咨询与建议

限定检索结果

文献类型

  • 128 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 180 篇 工学
    • 154 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 45 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 20 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 6 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
  • 67 篇 理学
    • 38 篇 数学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 40 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 hangzhou high-te...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 199 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
240 条 记 录,以下是121-130 订阅
排序:
Model LEGO: Creating Models Like Disassembling and Assembling Building Blocks  38
Model LEGO: Creating Models Like Disassembling and Assemblin...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Jiacong Gao, Jing Ye, Jingwen Gao, Yang Wang, Xingen Feng, Zunlei Song, Mingli College of Computer Science and Technology Zhejiang University China Robotics Institute School of Computer Science Carnegie Mellon University United States Electrical and Computer Engineering National University of Singapore Singapore School of Software Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Bangsheng Technology Co. Ltd. China
With the rapid development of deep learning, the increasing complexity and scale of parameters make training a new model increasingly resource-intensive. In this paper, we start from the classic convolutional neural n...
来源: 评论
A Privacy Protection Scheme for Consumer Electronics data Based on blockchain and AI
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Wang, Luping Yan, Chen Wu, Hongjie Zhu, Fa Kumari, Saru Alenazi, Mohammed J.F State Key Laboratory of Blockchain and Data Security Suzhou University of Science and Technology Suzhou215009 China Zhejiang University Hangzhou310027 China Suzhou University of Science and Technology Suzhou215009 China Nanjing Forestry University College of Information Science College of Artificial Intelligence Nanjing210037 China Chaudhary Charan Singh University Department of Mathematics Uttar Pradesh Meerut250001 India Department of Computer Engineering Riyadh11451 Saudi Arabia
As information technology advances, a significant amount of data related to consumer electronics has emerged, the consumer data is commonly stored on cloud servers, resulting in frequent data leaks and privacy breache... 详细信息
来源: 评论
Ethereum Phishing Detection Using Hyperbolic Neural Networks and Temporal Information  22
Ethereum Phishing Detection Using Hyperbolic Neural Networks...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Xu, Rong Zhang, Jun Zhu, Xiaoyue Song, Zhaoxiong Yu, Zhi Inner Mongolia University College of Computer Science Hohhot China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Institute of Computing Technology Chinese Academy of Sciences Beijing China
In recent years, the frequent occurrence of phishing scams on Ethereum has posed serious threats to transaction security and the financial safety of users. This paper proposes an Ethereum phishing scam detection metho... 详细信息
来源: 评论
A2PO: Towards Effective Offline Reinforcement Learning from an Advantage-aware Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Qing, Yunpeng Liu, Shunyu Cong, Jingyuan Chen, Kaixuan Zhou, Yihe Song, Mingli College of Computer Science and Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Offline reinforcement learning endeavors to leverage offline datasets to craft effective agent policy without online interaction, which imposes proper conservative constraints with the support of behavior policies to ... 详细信息
来源: 评论
Non-stationary online convex optimization with arbitrary delays  24
Non-stationary online convex optimization with arbitrary del...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Yuanyu Wan Chang Yao Mingli Song Lijun Zhang The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China and School of Software Technology Zhejiang University Ningbo China and Hangzhou High- Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China and Hangzhou High- Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China and The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Online convex optimization (OCO) with arbitrary delays, in which gradients or other information of functions could be arbitrarily delayed, has received increasing attention recently. Different from previous studies th...
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web  9
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
9th IEEE International Conference on data Science in Cyberspace, DSC 2024
作者: Chen, Hongfan Diao, Yigang Xiang, Hui Huo, Yixuan Xie, Xiaqing Zhao, Jiapeng Wang, Xuebin Sun, Yanwei Shi, Jinqiao Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Beijing China Data and Technology Support Center Cyberspace Administration of China Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论
PON: Proposal Optimization Network for Temporal Action Proposal Generation  16th
PON: Proposal Optimization Network for Temporal Action Propo...
收藏 引用
16th International Conference on Intelligent Computing, ICIC 2020
作者: Peng, Xiaoxiao Du, Jixiang Zhang, Hongbo Department of Computer Science and Technology Huaqiao University Quanzhou China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Quanzhou China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao University Quanzhou China
Temporal action localization is a challenging task in video understanding. Although great progress has been made in temporal action localization, the most advanced methods still have the problem of sharp performance d... 详细信息
来源: 评论
A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 719-733页
作者: Jie Chen Chengsheng Yuan Chen Cui Zhihua Xia Xingming Sun Thangarajah Akilan School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310053China Jiangsu Yuchi Blockchain Research Institute Nanjing210044China Department of Software Engineering Lakehead UniversityThunder BayON P7B 5E1Canada
Fingerprint identification systems have been widely deployed in many occasions of our daily ***,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit *** address cha... 详细信息
来源: 评论
BSL: Understanding and Improving Softmax Loss for Recommendation  40
BSL: Understanding and Improving Softmax Loss for Recommenda...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Wu, Junkang Chen, Jiawei Wu, Jiancan Shi, Wentao Zhang, Jizhi Wang, Xiang University of Science and Technology of China MoE Key Laboratory of Brain-inspired Intelligent Perception and Cognition Hefei China Zhejiang Unversity The State Key Laboratory of Blockchain and Data Security China Institute of Artificial Intelligence Institute of Dataspace Hefei Comprehensive National Science Center. China
Loss functions steer the optimization direction of recommendation models and are critical to model performance, but have received relatively little attention in recent recommendation research. Among various losses, we... 详细信息
来源: 评论
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowledge Graph Representation Learning Approach
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Qian Chen, Ling State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Temporal Knowledge Graph (TKG) representation learning aims to map temporal evolving entities and relations to embedded representations in a continuous low-dimensional vector space. However, existing approaches cannot... 详细信息
来源: 评论