咨询与建议

限定检索结果

文献类型

  • 132 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 244 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 157 篇 计算机科学与技术...
    • 122 篇 软件工程
    • 47 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 20 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 10 篇 安全科学与工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 交通运输工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 70 篇 理学
    • 40 篇 数学
    • 14 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 生物学
    • 8 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 41 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 17 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 fujian key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 hangzhou high-te...
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 201 篇 英文
  • 41 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
244 条 记 录,以下是171-180 订阅
排序:
BSL: Understanding and Improving Softmax Loss for Recommendation
BSL: Understanding and Improving Softmax Loss for Recommenda...
收藏 引用
International Conference on data Engineering
作者: Junkang Wu Jiawei Chen Jiancan Wu Wentao Shi Jizhi Zhang Xiang Wang MoE Key Laboratory of Brain-inspired Intelligent Perception and Cognition University of Science and Technology of China Hefei China The State Key Laboratory of Blockchain and Data Security Zhejiang Unversity
Loss functions steer the optimization direction of recommendation models and are critical to model performance, but have received relatively little attention in recent recommendation research. Among various losses, we... 详细信息
来源: 评论
Sustainability Forecasting for Deep Learning Packages  31
Sustainability Forecasting for Deep Learning Packages
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Han, Junxiao Wang, Yunkun Liu, Zhongxin Bao, Lingfeng Liu, Jiakun Lo, David Deng, Shuiguang School of Computer & Computing Science Hangzhou City University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China School of Computing and Information Systems Singapore Management University Singapore Singapore
Deep Learning (DL) technologies have been widely adopted to tackle various tasks. In this process, through software dependencies, a multi-layer DL supply chain (SC) is formed, with DL frameworks acting as the root, DL... 详细信息
来源: 评论
Distinguishing LLM-generated from Human-written Code by Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Xiaodan Ni, Chao Guo, Xinrong Liu, Shaoxuan Wang, Xiaoya Liu, Kui Yang, Xiaohu State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei Hangzhou China
Large language models (LLMs), such as ChatGPT released by OpenAI, have attracted significant attention from both industry and academia due to their demonstrated ability to generate high-quality content for various tas... 详细信息
来源: 评论
Improving Adversarial Robustness via Feature Pattern Consistency Constraint
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Jiacong Ye, Jingwen Feng, Zunlei Yang, Jiazhen Liu, Shunyu Yu, Xiaotian Jia, Lingxiang Song, Mingli College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China State Key Laboratory of Blockchain and Security Zhejiang University China Institute of Blockchain and Data Security China National University of Singapore Singapore
Convolutional Neural Networks (CNNs) are well-known for their vulnerability to adversarial attacks, posing significant security concerns. In response to these threats, various defense methods have emerged to bolster t... 详细信息
来源: 评论
Hierarchical Local Global Transformer for Point Clouds Analysis
SSRN
收藏 引用
SSRN 2023年
作者: Li, Dilong Zheng, Shenghong Chen, Ziyi Li, Xiang Wang, Lanying Du, Jixiang College of Computer Science and Technology Fujian Key Laboratory of Big Data Intelligence and Security Xiamen Key Laboratory of Computer Vision and Pattern Recognition Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University FJ Xiamen361021 China School of Economics and Finance Huaqiao University FJ Quanzhou362021 China Department of Geography and Environmental Management University of Waterloo WaterlooONN2L 3G1 Canada
Transformer networks have demonstrated remarkable performance in point cloud analysis. However, achieving a balance between local regional context and global long-range context learning remains a significant challenge... 详细信息
来源: 评论
K-CIRCT: A Layered, Composable, and Executable Formal Semantics for CIRCT Hardware IRs
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Jianhong Kang, Jinhui Zhao, Yongwang School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China
CIRCT, an open-source EDA framework akin to LLVM for software, is a foundation for various hardware description languages. Despite its crucial role, CIRCT’s lack of formal semantics challenges necessary rigorous hard... 详细信息
来源: 评论
How Do Recommendation Models Amplify Popularity Bias? An Analysis from the Spectral Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Siyi Gao, Chongming Chen, Jiawei Zhou, Sheng Hu, Binbin Feng, Yan Chen, Chun Wang, Can University of Science and Technology of China Hefei China Zhejiang University Hangzhou China Ant Group Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University China College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China
Recommendation Systems (RS) are often plagued by popularity bias. When training a recommendation model on a typically long-tailed dataset, the model tends to not only inherit this bias but often exacerbate it, resulti... 详细信息
来源: 评论
Fast Query Answering by Labeling Index on Uncertain Graphs
Fast Query Answering by Labeling Index on Uncertain Graphs
收藏 引用
International Conference on data Engineering
作者: Zeyu Wang Qihao Shi Jiawei Chen Can Wang Mingli Song Xinyu Wang The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Hangzhou City University Hangzhou China Bangsun Technology Hangzhou China
Given the ubiquity of Uncertain Graphs (UGs), the field of UG mining has garnered increasing attention. Among various mining tasks, query processing stands out as the most fundamental and crucial. Current methods for ... 详细信息
来源: 评论
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CROSS-MODAL RETRIEVAL
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CR...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Yi, Jinhan Liu, Xin Cheung, Yiu-Ming Xu, Xing Fan, Wentao He, Yi Department of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Lab. of Computer Vision and Pattern Recognition Fujian Key Lab. of Big Data Intelligence and Security China Department of Computer Science Hong Kong Baptist University Kowloon Hong Kong School of Computer Science and Engineering University of Electronic Science and Technology of China China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Existing cross-modal hashing still faces three challenges: (1) Most batch-based methods are unsuitable for processing large-scale and streaming data. (2) Current online methods often suffer from insufficient semantic ... 详细信息
来源: 评论
A Novel Lexicon Enhanced Named Entity Recognition Model for Network security Domain
A Novel Lexicon Enhanced Named Entity Recognition Model for ...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Jin, Zhiyang Fu, Yusun Huan, Yuehui Xue, Jinliang Wang, Chengguang Chen, Yuanfang Ningbo Artificial Intelligence Institute Shanghai Jiao Tong University Ningbo China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Zhejiang Guoli Security Technology Co. Ltd Ningbo China Ningbo Industrial Internet Institute Ningbo China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Named Entity Recognition (NER) technology serves as the foundation for solving many Natural Language Processing(NLP) problems, particularly in the domain of building knowledge graphs, where an effective NER model is c... 详细信息
来源: 评论