咨询与建议

限定检索结果

文献类型

  • 128 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 180 篇 工学
    • 154 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 45 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 20 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 6 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
  • 67 篇 理学
    • 38 篇 数学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 40 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 hangzhou high-te...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 199 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
240 条 记 录,以下是111-120 订阅
排序:
Experimental Analysis of Selective Imitation for Multifactorial Differential Evolution  14th
Experimental Analysis of Selective Imitation for Multifactor...
收藏 引用
14th International Conference on Bio-inspired Computing: Theories and Applications, BIC-TA 2019
作者: Peng, Deming Cai, Yiqiao Fu, Shunkai Luo, Wei College of Computer Science and Technology Huaqiao University Quanzhou China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen361000 China
Recently, evolutionary multitasking optimization (EMTO) is proposed as a new emerging optimization paradigm to simultaneously solve multiple optimization tasks in a cooperative manner. In EMTO, the knowledge transfer ... 详细信息
来源: 评论
A Lightweight Authentication Protocol Based on Pid-Ga and Ecc for Mobile Edge Computing
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Linghui Zhou, Changli Quan, Hanyu Wen, Jingliang College of Computer Science and Technology HuaQiao University Xiamen361021 China Xiamen Key Laboratory of Data Security and Blockchain Technology HuaQiao University Xiamen361021 China
The existing cloud computing network model is no longer applicable to the fast-growing edge terminal environment, and decentralized network model has gradually become a hot topic of concern. However, in the edge compu... 详细信息
来源: 评论
Enhancing Semi-Supervised Learning via Representative and Diverse Sample Selection  38
Enhancing Semi-Supervised Learning via Representative and Di...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shao, Qian Kang, Jiangrui Chen, Qiyuan Li, Zepeng Xu, Hongxia Cao, Yiwen Liang, Jiajuan Wu, Jian College of Computer Science & Technology Liangzhu Laboratory Zhejiang University China BNU-HKBU United International College China WeDoctor Cloud China The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Semi-Supervised Learning (SSL) has become a preferred paradigm in many deep learning tasks, which reduces the need for human labor. Previous studies primarily focus on effectively utilising the labelled and unlabeled ...
来源: 评论
Review of data security within energy blockchain:A comprehensive analysis of storage,management,and utilization
收藏 引用
High-Confidence Computing 2024年 第3期4卷 82-102页
作者: Yunhua He Zhihao Zhou Yan Pan Fahui Chong Bin Wu Ke Xiao Hong Li School of Information Science and Technology North China University of TechnologyBeijing 100144China China Industrial Control Systems Cyber Emergency Response Team Beijing 100040China Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology Beijing 100040China Institute of Information Engineering Chinese Academy of Sciences Beijing 100195China
Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization,decentralization,democratization,and *** this evolving context,energy blockchain,aiming to enhance effici... 详细信息
来源: 评论
Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1947-1976页
作者: Asif Rahim Yanru Zhong Tariq Ahmad Sadique Ahmad Mohammed A.ElAffendi School of Computer and Information Security Guilin University of Electronic TechnologyGuilin541004China Guangxi Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin University of Electronic TechnologyGuilin541004China School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of *** Neural Networks(CNNs)have shown promi... 详细信息
来源: 评论
PS3: Precise Patch Presence Test Based on Semantic Symbolic Signature  24
PS3: Precise Patch Presence Test Based on Semantic Symbolic ...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Zhan, Qi Hu, Xing Li, Zhiyang Xia, Xin Lo, David Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China Singapore Management University Singapore
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
Transform Sequential data to Image for Detecting Covert Timing Channel
收藏 引用
International Journal of Network security 2024年 第2期26卷 224-234页
作者: Huang, Xuwen Chen, Yonghong Zhuang, Xiaolong Lin, Yuwei School of Computer Science and Technology Huaqiao University China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen Fujian 361000 China
The network covert timing channel utilizes inter-packet delay to encode binary data to achieve information leakage and other purposes. In recent years, Covert Timing Channels (CTCs) have been demonstrated to be applic... 详细信息
来源: 评论
Preventing the Popular Item Embedding Based Attack in Federated Recommendations  40
Preventing the Popular Item Embedding Based Attack in Federa...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Zhang, Jun Li, Huan Rong, Dazhong Zhao, Yan Chen, Ke Shou, Lidan Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Aalborg University Department of Computer Science Aalborg Denmark
Privacy concerns have led to the rise of federated recommender systems (FRS), which can create personalized models across distributed clients. However, FRS is vulnerable to poisoning attacks, where malicious users man... 详细信息
来源: 评论
FESR - Framework to evaluate Software Reliability based on software metrics  24
FESR - Framework to evaluate Software Reliability based on s...
收藏 引用
8th International Conference on High Performance Compilation, Computing and Communications, HP3C 2024
作者: Fahad, Hurriya Ahmed, Irfan Mahmood, Jabar Saman Batool, Khadija Ali, Qasim Department of Computer Science University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou310007 China
Evaluating reliability of software is hot concern for decision makers and software engineers seeing as if we assess, it cannot be mastered. It is common that reliability of system stratum could be employed for evaluat... 详细信息
来源: 评论