咨询与建议

限定检索结果

文献类型

  • 1,259 篇 会议
  • 539 篇 期刊文献

馆藏范围

  • 1,798 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,098 篇 工学
    • 781 篇 计算机科学与技术...
    • 642 篇 软件工程
    • 260 篇 信息与通信工程
    • 236 篇 电气工程
    • 148 篇 控制科学与工程
    • 132 篇 电子科学与技术(可...
    • 113 篇 生物工程
    • 95 篇 机械工程
    • 60 篇 光学工程
    • 57 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 50 篇 安全科学与工程
    • 43 篇 交通运输工程
    • 41 篇 网络空间安全
    • 40 篇 材料科学与工程(可...
    • 35 篇 仪器科学与技术
    • 28 篇 建筑学
  • 502 篇 理学
    • 301 篇 数学
    • 124 篇 物理学
    • 120 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 51 篇 化学
    • 27 篇 系统科学
  • 287 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 63 篇 法学
    • 51 篇 社会学
  • 56 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 18 篇 农学
  • 6 篇 教育学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 3 篇 文学

主题

  • 118 篇 feature extracti...
  • 86 篇 accuracy
  • 63 篇 semantics
  • 62 篇 training
  • 60 篇 computational mo...
  • 51 篇 federated learni...
  • 51 篇 data models
  • 44 篇 deep learning
  • 36 篇 neural networks
  • 30 篇 data mining
  • 29 篇 predictive model...
  • 29 篇 visualization
  • 27 篇 object detection
  • 27 篇 privacy
  • 26 篇 transformers
  • 26 篇 robustness
  • 25 篇 image segmentati...
  • 25 篇 security
  • 24 篇 network security
  • 24 篇 adaptation model...

机构

  • 230 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 194 篇 school of inform...
  • 125 篇 shandong provinc...
  • 82 篇 shandong provinc...
  • 61 篇 college of compu...
  • 52 篇 shandong fundame...
  • 50 篇 college of mathe...
  • 46 篇 shandong enginee...
  • 40 篇 shandong provinc...
  • 39 篇 fujian provincia...
  • 38 篇 state grid key l...
  • 35 篇 fujian key labor...
  • 34 篇 shandong provinc...
  • 32 篇 shandong provinc...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 27 篇 fujian key labor...
  • 24 篇 quan cheng labor...

作者

  • 34 篇 feng zhiquan
  • 25 篇 chen yuehui
  • 24 篇 zhiquan feng
  • 24 篇 guo wenzhong
  • 21 篇 yang bo
  • 20 篇 xiaoming wu
  • 20 篇 guo kun
  • 18 篇 yang yang
  • 18 篇 zhang bo
  • 18 篇 xi zesheng
  • 15 篇 lu wenpeng
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 15 篇 niu sijie
  • 15 篇 wang gang
  • 14 篇 chen zhenxiang
  • 13 篇 wang shiping
  • 13 篇 guohua lv
  • 13 篇 zhenxiang chen
  • 13 篇 zhang jing

语言

  • 1,655 篇 英文
  • 105 篇 其他
  • 48 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information"
1798 条 记 录,以下是291-300 订阅
排序:
A Grouping Strategy-Based Progressive Fusion network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论
A Blockchain-Based Hierarchical Dynamic Collaborative Storage Model
A Blockchain-Based Hierarchical Dynamic Collaborative Storag...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qile Yuan Xiangzhi Liu Yu Wang Yunfeng Dong Haoyu Jia Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The pervasive application of blockchain technology has led to a significant increase in data volume, presenting significant challenges to existing storage architectures in environments characterized by large volumes o... 详细信息
来源: 评论
ID-YOLOv7: A Method for Steel Surface Defect Detection Combining Residual Attention and Dynamic Upsampling
ID-YOLOv7: A Method for Steel Surface Defect Detection Combi...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Industrial defect detection is a crucial challenge in computer vision. The accuracy of detecting defects on steel surfaces is hindered by spatially varying noise. To address this challenge, we propose an efficient met... 详细信息
来源: 评论
Research and Application of Speech Transmission Index in Acoustic Leakage Detection
Research and Application of Speech Transmission Index in Aco...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qiuyun Hao FuQiang Wang Peng Zhang XiaoFeng Ma Jianqiang Zhang Wei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Lianhai Wang Tianrui Liu Yingxiaochun Wang Xinlei Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
SGNet: A Multi-Scale Method for Steel Surface Defect Detection
SGNet: A Multi-Scale Method for Steel Surface Defect Detecti...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The large variation in target scales within steel surface defect images often results in low detection accuracy. To address this issue, we have developed a multi-scale defect detection method named SGNet. Initially, w... 详细信息
来源: 评论
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction
Infringement Detection and Traceability Scheme Based on Ciph...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Lianhai Wang Xinlei Wang Tianrui Liu Yingxiaochun Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl... 详细信息
来源: 评论
Workflow Scheduling Method in Multi-Cluster Environments Using Tasks' Spatiotemporal Attributes
Workflow Scheduling Method in Multi-Cluster Environments Usi...
收藏 引用
Electronic information Engineering and Computer Communication (EIECC), International Conference on
作者: Yudong Geng Jing Chen Honghua Yan Qingshui Hao Aimin Zhang Tianxiang Zhang Mingchao Ji Tonglin Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Greenthink Electric Power Technology Co. Ltd Jinan China
Nowadays, computing resources are widely distributed and diverse, and the demand for efficient execution of various workflow tasks on wide-area resources has been raised. multi-objection scheduling method based on spa... 详细信息
来源: 评论
Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing  9
Continuous Verification of Catastrophic Recalling in Machine...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Y. Neil Ji, Zonghao Cui, Lei Zhang, Chong Liu, Lei Tian, Zhiyi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250031 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250031 China Deakin University School of IT VIC3125 Australia Xidian University Guangzhou Institute of Technology Guangzhou510555 China University of Technology School of Computer Science SydneyNSW2007 Australia
Throughout the process of machine unlearning, in order to fulfill the requirements of machine unlearning and to comply with the rules of the right to be forgotten, it is natural to verify whether the unlearning model ... 详细信息
来源: 评论