咨询与建议

限定检索结果

文献类型

  • 123 篇 期刊文献
  • 111 篇 会议

馆藏范围

  • 234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 149 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 42 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
    • 5 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 土木工程
  • 64 篇 理学
    • 37 篇 数学
    • 13 篇 生物学
    • 12 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 55 篇 管理学
    • 30 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 computational mo...
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 smart contract
  • 6 篇 robustness
  • 5 篇 codes
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 deep learning
  • 4 篇 recommender syst...
  • 4 篇 contrastive lear...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 adaptation model...
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 63 篇 the state key la...
  • 39 篇 institute of blo...
  • 39 篇 state key labora...
  • 25 篇 college of compu...
  • 19 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 school of cyber ...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 8 篇 xiamen key labor...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 12 篇 chen jiawei
  • 12 篇 chen yuling
  • 10 篇 liu zhenguang
  • 10 篇 chen ling
  • 9 篇 wang can
  • 9 篇 feng zunlei
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 chen chun
  • 8 篇 jiao yingying
  • 8 篇 feng yan
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 hu binbin
  • 7 篇 zhang hong-bo
  • 6 篇 wan yuanyu

语言

  • 196 篇 英文
  • 36 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
234 条 记 录,以下是91-100 订阅
排序:
Transformer Doctor: Diagnosing and Treating Vision Transformers  38
Transformer Doctor: Diagnosing and Treating Vision Transform...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Jiacong Chen, Hao Chen, Kejia Gao, Yang Ye, Jingwen Wang, Xingen Song, Mingli Feng, Zunlei College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China National University of Singapore Singapore State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Bangsheng Technology Co. Ltd. China
Due to its powerful representational capabilities, Transformers have gradually become the mainstream model in the field of machine vision. However, the vast and complex parameters of Transformers impede researchers fr...
来源: 评论
An Effective security Comparison Protocol in Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5141-5158页
作者: Yuling Chen Junhong Tao Tao Li Jiangyuan Cai Xiaojun Ren State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin550000China POWERCHINA Guizhou Electric Power Engineering Co. Ltd.Guiyang550000China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang261000China
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and *** this can save customers’operating costs,it also poses privacy and se... 详细信息
来源: 评论
A security Transaction Model Based on HTLC  15
A Security Transaction Model Based on HTLC
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: He, Xiaochuan Tan, Chaoyue Wu, Yongtang Chen, Yuling Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology College of Computer Science and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables Weifang Key Laboratory of Blockchain on Agricultural Vegetables Weifang China Weifang Key Laboratory of Blockchain on Agricultural Vegetables Weifang University of Science and Technology Weifang China
Hashed Timelock Contract (HTLC), as one of the important parts of Lightning Network (LN), provides technical support for cross-node transactions. However, security and privacy issues, such as preimage transmiting and ... 详细信息
来源: 评论
A blockchain-based Scalable Electronic Contract Signing System  15
A Blockchain-based Scalable Electronic Contract Signing Syst...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Yang, Kaicheng Wu, Yongtang Chen, Yuling State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guangxi China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Weifang Key Laboratory of Blockchain on Agricultural Vegetables WeiFang China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology WeiFang China
As the COVID-19 continues to spread globally, more and more companies are transforming into remote online offices, leading to the expansion of electronic signatures. However, the existing electronic signatures platfor... 详细信息
来源: 评论
A K-anonymity Optimization Algorithm Under Attack Model  15
A K-anonymity Optimization Algorithm Under Attack Model
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Yang, Manxiang Wu, Yongtang Chen, Yuling State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guangxi China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Weifang Key Laboratory of Blockchain on Agricultural Vegetables WeiFang China
The current k-anonymity algorithm still suffers from problems such as location information leakage and poor quality of service due to improper selection of k. To tackle the above drawbacks, we propose a personalized k... 详细信息
来源: 评论
Covert Timing Channel Detection Based on Isolated Binary Trees
SSRN
收藏 引用
SSRN 2024年
作者: Lin, Yuwei Chen, Yonghong Zhuang, Xiaolong Tian, Hui College of Computer Secience and Techinology Huaqiao University Xiamen China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen China
Network covert timing channel threats to network security by altering the timing characteristics ofnetwork packets to transmit confidential information. In this paper, we propose a detection methodbased on isolated bi... 详细信息
来源: 评论
A Secure Comparison Protocol in the Malicious Model  15
A Secure Comparison Protocol in the Malicious Model
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Tao, Junhong Wu, Yongtang Chen, Yuling Guizhou University State Key Laboratory of Public Big Data College of Computer Science and and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables WeiFang China Weifang Key Laboratory of Blockchain on Agricultural Vegetables WeiFang China
Secure comparison is an important problem in the field of secure computing. A classic example is the Millionaires' problem, which is securely compares the wealth of two millionaires without revealing their wealth.... 详细信息
来源: 评论
Rotation-DPeak: Improving Density Peaks Selection for Imbalanced data  1
收藏 引用
8th China Computer Federation International Conference on Big data, CCF BIGdata 2020
作者: Hu, Xiaoliang Yan, Ming Chen, Yewang Yang, Lijie Du, Jixiang The College of Computer Science and Technology Huaqiao University Xiamen China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China
Density Peak (DPeak) is an effective clustering algorithm. It maps arbitrary dimensional data onto a 2-dimensional space, which yields cluster centers and outliers automatically distribute on upper right and upper lef... 详细信息
来源: 评论
LAPAA: A Secure and Lightweight Authentication Protocol for Edge Computing Built on ASCON Algorithm
LAPAA: A Secure and Lightweight Authentication Protocol for ...
收藏 引用
Next Generation data-driven Networks (NGDN), International Conference on
作者: Linghui Zhang Changli Zhou Jingliang Wen College of Computer Science and Technology HuaQiao University Xiamen China Xiamen Key Laboratory of Data Security and Blockchain Technology HuaQiao University Xiamen China
Facing the challenges of next-generation network security, Mobile Edge Computing (MEC) serves as a decentralized model designed to meet the growing demands for data processing and reduce latency, making its security i... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论