咨询与建议

限定检索结果

文献类型

  • 125 篇 期刊文献
  • 121 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 148 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 43 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 68 篇 理学
    • 39 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 8 篇 化学
    • 4 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 66 篇 the state key la...
  • 42 篇 state key labora...
  • 41 篇 institute of blo...
  • 29 篇 college of compu...
  • 20 篇 zhejiang univers...
  • 19 篇 school of softwa...
  • 13 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 fujian key labor...
  • 9 篇 college of compu...
  • 9 篇 state key labora...
  • 8 篇 college of compu...
  • 8 篇 ant group
  • 8 篇 xiamen key labor...
  • 7 篇 software enginee...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 6 篇 hangzhou high-te...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 13 篇 chen jiawei
  • 12 篇 chen yuling
  • 11 篇 chen ling
  • 10 篇 mingli song
  • 10 篇 liu zhenguang
  • 10 篇 wang can
  • 9 篇 chen chun
  • 9 篇 feng yan
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 jiao yingying
  • 8 篇 feng zunlei
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 qin zhan
  • 7 篇 zunlei feng
  • 6 篇 tian hui

语言

  • 205 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
246 条 记 录,以下是201-210 订阅
排序:
Autoregressive Queries for Adaptive Tracking with Spatio-Temporal Transformers
arXiv
收藏 引用
arXiv 2024年
作者: Xie, Jinxia Zhong, Bineng Mo, Zhiyi Zhang, Shengping Shi, Liangtao Song, Shuxiang Ji, Rongrong Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education China Guangxi Key Lab of Multi-Source Information Mining & Security China Guangxi Normal University Guilin541004 China Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University China School of Computer Science and Technology Harbin Institute of Technology China Media Analytics and Computing Lab School of Informatics Xiamen University China
The rich spatio-temporal information is crucial to capture the complicated target appearance variations in visual tracking. However, most top-performing tracking algorithms rely on many hand-crafted components for spa... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhiyuan Pan Xing Hu Xin Xia Xian Zhan David Lo Xiaohu Yang The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei Hangzhou China The Hong Kong Polytechnic University Hong Kong China School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Chong Su, Jianzhong Chen, Jiachi Wang, Yanlin Bi, Tingting Yu, Jianxing Wang, Yanli Lin, Xingwei Chen, Ting Zheng, Zibin Sun Yat-sen University China The State Key Laboratory of Blockchain and Data Security Zhejiang University China University of Western Australia Australia Zhejiang University China University of Electronic Science and Technology of China China
With the development of blockchain technology, smart contracts have become an important component of blockchain applications. Despite their crucial role, the development of smart contracts may introduce vulnerabilitie... 详细信息
来源: 评论
BSL: Understanding and Improving Softmax Loss for Recommendation
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Junkang Chen, Jiawei Wu, Jiancan Shi, Wentao Zhang, Jizhi Wang, Xiang MoE Key Laboratory of Brain-inspired Intelligent Perception and Cognition University of Science and Technology of China Hefei China The State Key Laboratory of Blockchain and Data Security Zhejiang Unversity China Institute of Artificial Intelligence Institute of Dataspace Hefei Comprehensive National Science Center China
Loss functions steer the optimization direction of recommendation models and are critical to model performance, but have received relatively little attention in recent recommendation research. Among various losses, we... 详细信息
来源: 评论
Efficient Adaptive Label Refinement for label noise learning
收藏 引用
Neurocomputing 2025年 639卷
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China School of Computer Science and Technology Hainan University Hainan Haikou570228 China Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing complex manually designed strategies, aiming to achieve op... 详细信息
来源: 评论
Advanced Maximal Biclique Enumeration on GPUs Using Bitmaps
收藏 引用
IEEE Transactions on Computers 2025年
作者: Pan, Zhe He, Shuibing Li, Xu Zhang, Xuechen Wang, Rui Yin, Yanlong Chen, Gang Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China Hangzhou310051 China Washington State University Vancouver School of Engineering and Computer Science VancouverWA98686 United States
Maximal biclique enumeration (MBE) in bipartite graphs is an important problem in data mining with many real-world applications. Parallel MBE algorithms for GPUs are needed for MBE acceleration leveraging its many com... 详细信息
来源: 评论
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative database
收藏 引用
IEEE Transactions on Emerging Topics in Computing 2025年
作者: Zhao, Dongdong Liu, Zhihui Zhang, Fengji Liu, Lei Keung, Jacky Wai Yu, Xiao Wuhan University of Technology School of Computer Science and Artificial Intelligence Wuhan China Wuhan University of Technology Chongqing Research Institute Chongqing China City University of Hong Kong Department of Computer Science Hong Kong Xi'an Jiaotong University School of Electronic Science and Engineering Xi'an China Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou China
The emergence of Aging-Related Bugs (ARBs) poses a significant challenge to software systems, resulting in performance degradation and increased error rates in resourceintensive systems. Consequently, numerous ARB pre... 详细信息
来源: 评论
data Governance: Status, Technologies, Applications and Development Trends  8
Data Governance: Status, Technologies, Applications and Deve...
收藏 引用
8th International Conference on data Science in Cyberspace, DSC 2023
作者: Zhu, Haiyang Chen, Xiaofeng Li, Suyan Wang, Yejin Fang, Xinwei Zhu, Minfeng Zhejiang University Wuchan Zhongda Digital Technology Co. Ltd. The State Key Lab of Cad&cg Hangzhou China Zhejiang University Hangzhou Qulian Technology Co. Ltd. The State Key Laboratory of Blockchain and Data Security Hangzhou China Zhejiang Institute of Mechanical & Electrical Engineering Hangzhou China Wuchan Zhongda Digital Technology Co. Ltd. Hangzhou China School of Medicine Zhejiang University Sir Run Run Shaw Hospital Department of Internet and Artificial Intelligence Hangzhou China Zhejiang University Hangzhou China
data governance involves legal, policy, technologies, and standards measures to ensure security, accuracy, integrity, consistency, and accessibility of data, with the primary objective of unlocking its latent value. I... 详细信息
来源: 评论
Towards Unified Token Learning for Vision-Language Tracking
arXiv
收藏 引用
arXiv 2023年
作者: Zheng, Yaozong Zhong, Bineng Liang, Qihua Li, Guorong Ji, Rongrong Li, Xianxian The Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China The Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Key Laboratory of Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing100049 China Media Analytics and Computing Lab Department of Artificial Intelligence School of Informatics Xiamen University 361005 China
In this paper, we present a simple, flexible and effective vision-language (VL) tracking pipeline, termed MMTrack, which casts VL tracking as a token generation task. Traditional paradigms address VL tracking task ind... 详细信息
来源: 评论
Sustainability Forecasting for Deep Learning Packages
Sustainability Forecasting for Deep Learning Packages
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Junxiao Han Yunkun Wang Zhongxin Liu Lingfeng Bao Jiakun Liu David Lo Shuiguang Deng School of Computer & Computing Science Hangzhou City University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Computing and Information Systems Singapore Management University Singapore Singapore
Deep Learning (DL) technologies have been widely adopted to tackle various tasks. In this process, through software dependencies, a multi-layer DL supply chain (SC) is formed, with DL frameworks acting as the root, DL... 详细信息
来源: 评论