咨询与建议

限定检索结果

文献类型

  • 125 篇 期刊文献
  • 110 篇 会议

馆藏范围

  • 235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 148 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 43 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 68 篇 理学
    • 39 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 8 篇 化学
    • 4 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 65 篇 the state key la...
  • 41 篇 institute of blo...
  • 39 篇 state key labora...
  • 26 篇 college of compu...
  • 19 篇 zhejiang univers...
  • 17 篇 school of softwa...
  • 13 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 fujian key labor...
  • 9 篇 college of compu...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 software enginee...
  • 7 篇 ant group
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 6 篇 hangzhou high-te...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 13 篇 chen jiawei
  • 12 篇 chen yuling
  • 11 篇 chen ling
  • 10 篇 liu zhenguang
  • 10 篇 wang can
  • 9 篇 chen chun
  • 9 篇 feng yan
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 jiao yingying
  • 8 篇 feng zunlei
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 qin zhan
  • 6 篇 tian hui
  • 6 篇 wan yuanyu
  • 6 篇 liu shunyu

语言

  • 194 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
235 条 记 录,以下是221-230 订阅
排序:
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CROSS-MODAL RETRIEVAL
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CR...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Yi, Jinhan Liu, Xin Cheung, Yiu-Ming Xu, Xing Fan, Wentao He, Yi Department of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Lab. of Computer Vision and Pattern Recognition Fujian Key Lab. of Big Data Intelligence and Security China Department of Computer Science Hong Kong Baptist University Kowloon Hong Kong School of Computer Science and Engineering University of Electronic Science and Technology of China China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Existing cross-modal hashing still faces three challenges: (1) Most batch-based methods are unsuitable for processing large-scale and streaming data. (2) Current online methods often suffer from insufficient semantic ... 详细信息
来源: 评论
Model Discrepancy Learning: Synthetic Faces Detection Based on Multi-Reconstruction
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, QingChao Xu, ZhiShuo Zhu, ZhiYing Chen, Ning Wang, HaoYue Ba, ZhongJie East China University of Science and Technology Shanghai China Fudan University Shanghai China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Advances in image generation enable hyper-realistic synthetic faces but also pose risks, thus making synthetic face detection crucial. Previous research focuses on the general differences between generated images and ... 详细信息
来源: 评论
Experimental Analysis of Selective Imitation for Multifactorial Differential Evolution  14th
Experimental Analysis of Selective Imitation for Multifactor...
收藏 引用
14th International Conference on Bio-inspired Computing: Theories and Applications, BIC-TA 2019
作者: Peng, Deming Cai, Yiqiao Fu, Shunkai Luo, Wei College of Computer Science and Technology Huaqiao University Quanzhou China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen361000 China
Recently, evolutionary multitasking optimization (EMTO) is proposed as a new emerging optimization paradigm to simultaneously solve multiple optimization tasks in a cooperative manner. In EMTO, the knowledge transfer ... 详细信息
来源: 评论
Public Auditing for Multi-Version Cloud data with Storage Efficiency and Version Dynamics
SSRN
收藏 引用
SSRN 2022年
作者: Ye, Weiping Nan, Fulin Tian, Hui Quan, Hanyu Chang, Chin-Chen College of Computer Science and Technology National Huaqiao University Xiamen361021 China Wuhan National Laboratory for Optoelectronics Wuhan430074 China Fujian Key Laboratory of Big Data Intelligence and Security National Huaqiao University Xiamen361021 China Department of Information and Computer Science Feng Chia University Taichung40724 Taiwan
Multi-version data storage has been an increasingly popular service in cloud computing, which is shown to support flexible rollback recovery of cloud data. However, how to verify the integrity of this kind of data eff... 详细信息
来源: 评论
Ppdrm: Privacy-Preserving Drm Training and Classification on the Cloud
