咨询与建议

限定检索结果

文献类型

  • 132 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 244 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 157 篇 计算机科学与技术...
    • 122 篇 软件工程
    • 47 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 20 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 10 篇 安全科学与工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 交通运输工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 70 篇 理学
    • 40 篇 数学
    • 14 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 生物学
    • 8 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 41 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 17 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 fujian key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 hangzhou high-te...
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 201 篇 英文
  • 41 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
244 条 记 录,以下是41-50 订阅
排序:
Multi-Grained Feature Pruning for Video-Based Human Pose Estimation
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Zhigang Fan, Shaojing Liu, Zhenguang Wu, Zheqi Wu, Sifan Jiao, Yingying College of Computer Science and Technology Zhejiang Gongshang University Hangzhou China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Human pose estimation, with its broad applications in action recognition and motion capture, has experienced significant advancements. However, current Transformer-based methods for video pose estimation often face ch... 详细信息
来源: 评论
Preventing the Popular Item Embedding Based Attack in Federated Recommendations
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Jun Li, Huan Rong, Dazhong Zhao, Yan Chen, Ke Shou, Lidan The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Department of Computer Science Aalborg University Aalborg Denmark
Privacy concerns have led to the rise of federated recommender systems (FRS), which can create personalized models across distributed clients. However, FRS is vulnerable to poisoning attacks, where malicious users man... 详细信息
来源: 评论
Multi-Grained Feature Pruning for Video-Based Human Pose Estimation
Multi-Grained Feature Pruning for Video-Based Human Pose Est...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhigang Wang Shaojing Fan Zhenguang Liu Zheqi Wu Sifan Wu Yingying Jiao College of Computer Science and Technology Zhejiang Gongshang University Hangzhou China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Human pose estimation, with its broad applications in action recognition and motion capture, has experienced significant advancements. However, current Transformer-based methods for video pose estimation often face ch... 详细信息
来源: 评论
InTime: Towards Performance Predictability In Byzantine Fault Tolerant Proof-of-Stake Consensus
收藏 引用
Proceedings of the ACM on Management of data 2025年 第1期3卷 1-27页
作者: Weijie Sun Zihuan Xu Wangze Ni Lei Chen The Hong Kong University of Science and Technology Hong Kong Hong Kong Shenzhen Institute of Computing Sciences Shenzhen China Zhejiang University Hangzhou China The State Key Laboratory of Blockchain and Data Security Hangzhou China & Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China The Hong Kong University of Science and Technology (Guangzhou) Guangzhou China The Hong Kong University of Science and Technology Hong Kong Hong Kong & HKUST Shenzhen-Hong Kong Collaborative Innovation Research Institute Shenzhen China
Performance predictability, ensuring low latency variability, is crucial for the reliability and efficiency of blockchain consensus. Byzantine Fault Tolerant Proof-of-Stake (BFT-PoS) consensus aims to achieve stable t... 详细信息
来源: 评论
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-specific and Domain-shared Knowledge
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Tian, Hui Qiu, Yiqin Li, Haizhou Zhang, Xinpeng Vasilakos, Athanasios V. National Huaqiao University College of Computer Science and Technology Xiamen361021 China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China School of Data Science Chinese University of Hong Kong Shenzhen518172 China National University of Singapore Department of Electrical and Computer Engineering 119077 Singapore Fudan University School of Computer Science Shanghai200433 China University of Agder Center for AI Research Grimstad4879 Norway
Universal low bit-rate speech steganalysis is a cutting-edge research task addressing real-world application needs and has garnered significant attention recently. However, the existing methods are still inadequate in... 详细信息
来源: 评论
When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?
收藏 引用
ACM Transactions on Software Engineering and Methodology 2025年 第4期34卷
作者: Chen, Chong Su, Jianzhong Chen, Jiachi Wang, Yanlin Bi, Tingting Yu, Jianxing Wang, Yanli Lin, Xingwei Chen, Ting Zheng, Zibin Sun Yat-sen University Guangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China University of Western Australia Perth Australia Zhejiang University Hangzhou China University of Electronic Science and Technology of China Chengdu China
With the development of blockchain technology, smart contracts have become an important component of blockchain applications. Despite their crucial role, the development of smart contracts may introduce vulnerabilitie... 详细信息
来源: 评论
Mamba Adapter: Efficient Multi-Modal Fusion for Vision-Language Tracking
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Shi, Liangtao Zhong, Bineng Liang, Qihua Hu, Xiantao Mo, Zhiyi Song, Shuxiang Ministry of Education Guangxi Normal University Key Laboratory of Education Blockchain and Intelligent Technology Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guilin541004 China Wuzhou University School of Data Science and Software Engineering Wuzhou543002 China
Utilizing the high-level semantic information of language to compensate for the limitations of vision information is a highly regarded approach in single-object tracking. However, most existing vision-language (VL) tr... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
TriniMark: A Robust Generative Speech Watermarking Method for Trinity-Level Attribution
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yue Liu, Weizhi Lin, Dongdong College of Computer Science and Technology National Huaqiao University Xiamen361021 China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China
The emergence of diffusion models has facilitated the generation of speech with reinforced fidelity and naturalness. While deepfake detection technologies have manifested the ability to identify AI-generated content, ... 详细信息
来源: 评论
SOLIDO: A Robust Watermarking Method for Speech Synthesis via Low-Rank Adaptation
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yue Liu, Weizhi Lin, Dongdong College of Computer Science and Technology National Huaqiao University Xiamen361021 China The Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China
The accelerated advancement of speech generative models has given rise to security issues, including model infringement and unauthorized abuse of content. Although existing generative watermarking techniques have prop... 详细信息
来源: 评论