咨询与建议

限定检索结果

文献类型

  • 128 篇 期刊文献
  • 112 篇 会议

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 180 篇 工学
    • 154 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 45 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 20 篇 网络空间安全
    • 17 篇 电气工程
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 6 篇 轻工技术与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
  • 67 篇 理学
    • 38 篇 数学
    • 13 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 8 篇 化学
    • 5 篇 系统科学
  • 56 篇 管理学
    • 31 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 18 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 医学

主题

  • 14 篇 semantics
  • 9 篇 federated learni...
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 feature extracti...
  • 7 篇 blockchain
  • 6 篇 computational mo...
  • 6 篇 smart contract
  • 6 篇 codes
  • 6 篇 robustness
  • 5 篇 accuracy
  • 4 篇 deep learning
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 software enginee...
  • 4 篇 software design
  • 4 篇 open source soft...
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 software systems

机构

  • 66 篇 the state key la...
  • 41 篇 institute of blo...
  • 40 篇 state key labora...
  • 27 篇 college of compu...
  • 21 篇 zhejiang univers...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang univers...
  • 11 篇 state key labora...
  • 10 篇 fujian key labor...
  • 10 篇 xiamen key labor...
  • 10 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 ant group
  • 8 篇 software enginee...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 xiamen key labor...
  • 7 篇 hangzhou high-te...
  • 7 篇 xiamen key labor...
  • 7 篇 state key labora...

作者

  • 19 篇 song mingli
  • 15 篇 chen jiawei
  • 14 篇 ren kui
  • 12 篇 chen yuling
  • 12 篇 wang can
  • 11 篇 chen ling
  • 11 篇 chen chun
  • 11 篇 feng yan
  • 10 篇 liu zhenguang
  • 10 篇 zhou sheng
  • 9 篇 feng zunlei
  • 8 篇 xia xin
  • 8 篇 qin zhan
  • 8 篇 hu binbin
  • 8 篇 jiao yingying
  • 8 篇 hu xing
  • 7 篇 wang zhibo
  • 7 篇 wu sifan
  • 7 篇 zhang hong-bo
  • 6 篇 tian hui

语言

  • 199 篇 英文
  • 39 篇 其他
  • 2 篇 中文
检索条件"机构=Xiamen Key Laboratory of Data Security and Blockchain Technology"
240 条 记 录,以下是71-80 订阅
排序:
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for Time Series Forecasting  38
Ada-MSHyper: Adaptive Multi-Scale Hypergraph Transformer for...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shang, Zongjiang Chen, Ling Wu, Binqing Cui, Dongliang State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Although transformer-based methods have achieved great success in multi-scale temporal pattern interaction modeling, two key challenges limit their further development: (1) Individual time points contain less semantic...
来源: 评论
Public auditing for real‑time medical sensor data in cloud‑assisted HealthIIoT system
收藏 引用
Frontiers of Optoelectronics 2022年 第3期15卷 1-14页
作者: Weiping Ye Jia Wang Hui Tian Hanyu Quan College of Computer Science and Technology Huaqiao UniversityXiamen 361021China Wuhan National Laboratory for Optoelectronics Wuhan 430074China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen 361021China Fujian Key Laboratory of Big Data Intelligence and Security Xiamen 361021China
With the advancement of industrial internet of things(IIoT),wireless medical sensor networks(WMSNs)have been widely introduced in modern healthcare systems to collect real-time medical data from patients,which is know... 详细信息
来源: 评论
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowledge Graph Representation Learning Approach  38
DECRL: A Deep Evolutionary Clustering Jointed Temporal Knowl...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Qian Chen, Ling State Key Laboratory of Blockchain and Data Security College of Computer Science and Technology Zhejiang University China
Temporal Knowledge Graph (TKG) representation learning aims to map temporal evolving entities and relations to embedded representations in a continuous low-dimensional vector space. However, existing approaches cannot...
来源: 评论
Vision Mamba Mender  38
Vision Mamba Mender
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Jiacong Cao, Anda Feng, Zunlei Zhang, Shengxuming Wang, Yi Jia, Lingxiang Song, Mingli College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Mamba, a state-space model with selective mechanisms and hardware-aware architecture, has demonstrated outstanding performance in long sequence modeling tasks, particularly garnering widespread exploration and applica...
来源: 评论
Non-stationary Online Convex Optimization with Arbitrary Delays  41
Non-stationary Online Convex Optimization with Arbitrary Del...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wan, Yuanyu Yao, Chang Song, Mingli Zhang, Lijun The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Software Technology Zhejiang University Ningbo China Institute of Blockchain and Data Security Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Online convex optimization (OCO) with arbitrary delays, in which gradients or other information of functions could be arbitrarily delayed, has received increasing attention recently. Different from previous studies th...
来源: 评论
Vertical Federated Learning Based on Consortium blockchain for data Sharing in Mobile Edge Computing
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 345-361页
作者: Yonghao Zhang Yongtang Wu Tao Li Hui Zhou Yuling Chen State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang262700China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China
The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the ***,certain data is quite sensitive,and sharing it directly may violate *** Federated Learning(V... 详细信息
来源: 评论
Dual-Perspective Activation: Efficient Channel Denoising via Joint Forward-Backward Criterion for Artificial Neural Networks  38
Dual-Perspective Activation: Efficient Channel Denoising via...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qiu, Tian Gao, Chenchao Feng, Zunlei Lei, Jie Hu, Bingde Wang, Xingen Gao, Yi Song, Mingli State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Dalian University of Technology China Zhejiang University of Technology China Bangsheng Technology Co. Ltd. China
The design of Artificial Neural Network (ANN) is inspired by the working patterns of the human brain. Connections in biological neural networks are sparse, as they only exist between few neurons. Meanwhile, the sparse...
来源: 评论
Improved Regret for Bandit Convex Optimization with Delayed Feedback  38
Improved Regret for Bandit Convex Optimization with Delayed ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wan, Yuanyu Yao, Chang Song, Mingli Zhang, Lijun School of Software Technology Zhejiang University Ningbo China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
We investigate bandit convex optimization (BCO) with delayed feedback, where only the loss value of the action is revealed under an arbitrary delay. Let n, T, d¯ denote the dimensionality, time horizon, and avera...
来源: 评论
International Standardization of blockchain and Distributed Ledger technology:Overlaps,Gaps and Challenges
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第11期137卷 1491-1523页
作者: Xiangjuan Jia Jing Xu Mengwei Han Qing Zhang Lu Zhang Xiaofeng Chen Department of Standardization and Research Project Management Hangzhou Qulian Technology Co.Ltd.Hangzhou310000China State Key Laboratory of Blockchain and Data Security Zhejiang UniversityHangzhou310000China
As one of the most concerned digital technologies in recent years,blockchain and distributed ledger technology are an important driving force for a new round of technological *** is currently in the process of acceler... 详细信息
来源: 评论
When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?
收藏 引用
ACM Transactions on Software Engineering and Methodology 2025年 第4期34卷
作者: Chen, Chong Su, Jianzhong Chen, Jiachi Wang, Yanlin Bi, Tingting Yu, Jianxing Wang, Yanli Lin, Xingwei Chen, Ting Zheng, Zibin Sun Yat-sen University Guangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China University of Western Australia Perth Australia Zhejiang University Hangzhou China University of Electronic Science and Technology of China Chengdu China
With the development of blockchain technology, smart contracts have become an important component of blockchain applications. Despite their crucial role, the development of smart contracts may introduce vulnerabilitie... 详细信息
来源: 评论