咨询与建议

限定检索结果

文献类型

  • 132 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 244 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 157 篇 计算机科学与技术...
    • 122 篇 软件工程
    • 47 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 20 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 10 篇 安全科学与工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 交通运输工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 70 篇 理学
    • 40 篇 数学
    • 14 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 生物学
    • 8 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 41 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 17 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 fujian key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 hangzhou high-te...
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 201 篇 英文
  • 41 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
244 条 记 录,以下是151-160 订阅
排序:
Non-stationary Online Convex Optimization with Arbitrary Delays
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Yuanyu Yao, Chang Song, Mingli Zhang, Lijun The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Software Technology Zhejiang University Ningbo China Institute of Blockchain and Data Security Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Online convex optimization (OCO) with arbitrary delays, in which gradients or other information of functions could be arbitrarily delayed, has received increasing attention recently. Different from previous studies th... 详细信息
来源: 评论
An Efficient Watermarking Method for Latent Diffusion Models via Low-Rank Adaptation
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Dongdong Li, Yue Tondi, Benedetta Li, Bin Barni, Mauro Guangdong Provincial Key Laboratory of Intelligent Information Processing The Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Huaqiao University China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China Department of Information Engineering and Mathematics The University of Siena Italy
The rapid proliferation of deep neural networks (DNNs) is driving a surge in model watermarking technologies, as the trained deep models themselves serve as intellectual properties. The core of existing model watermar... 详细信息
来源: 评论
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection  24
What's the Real: A Novel Design Philosophy for Robust AI-Syn...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Hai, Xuan Liu, Xin Tan, Yuan Liu, Gang Li, Song Niu, Weina Zhou, Rui Zhou, Xiaokang School of Information Science and Engineering Lanzhou University Lanzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Faculty of Business Data Science Kansai University Osaka Japan
Voice is one of the most widely used media for information transmission in human society. While high-quality synthetic voices are extensively utilized in various applications, they pose significant risks to content se... 详细信息
来源: 评论
MSHyper: Multi-Scale Hypergraph Transformer for Long-Range Time Series Forecasting
arXiv
收藏 引用
arXiv 2024年
作者: Shang, Zongjiang Chen, Ling Wu, Binqing Cui, Dongliang State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University Hangzhou310027 China
Demystifying the interactions between temporal patterns of different scales is fundamental to precise long-range time series forecasting. However, previous works lack the ability to model high-order interactions. To p... 详细信息
来源: 评论
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node  15
A Multipath Source Location Privacy Protection Scheme in Wir...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Sun, Jing Chen, Yuling Lv, Xiao Qian, Xiaobin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables Weifang China Guizhou Shuanhui Big Data Industry Development Co.Ltd Guiyang China Guizhou CoVision Science &technology Co.Ltd Guiyang China
Wireless sensor networks (WSNs) are widely devoted to monitoring target. Attackers can detect the source node by hop-by-hop backtracking strategy. Therefore, it is necessary to protect the location privacy of data sou... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
GLOW: Global Layout Aware Attacks on Object Detection
GLOW: Global Layout Aware Attacks on Object Detection
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Jun Bao Buyu Liu Kui Ren Jun Yu The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou Dianzi University Harbin Institute of Technology (Shenzhen)
Adversarial attacks aim to perturb images such that a predictor outputs incorrect results. Due to the limited research in structured attacks, imposing consistency checks on natural multi-object scenes is a practical d... 详细信息
来源: 评论
PSL: Rethinking and Improving Softmax Loss from Pairwise Perspective for Recommendation
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Weiqin Chen, Jiawei Xin, Xin Zhou, Sheng Hu, Binbin Feng, Yan Chen, Chun Wang, Can Shandong University China Ant Group China State Key Laboratory of Blockchain and Data Security Zhejiang University China College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China
Softmax Loss (SL) is widely applied in recommender systems (RS) and has demonstrated effectiveness. This work analyzes SL from a pairwise perspective, revealing two significant limitations: 1) the relationship between... 详细信息
来源: 评论
Uncertainty-aware complementary label queries for active learning
收藏 引用
Frontiers of Information technology & Electronic Engineering 2023年 第10期24卷 1497-1503页
作者: Shengyuan LIU Ke CHEN Tianlei HU Yunqing MAO Key Lab of Intelligent Computing Based Big Data of Zhejiang Province Zhejiang UniversityHangzhou 310027China State Key Laboratory of Blockchain and Data Security Zhejiang UniversityHangzhou 310027China City Cloud Technology(China)Co. Ltd.Hangzhou 310000China
Many active learning methods assume that a learner can simply ask for the full annotations of some training data from *** methods mainly try to cut the annotation costs by minimizing the number of annotation ***,annot... 详细信息
来源: 评论
TIMEMIXER++: A GENERAL TIME SERIES PATTERN MACHINE FOR UNIVERSAL PREDICTIVE ANALYSIS
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Shiyu Li, Jiawei Shi, Xiaoming Ye, Zhou Mo, Baichuan Lin, Wenze Ju, Shengtong Chu, Zhixuan Jin, Ming The Hong Kong University of Science and Technology Guangzhou China Massachusetts Institute of Technology United States Zhejiang University China The State Key Laboratory of Blockchain and Data Security China Institute of Blockchain and Data Security China Griffith University Australia
Time series analysis plays a critical role in numerous applications, supporting tasks such as forecasting, classification, anomaly detection, and imputation. In this work, we present the time series pattern machine (T... 详细信息
来源: 评论