咨询与建议

限定检索结果

文献类型

  • 123 篇 期刊文献
  • 111 篇 会议

馆藏范围

  • 234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 149 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 42 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
    • 5 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 土木工程
  • 64 篇 理学
    • 37 篇 数学
    • 13 篇 生物学
    • 12 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 55 篇 管理学
    • 30 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 computational mo...
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 smart contract
  • 6 篇 robustness
  • 5 篇 codes
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 deep learning
  • 4 篇 recommender syst...
  • 4 篇 contrastive lear...
  • 4 篇 software design
  • 4 篇 cryptography
  • 4 篇 adaptation model...
  • 3 篇 software systems
  • 3 篇 motion estimatio...

机构

  • 63 篇 the state key la...
  • 39 篇 institute of blo...
  • 39 篇 state key labora...
  • 25 篇 college of compu...
  • 19 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 school of cyber ...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 8 篇 xiamen key labor...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...

作者

  • 19 篇 song mingli
  • 14 篇 ren kui
  • 12 篇 chen jiawei
  • 12 篇 chen yuling
  • 10 篇 liu zhenguang
  • 10 篇 chen ling
  • 9 篇 wang can
  • 9 篇 feng zunlei
  • 8 篇 zhou sheng
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 chen chun
  • 8 篇 jiao yingying
  • 8 篇 feng yan
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 hu binbin
  • 7 篇 zhang hong-bo
  • 6 篇 wan yuanyu

语言

  • 196 篇 英文
  • 36 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
234 条 记 录,以下是61-70 订阅
排序:
Detection of Network Time Covert Channels Based on Image Processing  23
Detection of Network Time Covert Channels Based on Image Pro...
收藏 引用
4th International Conference on Computing, Networks and Internet of Things, CNIOT 2023
作者: Huang, Xuwen Chen, Yonghong Li, Zhiqiang Zhan, Teng School of Computer Science and Technology Huaqiao University Xiamen Fujian China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen Fujian China
Network covert timing channels (NCTCs) utilize Inter-Packet Delay (IPD) encoding to hide data. It can be used for spreading malware and data leakage, posing severe threats to network security. With the increasing risk... 详细信息
来源: 评论
LAPAA: A Secure and Lightweight Authentication Protocol for Edge Computing Built on ASCON Algorithm  6
LAPAA: A Secure and Lightweight Authentication Protocol for ...
收藏 引用
6th International Conference on Next Generation data-Driven Networks, NGDN 2024
作者: Zhang, Linghui Zhou, Changli Wen, Jingliang HuaQiao University College of Computer Science and Technology Xiamen361021 China HuaQiao University Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen361021 China
Facing the challenges of next-generation network security, Mobile Edge Computing (MEC) serves as a decentralized model designed to meet the growing demands for data processing and reduce latency, making its security i... 详细信息
来源: 评论
ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network  23
ConTra: A Covert Timing Channel Detection Approach for Littl...
收藏 引用
4th International Conference on Computing, Networks and Internet of Things, CNIOT 2023
作者: Li, Zhiqiang Chen, Yonghong Teng, Zhan Huang, Xuwen School of Computer Science and Technology Huaqiao University Xiamen Fujian China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen Fujian China
A covert timing channel is a technical means that enables information hiding and covert communication. Due to the fact that covert timing channels can elude detection by security defence measures, they offer a substan... 详细信息
来源: 评论
Tile selection method based on error minimization for photomosaic image creation
收藏 引用
Frontiers of Computer Science 2021年 第3期15卷 165-172页
作者: Hongbo ZHANG Xin GAO Jixiang DU Qing LEI Lijie YANG Department of Computer Science and Technology Huaqiao UniversityXiamen 361021China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao UniversityXiamen 361021China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao UniversityXiamen 361021China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen 518055China
Photomosaic images are composite images composed of many small images called *** its overall visual effect,a photomosaic image is similar to the target image,and photomosaics are also called“montage art”.Noisy block... 详细信息
来源: 评论
Association Pattern-aware Fusion for Biological Entity Relationship Prediction  38
Association Pattern-aware Fusion for Biological Entity Relat...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jia, Lingxiang Ying, Yuchen Feng, Zunlei Zhong, Zipeng Yao, Shaolun Hu, Jiacong Duan, Mingjiang Wang, Xingen Song, Jie Song, Mingli State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Bangsheng Technology Co Ltd. China
Deep learning-based methods significantly advance the exploration of associations among triple-wise biological entities (e.g., drug-target protein-adverse reaction), thereby facilitating drug discovery and safeguardin...
来源: 评论
GROOT: Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis  24
GROOT: Generating Robust Watermark for Diffusion-Model-Based...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Weizhi Li, Yue Lin, Dongdong Tian, Hui Li, Haizhou Huaqiao University Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen China
Amid the burgeoning development of generative models like diffusion models, the task of differentiating synthesized audio from its natural counterpart grows more daunting. Deepfake detection offers a viable solution t... 详细信息
来源: 评论
A2PO: Towards Effective Offline Reinforcement Learning from an Advantage-aware Perspective  38
A2PO: Towards Effective Offline Reinforcement Learning from ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qing, Yunpeng Liu, Shunyu Cong, Jingyuan Chen, Kaixuan Zhou, Yihe Song, Mingli College of Computer Science and Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Offline reinforcement learning endeavors to leverage offline datasets to craft effective agent policy without online interaction, which imposes proper conservative constraints with the support of behavior policies to ...
来源: 评论
Design and Implementation of a Vision- and Grating-Sensor-Based Intelligent Unmanned Settlement System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 254-264页
作者: Zhang, Hong-Bo Zhou, Yi-Zhong Dong, Li-Jia Lei, Qing Du, Ji-Xiang Department of Computer Science and Technology Huaqiao University Xiamen361000 China Xiamen Key Laboratory of Computer Vision and Pattern Recognition The Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen361000 China
In this article, a new vision- and grating-sensor-based intelligent unmanned settlement (IUS) system is proposed for convenience stores to automatically recognize the shopping behavior of customers, record their ident... 详细信息
来源: 评论
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for Time Series Forecasting  38
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shang, Zongjiang Chen, Ling Wu, Binqing Cui, Dongliang State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Although transformer-based methods have achieved great success in multi-scale temporal pattern interaction modeling, two key challenges limit their further development: (1) Individual time points contain less semantic...
来源: 评论
Public auditing for real‑time medical sensor data in cloud‑assisted HealthIIoT system
收藏 引用
Frontiers of Optoelectronics 2022年 第3期15卷 1-14页
作者: Weiping Ye Jia Wang Hui Tian Hanyu Quan College of Computer Science and Technology Huaqiao UniversityXiamen 361021China Wuhan National Laboratory for Optoelectronics Wuhan 430074China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen 361021China Fujian Key Laboratory of Big Data Intelligence and Security Xiamen 361021China
With the advancement of industrial internet of things(IIoT),wireless medical sensor networks(WMSNs)have been widely introduced in modern healthcare systems to collect real-time medical data from patients,which is know... 详细信息
来源: 评论