咨询与建议

限定检索结果

文献类型

  • 125 篇 期刊文献
  • 110 篇 会议

馆藏范围

  • 235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 148 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 43 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 68 篇 理学
    • 39 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 8 篇 化学
    • 4 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 65 篇 the state key la...
  • 41 篇 institute of blo...
  • 39 篇 state key labora...
  • 26 篇 college of compu...
  • 19 篇 zhejiang univers...
  • 17 篇 school of softwa...
  • 13 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 fujian key labor...
  • 9 篇 college of compu...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 software enginee...
  • 7 篇 ant group
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 6 篇 hangzhou high-te...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 13 篇 chen jiawei
  • 12 篇 chen yuling
  • 11 篇 chen ling
  • 10 篇 liu zhenguang
  • 10 篇 wang can
  • 9 篇 chen chun
  • 9 篇 feng yan
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 jiao yingying
  • 8 篇 feng zunlei
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 qin zhan
  • 6 篇 tian hui
  • 6 篇 wan yuanyu
  • 6 篇 liu shunyu

语言

  • 194 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
235 条 记 录,以下是161-170 订阅
排序:
A Multidimensional data Utility Evaluation and Pricing Scheme in the Big data Market
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Chen, Yuling Bai, Rui Wu, Yongtang Li, Tao Zhou, Hui State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Shandong Weifang262700 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China Weifang Key Laboratory of Blockchain on Agricultural Vegetables Shandong Weifang262700 China
Big data as a derivative of information technology facilitates the birth of data trading. The technology surrounding the business value of big data has come into focus. However, most of the current research focuses on... 详细信息
来源: 评论
Distillation Matters: Empowering Sequential Recommenders to Match the Performance of Large Language Model
arXiv
收藏 引用
arXiv 2024年
作者: Cui, Yu Liu, Feng Wang, Pengbo Wang, Bohao Tang, Heng Wan, Yi Wang, Jun Chen, Jiawei Zhejiang University Hangzhou China OPPO Research Institute Shenzhen China University of Electronic Science and Technology of China Chengdu China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China
Owing to their powerful semantic reasoning capabilities, Large Language Models (LLMs) have been effectively utilized as recommenders, achieving impressive performance. However, the high inference latency of LLMs signi... 详细信息
来源: 评论
The optimal attack-defense scheme for secret sharing  15
The optimal attack-defense scheme for secret sharing
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Ma, Juan Chen, Yuling Lv, Xiao Qian, Xiaobin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables Weifang China Guizhou Shuanhui Big Data Industry Development Co. Ltd Guiyang China Guizhou CoVision Science &technology Co. Ltd Guiyang China
The attack-defense issue of secret sharing has been a pressing cryptography research need. For solving this issue, this study proposes an optimal secret-share attack-defense model with game theory and information theo... 详细信息
来源: 评论
Ethereum Phishing Detection Using Hyperbolic Neural Networks and Temporal Information
Ethereum Phishing Detection Using Hyperbolic Neural Networks...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Rong Xu Jun Zhang Xiaoyue Zhu Zhaoxiong Song Zhi Yu College of Computer Science Inner Mongolia University Hohhot China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Computing Technology Chinese Academy of Sciences Beijing China
In recent years, the frequent occurrence of phishing scams on Ethereum has posed serious threats to transaction security and the financial safety of users. This paper proposes an Ethereum phishing scam detection metho... 详细信息
来源: 评论
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node  15
A Multipath Source Location Privacy Protection Scheme in Wir...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Sun, Jing Chen, Yuling Lv, Xiao Qian, Xiaobin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables Weifang China Guizhou Shuanhui Big Data Industry Development Co.Ltd Guiyang China Guizhou CoVision Science &technology Co.Ltd Guiyang China
Wireless sensor networks (WSNs) are widely devoted to monitoring target. Attackers can detect the source node by hop-by-hop backtracking strategy. Therefore, it is necessary to protect the location privacy of data sou... 详细信息
来源: 评论
VisioPhysioENet: Multimodal Engagement Detection using Visual and Physiological Signals
arXiv
收藏 引用
arXiv 2024年
作者: Singh, Alakhsimar Verma, Nischay Goyal, Kanav Singh, Amritpal Kumar, Puneet Li, Xiaobai Computer Science and Engineering Department National Institute of Technology Jalandhar India Center for Machine Vision and Signal Analysis University of Oulu Finland The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
This paper presents VisioPhysioENet, a novel multimodal system that leverages visual and physiological signals to detect learner engagement. It employs a two-level approach for extracting both visual and physiological... 详细信息
来源: 评论
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments
Towards Efficient Asynchronous Federated Learning in Heterog...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Yajie Zhou Xiaoyi Pang Zhibo Wang Jiahui Hu Peng Sun Kui Ren The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Cyber Science and Technology Zhejiang University Hangzhou China College of Computer Science and Electronic Engineering Hunan University Changsha China
Federated learning (FL) is widely used in edge environments as a privacy-preserving collaborative learning paradigm. However, edge devices often have heterogeneous computation capabilities and data distributions, hamp... 详细信息
来源: 评论
Mamba Adapter: Efficient Multi-Modal Fusion for Vision-Language Tracking
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Shi, Liangtao Zhong, Bineng Liang, Qihua Hu, Xiantao Mo, Zhiyi Song, Shuxiang Ministry of Education Guangxi Normal University Key Laboratory of Education Blockchain and Intelligent Technology Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guilin541004 China Wuzhou University School of Data Science and Software Engineering Wuzhou543002 China
Utilizing the high-level semantic information of language to compensate for the limitations of vision information is a highly regarded approach in single-object tracking. However, most existing vision-language (VL) tr... 详细信息
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Hongfan Chen Yigang Diao Hui Xiang Yixuan Huo Xiaqing Xie Jiapeng Zhao Xuebin Wang Yanwei Sun Jinqiao Shi School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China Cyberspace Administration of China Data and Technology Support Center Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论
Interaction Pattern Disentangling for Multi-Agent Reinforcement Learning
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Shunyu Song, Jie Zhou, Yihe Yu, Na Chen, Kaixuan Feng, Zunlei Song, Mingli The State Key Laboratory of Blockchain and Security Zhejiang University Hangzhou310027 China Institute of Blockchain and Data Security Hangzhou310027 China The School of Software Technology Zhejiang University Hangzhou310027 China
Deep cooperative multi-agent reinforcement learning has demonstrated its remarkable success over a wide spectrum of complex control tasks. However, recent advances in multi-agent learning mainly focus on value decompo... 详细信息
来源: 评论