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Lida Tian, Chengliang Zhang, Guoyan Li, Leibo Tian, Weizhong Zhang, Yan College of Computer Science and Technology Qingdao University Qingdao266071 China School of Cyber Science and Technology Shandong University Shandong Ji’nan250101 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong Ji’nan250101 China Shandong Institute of Blockchain Shandong Ji’nan250101 China College of Big Data and Internet Shenzhen Technology University Guangdong Shenzhen518118 China College of Electromechanical Engineering Qingdao University of Science and Technology Qingdao266061 China
The prevalence of cloud computing greatly promotes the development of artificial intelligence(AI). Accurately and efficiently classify data on the cloud is a classic AI task. The recent Discriminative Ridge Machine(DR... 详细信息
来源: 评论
Practitioners’ Expectations on Log Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Xiaoxue Li, Yishu Keung, Jacky Yu, Xiao Zou, Huiqi Yang, Zhen Sarro, Federica Barr, Earl T. Department of Electronic Engineering and Computer Science Hong Kong Metropolitan University Hong Kong Department of Computer Science City University of Hong Kong Hong Kong State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Department of Computer Science Johns Hopkins University Baltimore United States School of Computer Science and Technology Shandong University Shandong China Department of Computer Science University College London London United Kingdom
Log anomaly detection has become a common practice for software engineers to analyze software system behavior. Despite significant research efforts in log anomaly detection over the past decade, it remains unclear wha...
来源: 评论
PON: Proposal Optimization Network for Temporal Action Proposal Generation  16th
PON: Proposal Optimization Network for Temporal Action Propo...
收藏 引用
16th International Conference on Intelligent Computing, ICIC 2020
作者: Peng, Xiaoxiao Du, Jixiang Zhang, Hongbo Department of Computer Science and Technology Huaqiao University Quanzhou China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Quanzhou China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao University Quanzhou China
Temporal action localization is a challenging task in video understanding. Although great progress has been made in temporal action localization, the most advanced methods still have the problem of sharp performance d... 详细信息
来源: 评论
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yiming Zhu, Mingyan Guo, Junfeng Wei, Tao Xia, Shu-Tao Qin, Zhan Hangzhou311215 China School of Cyber Science and Technology Zhejiang University Hangzhou311200 China Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China Department of Computer Science University of Maryland College ParkMD20742 United States Ant Group Hangzhou310023 China The Research Center of Artificial Intelligence Peng Cheng Laboratory Shenzhen518000 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou311200 China
Currently, sample-specific backdoor attacks (SSBAs) are the most advanced and malicious methods since they can easily circumvent most of the current backdoor defenses. In this paper, we reveal that SSBAs are not suffi...
来源: 评论
data Governance: Status, Technologies, Applications and Development Trends
Data Governance: Status, Technologies, Applications and Deve...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Haiyang Zhu Xiaofeng Chen Suyan Li Yejin Wang Xinwei Fang Minfeng Zhu The state Key Lab of CAD&CG Zhejiang University Wuchan Zhongda Digital Technology Co. Ltd. Hangzhou China The state Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou Qulian Technology Co. Ltd. Hangzhou China Zhejiang Institute of Mechanical & Electrical Engineering Hangzhou China Wuchan Zhongda Digital Technology Co. Ltd. Hangzhou China Department of Internet and Artificial Intelligence Sir Run Run Shaw Hospital School of Medicine Zhejiang University Hangzhou China Zhejiang University Hangzhou China
data governance involves legal, policy, technologies, and standards measures to ensure security, accuracy, integrity, consistency, and accessibility of data, with the primary objective of unlocking its latent value. I...
来源: 评论
Ablockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things
ABlockchain-enabled Efficient and Fair Energy Trading Scheme...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jianwen Hu Yuling Chen Xiaoiun Ren Yixian Yang Xiaobin Qian State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Weifang China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China Guizhou CoVision Science & Technology Co. Ltd Guiyang China
As the technical support of the Industrial Internet of Things, blockchain technology has been widely used in energy trading, data transactions, and Internet of Vehicles. However, among the existing energy trading mode... 详细信息
来源: 评论