咨询与建议

限定检索结果

文献类型

  • 128 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 180 篇 工学
    • 154 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 45 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 20 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 6 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
  • 67 篇 理学
    • 38 篇 数学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 40 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 hangzhou high-te...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 199 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
240 条 记 录,以下是11-20 订阅
排序:
Efficient Cross-modal Prompt Learning with Semantic Enhancement for Domain-robust Fake News Detection  31
Efficient Cross-modal Prompt Learning with Semantic Enhancem...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wu, Fei Jin, Hao Hu, Changhui Ji, Yimu Jing, Xiao-Yuan Jiang, Guo-Ping College of Automation College of Artificial Intelligence Nanjing University of Posts and Telecommunications Nanjing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Guangdong Provincial Key Laboratory of Petrochemical Equipment Intelligent Security Guangdong University of Petrochemical Technology Maoming China School of Computer Wuhan University Wuhan China
With the development of multimedia technology, online social media has become a major medium for people to access news, but meanwhile, it has also exacerbated the dissemination of multi-modal fake news. An automatic a... 详细信息
来源: 评论
MicGuard: a comprehensive detection system against out-of-band injection attacks for different level microphone-based devices  24
MicGuard: a comprehensive detection system against out-of-ba...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Tiantian Liu Feng Lin Zhongjie Ba Li Lu Zhan Qin Kui Ren State Key Laboratory of Blockchain and Data Security Zhejiang University School of Cyber Science and Technology Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security
The integration of microphones into sensors and systems, serving as input interfaces to intelligent applications and industrial manufacture, has raised public concerns regarding their input perception. Studies have un...
来源: 评论
Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Zhenguang Shuai, Chao Fan, Shaojing Dong, Ziping Hu, Jinwu Ba, Zhongjie Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China National University of Singapore Singapore South China University of Technology China
Diffusion models have achieved remarkable success in novel view synthesis, but their reliance on large, diverse, and often untraceable Web datasets has raised pressing concerns about image copyright protection. Curren... 详细信息
来源: 评论
MTVHunter: Smart Contracts Vulnerability Detection Based on Multi-Teacher Knowledge Translation
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Guokai Zhuang, Yuan Zhang, Shuo Feng, Xiaoyu Liu, Zhenguang Zhang, Liguo College of Computer Science and Technology Harbin Engineering University Heilongjiang China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China
Smart contracts, closely intertwined with cryptocurrency transactions, have sparked widespread concerns about considerable financial losses of security issues. To counteract this, a variety of tools have been develope... 详细信息
来源: 评论
Spatial-Temporal Reconstruction Error for AIGC-based Forgery Image Detection
Spatial-Temporal Reconstruction Error for AIGC-based Forgery...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chengji Shen Zhenjiang Liu Kaixuan Chen Jie Lei Mingli Song Zunlei Feng State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Idlefish Network Technology Alibaba Group College of Computer Science and Technology Zhejiang University of Technology
The remarkable success of AI-Generated Content (AIGC), especially diffusion image generation models, brings about unprecedented creative applications, but also creates fertile ground for malicious counterfeiting and c... 详细信息
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Siling Yang Shuibing He Wenjiong Wang Yanlong Yin Tong Wu Weijian Chen Xuechen Zhang Xian-He Sun Dan Feng The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Lab Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Zhejiang Key Laboratory of Big Data Intelligent Computing Washington State University Vancouver Illinois Institute of Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
Dynamic Graph Transformer with Correlated Spatial-Temporal Positional Encoding  25
Dynamic Graph Transformer with Correlated Spatial-Temporal P...
收藏 引用
18th ACM International Conference on Web Search and data Mining, WSDM 2025
作者: Wang, Zhe Zhou, Sheng Chen, Jiawei Zhang, Zhen Hu, Binbin Feng, Yan Chen, Chun Wang, Can Zhejiang University College of Computer Science Hangzhou China Zhejiang University School of Software Technology Ningbo China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China National University of Singapore Singapore Singapore Ant Group Hangzhou China
Learning effective representations for Continuous-Time Dynamic Graphs (CTDGs) has garnered significant research interest, largely due to its powerful capabilities in modeling complex interactions between nodes. A fund... 详细信息
来源: 评论
Towards LLM Guardrails via Sparse Representation Steering
arXiv
收藏 引用
arXiv 2025年
作者: He, Zeqing Wang, Zhibo Xu, Huiyu Ren, Kui The State Key Laboratory of Blockchain Data Security Zhejiang University China School of Cyber Science and Technology Zhejiang University China
Large Language Models (LLMs) have demonstrated remarkable performance in natural language generation tasks, yet their uncontrolled outputs pose significant ethical and safety risks. Recently, representation engineerin... 详细信息
来源: 评论
Multi-stage query-based feature generating and encoding for robust early action recognition
收藏 引用
Visual Computer 2025年 1-17页
作者: Chen, Jie Pan, Wei-Xiang Zhang, Hong-Bo Lin, Ming-Xuan Lei, Qing Liu, Jing-Hua Department of Computer Science and Technology Huaqiao University Xiamen 361021 China Fujxian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen 361021 China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao University Xiamen 361021 China
This paper proposes a novel early action recognition (EAR) method based on multi-stage query-based feature generation and encoding. Existing EAR approaches often struggle with the similarity of initial action features... 详细信息
来源: 评论
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论