咨询与建议

限定检索结果

文献类型

  • 125 篇 期刊文献
  • 110 篇 会议

馆藏范围

  • 235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 148 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 43 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 68 篇 理学
    • 39 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 8 篇 化学
    • 4 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 65 篇 the state key la...
  • 41 篇 institute of blo...
  • 39 篇 state key labora...
  • 26 篇 college of compu...
  • 19 篇 zhejiang univers...
  • 17 篇 school of softwa...
  • 13 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 fujian key labor...
  • 9 篇 college of compu...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 software enginee...
  • 7 篇 ant group
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 6 篇 hangzhou high-te...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 13 篇 chen jiawei
  • 12 篇 chen yuling
  • 11 篇 chen ling
  • 10 篇 liu zhenguang
  • 10 篇 wang can
  • 9 篇 chen chun
  • 9 篇 feng yan
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 jiao yingying
  • 8 篇 feng zunlei
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 qin zhan
  • 6 篇 tian hui
  • 6 篇 wan yuanyu
  • 6 篇 liu shunyu

语言

  • 194 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
235 条 记 录,以下是131-140 订阅
排序:
data Confirmation Scheme based on Auditable CP-ABE  15
Data Confirmation Scheme based on Auditable CP-ABE
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Zhang, Lingyun Chen, Yuling Qian, Xiaobin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables Shandong WeiFang China Guizhou CoVision Science & Technology Co. Ltd Guiyang China
Ensuring data rights, openness and transaction flow is important in today's digital economy. Few scholars have studied in the area of data confirmation, it is only with the development of blockchain that it has st... 详细信息
来源: 评论
Concept and Construction of Group Signature with Self-Proof Capacity for Confirming and Denying
收藏 引用
International Journal of Network security 2024年 第6期26卷 1063-1070页
作者: Cheng, Xiaogang Guo, Ren College of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China College of Business Administration Huaqiao University Quanzhou362021 China
A new extension of group signature is presented, namely GS-SPCCD (Group Signature with Self-Proof Capacity for Confirming and Denying). The actual signer of a legitimate group signature can prove that he indeed signs ... 详细信息
来源: 评论
Concept and Construction of Group Signature with self-proof capacity for confirming and denying
arXiv
收藏 引用
arXiv 2023年
作者: Xiao-Gang, Cheng Ren, Guo College of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China College of Business Administration Huaqiao University Quanzhou362021 China
With privacy-preserving and traceability properties, group signature is a cryptosystem with central role in cryptography. And there are lots of application scenarios. A new extension concept of group signature is pres... 详细信息
来源: 评论
DAQ: Density-Aware Post-Training Weight-Only Quantization For LLMs
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Yingsong Chen, Ling State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University Hangzhou China
Large language models (LLMs) excel in various tasks but face deployment challenges due to hardware constraints. We propose density-aware post-training weight-only quantization (DAQ), which has two stages: 1) density-c... 详细信息
来源: 评论
BitPipe: Bidirectional Interleaved Pipeline Parallelism for Accelerating Large Models Training
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Houming Chen, Ling Yu, Wenjie State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University Hangzhou China
With the increasing scale of models, the need for efficient distributed training has become increasingly urgent. Recently, many synchronous pipeline parallelism approaches have been proposed to improve training throug... 详细信息
来源: 评论
Code Search Is All You Need? Improving Code Suggestions with Code Search  24
Code Search Is All You Need? Improving Code Suggestions with...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Chen, Junkai Hu, Xing Li, Zhenhao Gao, Cuiyun Xia, Xin Lo, David School of Software Technology Zhejiang University Ningbo China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Concordia University Montreal Canada Harbin Institute of Technology Shenzhen China Zhejiang University Hangzhou China Singapore Management University Singapore
Modern integrated development environments (IDEs) provide various automated code suggestion techniques (e.g., code completion and code generation) to help developers improve their efficiency. Such techniques may retri... 详细信息
来源: 评论
Enhancing Reentrancy Vulnerability Detection and Repair with a Hybrid Model Framework
Enhancing Reentrancy Vulnerability Detection and Repair with...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Mengliang Li Xiaoxue Ren Han Fu Zhuo Li Jianling Sun State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security College of Computer Science and Technology Zhejiang University State Street Technology(Zhejiang) Ltd
Smart contracts bring revolutionary changes to the credit landscape. However, their security remains intensely scrutinized due to numerous hacking incidents and inherent logical challenges. One well-known and represen... 详细信息
来源: 评论
Optimizing Potato Disease Detection in Pakistan with Machine Learning: A Comparative Analysis  3
Optimizing Potato Disease Detection in Pakistan with Machine...
收藏 引用
3rd International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering, ETECTE 2024
作者: Ahmed, Irfan Khalil, Manahal Ghulam, Safoora Mahmood, Jabar Batool, Khadija Khalid, Nibtal Arshad, Pakiza Dept of Computer Science University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science & Technology Zhejiang University Hangzhou China Dept of Computer Science Int. Institute of Science Art & Technology Gujranwala Pakistan
The agricultural sector of Pakistan depends heavily on the production of potatoes, however diseases like Bacterial Wilt, Late Blight, and Early Blight are posing a growing danger to this industry since they can negati... 详细信息
来源: 评论
A Privacy-preserving Location Recommendation Scheme without Trustworthy Entity
A Privacy-preserving Location Recommendation Scheme without ...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Changli Zhou Jing Peng Ying Ma Qingfeng Jiang College of Computer Science and Technology Huaqiao University Xiamen PR China Key Laboratory of Data Mining and Intelligent Recommendation Fujian Province University Xiamen PR China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen China College of Computer Science and Engineering Changshu Institute of Technology Changshu PR China
The widespread application of location recommendation service brings convenience and social fun to users, but the misuse of user check-in data and location recommendation results can bring serious privacy leakage, bec... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论