咨询与建议

限定检索结果

文献类型

  • 128 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 180 篇 工学
    • 154 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 45 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 20 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 6 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
  • 67 篇 理学
    • 38 篇 数学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 40 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 hangzhou high-te...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 199 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
240 条 记 录,以下是101-110 订阅
排序:
A Secure Comparison Protocol in the Malicious Model  15
A Secure Comparison Protocol in the Malicious Model
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Tao, Junhong Wu, Yongtang Chen, Yuling Guizhou University State Key Laboratory of Public Big Data College of Computer Science and and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables WeiFang China Weifang Key Laboratory of Blockchain on Agricultural Vegetables WeiFang China
Secure comparison is an important problem in the field of secure computing. A classic example is the Millionaires' problem, which is securely compares the wealth of two millionaires without revealing their wealth.... 详细信息
来源: 评论
Rotation-DPeak: Improving Density Peaks Selection for Imbalanced data  1
收藏 引用
8th China Computer Federation International Conference on Big data, CCF BIGdata 2020
作者: Hu, Xiaoliang Yan, Ming Chen, Yewang Yang, Lijie Du, Jixiang The College of Computer Science and Technology Huaqiao University Xiamen China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China
Density Peak (DPeak) is an effective clustering algorithm. It maps arbitrary dimensional data onto a 2-dimensional space, which yields cluster centers and outliers automatically distribute on upper right and upper lef... 详细信息
来源: 评论
LAPAA: A Secure and Lightweight Authentication Protocol for Edge Computing Built on ASCON Algorithm
LAPAA: A Secure and Lightweight Authentication Protocol for ...
收藏 引用
Next Generation data-driven Networks (NGDN), International Conference on
作者: Linghui Zhang Changli Zhou Jingliang Wen College of Computer Science and Technology HuaQiao University Xiamen China Xiamen Key Laboratory of Data Security and Blockchain Technology HuaQiao University Xiamen China
Facing the challenges of next-generation network security, Mobile Edge Computing (MEC) serves as a decentralized model designed to meet the growing demands for data processing and reduce latency, making its security i... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
SWAT: ASystem-Wide Approach to Tunable Leakage Mitigation in Encrypted data Stores  50th
SWAT: ASystem-Wide Approach to Tunable Leakage Mitigation in...
收藏 引用
50th International Conference on Very Large data Bases, VLDB 2024
作者: Zheng, Leqian Xu, Lei Wang, Cong Wang, Sheng Hu, Yuke Qin, Zhan Li, Feifei Ren, Kui City University of Hong Kong Hong Kong Nanjing University of Science and Technology China Alibaba Group China Zhejiang University The State Key Laboratory of Blockchain and Data Security China
Numerous studies have underscored the significant privacy risks associated with various leakage patterns in encrypted data stores. While many solutions have been proposed to mitigate these leak ages, they either (1) i... 详细信息
来源: 评论
Online Discriminative Semantic-Preserving Hashing for Large-Scale Cross-Modal Retrieval  18th
Online Discriminative Semantic-Preserving Hashing for Large-...
收藏 引用
18th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2021
作者: Yi, Jinhan He, Yi Liu, Xin Department of Computer Science and Technology Huaqiao University Xiamen361021 China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing University of Science and Technology Nanjing210094 China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Xiamen China Fujian Key Laboratory of Big Data Intelligence and Security Xiamen China
Cross-modal hashing has drawn increasing attentions for efficient retrieval across different modalities, and existing methods primarily learn the hash functions in a batch based mode, i.e., offline methods. Neverthele... 详细信息
来源: 评论
Learning a Mini-Batch Graph Transformer via Two-Stage Interaction Augmentation  27
Learning a Mini-Batch Graph Transformer via Two-Stage Intera...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Li, Wenda Chen, Kaixuan Liu, Shunyu Zheng, Tongya Huang, Wenjie Song, Mingli State Key Laboratory of Blockchain and Security Zhejiang University China School of Software Technology Zhejiang University China Institute of Blockchain and Data Security China Big Graph Center School of Computer and Computing Science Hangzhou City University China College of Computer Science and Technology Zhejiang University Hangzhou China
Mini-batch Graph Transformer (MGT), as an emerging graph learning model, has demonstrated significant advantages in semi-supervised node prediction tasks with improved computational efficiency and enhanced model robus... 详细信息
来源: 评论
Joint-Motion Mutual Learning for Pose Estimation in Video  24
Joint-Motion Mutual Learning for Pose Estimation in Video
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Sifan Chen, Haipeng Yin, Yifang Hu, Sihao Feng, Runyang Jiao, Yingying Yang, Ziqi Liu, Zhenguang College of Computer Science and Technology Jilin University Changchun China A STAR Singapore Singapore Georgia Institute of Technology AtlantaGA United States School of Artificial Intelligence Jilin University Changchun China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Institute of Blockchain and Data Security Hangzhou China
Human pose estimation in videos has long been a compelling yet challenging task within the realm of computer vision. Nevertheless, this task remains difficult because of the complex video scenes, such as video defocus... 详细信息
来源: 评论
A Rational Delegating Computation Protocol Based on Smart Contract  14th
A Rational Delegating Computation Protocol Based on Smart Co...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Ma, Juan Chen, Yuling Liu, Guoxu Zhu, Hongliang Peng, Changgen State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Shouguang China Engineering Lab for Cloud Security and Information Security Center of BUPT Beijing China
The delegating computation has become an irreversible trend, together comes the pressing need for fairness and efficiency issues. To solve this problem, we leverage game theory to propose a smart c... 详细信息
来源: 评论
CDS: An Anti-Aging Calibratable Digital Sensor for Detecting Multiple Types of Fault Injection Attacks  24
CDS: An Anti-Aging Calibratable Digital Sensor for Detecting...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Chen, Zhiyuan Yang, Kun Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University China School of Cyber Science and Technology Zhejiang University China ZJU-Hangzhou Global Scientific and Technological Innovation Center China
Fault injection attacks (FIAs) are a class of active physical attacks that inject faults into computing devices to deliberately change their intended behaviors for malicious purposes such as security feature circumven... 详细信息
来源: 评论