咨询与建议

限定检索结果

文献类型

  • 132 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 244 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 157 篇 计算机科学与技术...
    • 122 篇 软件工程
    • 47 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 20 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 10 篇 安全科学与工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 交通运输工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 70 篇 理学
    • 40 篇 数学
    • 14 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 生物学
    • 8 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 41 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 17 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 11 篇 xiamen key labor...
  • 10 篇 fujian key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 hangzhou high-te...
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 201 篇 英文
  • 41 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
244 条 记 录,以下是51-60 订阅
排序:
Advanced Maximal Biclique Enumeration on GPUs Using Bitmaps
收藏 引用
IEEE Transactions on Computers 2025年
作者: Pan, Zhe He, Shuibing Li, Xu Zhang, Xuechen Wang, Rui Yin, Yanlong Chen, Gang Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China Hangzhou310051 China Washington State University Vancouver School of Engineering and Computer Science VancouverWA98686 United States
Maximal biclique enumeration (MBE) in bipartite graphs is an important problem in data mining with many real-world applications. Parallel MBE algorithms for GPUs are needed for MBE acceleration leveraging its many com... 详细信息
来源: 评论
Cross-Domain Animal Pose Estimation with Skeleton Anomaly-Aware Learning
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Han, Le Chen, Kaixuan Zhao, Lei Jiang, Yangbo Wang, Pengfei Zheng, Nenggan Zhejiang Hangzhou310007 China Zhejiang University College of Computer Science and Technology Zhejiang Hangzhou310007 China Zhejiang University State Key Laboratory of Blockchain and Data Security Zhejiang Hangzhou310007 China Institute of Blockchain and Data Security. China Zhejiang University School of Software Technology Ningbo China Zhejiang University State Key Lab of Brain-Machine Intelligence Hangzhou310007 China Zhejiang Provincial Government ZJU Collaborative Innovation Center for Artificial Intelligence by MOE Hangzhou310007 China Bengbu University School of Computer and Information Engineering Bengbu233030 China
Animal pose estimation is often constrained by the scarcity of annotations and the diversity of scenarios and species. The pseudo-label generation based unsupervised domain adaptation paradigm, which discriminates the... 详细信息
来源: 评论
On Optimizing Inter-and Intra-Chiplet Interconnection Topologies for Robust Multi-Chiplet Systems
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Xiaohang Xu, Miao Singh, Amit Kumar Jiang, Yingtao Yang, Mei Zhejiang University State Key Laboratory of Blockchain and Data Security China Hangzhou China South China University of Technology School of Software Engineering China University of Essex School of Computer Science and Electronic Engineering United Kingdom University of Nevada Department of Electrical and Computer Engineering Las Vegas United States
Inter-and intra-chiplet interconnection networks play a vital role in the operation of many core systems made of multiple chiplets. However, these networks are susceptible to faults caused by manufacturing defects and... 详细信息
来源: 评论
Target-Directed Progressive Gradient Adjusting for transfer learning
收藏 引用
Pattern Recognition 2025年 167卷
作者: Bei, Yijun Gao, Kewei Zhao, Zhuoyang Lin, Sen Liu, Erteng Feng, Zunlei School of Software Technology Zhejiang University No. 1689 Jiangnan Road Ningbo315048 China Eastern Institute of Technology No. 568 Tongxin Road Zhuangshi Street Zhenhai District Ningbo315201 China State Key Laboratory of Blockchain and Data Security Zhejiang University No. 38 Zheda Road Xihu District Hangzhou310027 China
Deep learning has revolutionized various tasks and achieved impressive performance, relying on abundant data. Transfer learning has emerged as a promising approach to address the challenges posed by limited data in ta... 详细信息
来源: 评论
Efficient Adaptive Label Refinement for label noise learning
收藏 引用
Neurocomputing 2025年 639卷
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China School of Computer Science and Technology Hainan University Hainan Haikou570228 China Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing complex manually designed strategies, aiming to achieve op... 详细信息
来源: 评论
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative database
收藏 引用
IEEE Transactions on Emerging Topics in Computing 2025年
作者: Zhao, Dongdong Liu, Zhihui Zhang, Fengji Liu, Lei Keung, Jacky Wai Yu, Xiao Wuhan University of Technology School of Computer Science and Artificial Intelligence Wuhan China Wuhan University of Technology Chongqing Research Institute Chongqing China City University of Hong Kong Department of Computer Science Hong Kong Xi'an Jiaotong University School of Electronic Science and Engineering Xi'an China Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou China
The emergence of Aging-Related Bugs (ARBs) poses a significant challenge to software systems, resulting in performance degradation and increased error rates in resourceintensive systems. Consequently, numerous ARB pre... 详细信息
来源: 评论
DHFM: Diversity-Enhanced Hypergraph Factorization Machines for Feature Interaction Modeling
收藏 引用
ACM Transactions on Knowledge Discovery from data 2025年 第4期19卷
作者: Shi, Hongyu Chen, Ling Tang, Xing Lyu, Dandan The State Key Laboratory of Blockchain and Data Security The College of Computer Science and Technology Zhejiang University Hangzhou China
Feature interaction modeling, which exploits interactive information between features, has been widely explored in various applications. Recently, many graph neural network (GNN)-based models are proposed to model fea... 详细信息
来源: 评论
Federated Graph Learning via Constructing and Sharing Feature Spaces for Cross-Domain IoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Chen, Jiale Zhuo, Shengda He, Jinchun Qiu, Wangjie Zhang, Qinnan Xiong, Zehui Zheng, Zhiming Tang, Yin Chen, Min Wang, Changdong Huang, Shuqiang Jinan University College of Cyber Security Guangzhou China Beihang University Institute of Artificial Intelligence Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing100191 China Zhongguancun Laboratory Beijing China Singapore University of Technology and Design Information Systems Technology and Design 487372 Singapore Jinan University School of Management Guangzhou China South China University of Technology School of Computer Science and Engineering Guangzhou China Sun Yat-sen University School of Computer Guangzhou China Jinan University College of Cyber Security of Jinan University China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou China
The Internet of Things (IoT) collects large volumes of diverse data, with graph data as a critical component, and extensively utilizes Federated Graph Learning (FGL) to process this data while preserving data security... 详细信息
来源: 评论
Efficient Adaptive Label Refinement for Label Noise Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China UniSA STEM University of South Australia AdelaideSA5095 Australia Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing manually defined criteria, aiming to achieve optimal parti... 详细信息
来源: 评论
DAAP: privacy-preserving model accuracy estimation on unlabeled datasets through distribution-aware adversarial perturbation  24
DAAP: privacy-preserving model accuracy estimation on unlabe...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Guodong Cao Zhibo Wang Yunhe Feng Xiaowei Dong School of Cyber Science and Engineering Wuhan University P. R. China The State Key Laboratory of Blockchain and Data Security Zhejiang University P. R. China and School of Cyber Science and Technology Zhejiang University P. R. China Department of Computer Science and Engineering University of North Texas
In the dynamic field of deep learning, accurately estimating model performance while ensuring data privacy against diverse and unlabeled test datasets presents a critical challenge. This is primarily due to the signif...
来源: 评论