 China Fujian Province University Xiamen361021 China
In human–object interaction (HOI) detection task, ensuring that interactive pairs receive higher attention weights while reducing the weight of non-interaction pairs is imperative for enhancing HOI detection accuracy... 详细信息
来源: 评论
Enhancing Human Pose Estimation in the Internet of Things via Diffusion Generative Models
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 13556-13567页
作者: Wu, Sifan Zhang, Hongzhe Liu, Zhenguang Chen, Haipeng Jiao, Yingying Jilin University College of Computer Science and Technology the Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun130012 China School of discipline inspection and supervision China University of Political Science and Law Beijing100088 China Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Institute of Blockchain and Data Security Hangzhou310059 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310014 China
With the ongoing development of public video surveillance technology, accurate human pose estimation is becoming increasingly important in urban administration and law enforcement. However, existing methods rely on la... 详细信息
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators  31
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yang, Siling He, Shuibing Wang, Wenjiong Yin, Yanlong Wu, Tong Chen, Weijian Zhang, Xuechen Sun, Xian-He Feng, Dan The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States Illinois Institute of Technology United States Huazhong University of Science and Technology China Wuhan National Laboratory for Optoelectronics China
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Ziwei Lin, Feng Ba, Zhongjie Lu, Li Ren, Kui Zhejiang University State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology China Institute of Blockchain and Data Security Hangzhou China
Physical adversarial examples (AEs) have become an increasing threat to deploying deep neural network (DNN) models in the real world. Popular approaches adopt sticking-based or projecting-based strategies that stick t... 详细信息
来源: 评论
How Do Recommendation Models Amplify Popularity Bias? An Analysis from the Spectral Perspective  25
How Do Recommendation Models Amplify Popularity Bias? An Ana...
收藏 引用
18th ACM International Conference on Web Search and data Mining, WSDM 2025
作者: Lin, Siyi Gao, Chongming Chen, Jiawei Zhou, Sheng Hu, Binbin Feng, Yan Chen, Chun Wang, Can Zhejiang University Hangzhou China University of Science and Technology of China Hefei China Ant Group Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Institute of Blockchain and Data Security Zhejiang University Hangzhou China
Recommendation Systems (RS) are often plagued by popularity bias. When training a recommendation model on a typically long-tailed dataset, the model tends to not only inherit this bias but often exacerbate it, resulti... 详细信息
来源: 评论
Sequential Indifferentiability of 7-Round Misty Structures
Sequential Indifferentiability of 7-Round Misty Structures
收藏 引用
Cryptographers’ Track at the RSA Conference, CT-RSA 2025
作者: Ai, Jiayi Guo, Chun School of Cyber Science and Technology Shandong University Qingdao China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education Shandong University Shandong Qingdao266237 China Shandong Research Institute of Industrial Technology Shandong Jinan250102 China
We investigate the Misty structure with respect to the security notion of sequential indifferentiability of Mandal et al. (TCC 2012). As our main result, we prove sequential indifferentiability for 7-round Misty struc...
来源: 评论
Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness  10th
Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics...
收藏 引用
10th International Symposium on Dependable Software Engineering: Theories, Tools and Applications, SETTA 2024
作者: Lu, Jiayi Yuan, Shenghao Sanan, David Zhao, Yongwang School of Cyber Science and Technology and College of Computer Science and Technology Zhejiang University Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China InfoComm Technology Cluster Singapore Institute of Technology Singapore Singapore
Binary semantics forms a critical infrastructure for proving the correctness of Just-In-Time (JIT) compilation, an advanced technique to optimize runtime execution by translating the source bytecode of a program into ... 详细信息
来源: 评论