咨询与建议

限定检索结果

文献类型

  • 1,250 篇 会议
  • 516 篇 期刊文献

馆藏范围

  • 1,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,071 篇 工学
    • 757 篇 计算机科学与技术...
    • 628 篇 软件工程
    • 253 篇 信息与通信工程
    • 230 篇 电气工程
    • 141 篇 控制科学与工程
    • 129 篇 电子科学与技术(可...
    • 112 篇 生物工程
    • 94 篇 机械工程
    • 58 篇 光学工程
    • 56 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 49 篇 生物医学工程(可授...
    • 43 篇 交通运输工程
    • 40 篇 网络空间安全
    • 39 篇 材料科学与工程(可...
    • 35 篇 仪器科学与技术
    • 27 篇 建筑学
  • 493 篇 理学
    • 296 篇 数学
    • 122 篇 物理学
    • 120 篇 统计学(可授理学、...
    • 119 篇 生物学
    • 50 篇 化学
    • 26 篇 系统科学
  • 281 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 132 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 63 篇 法学
    • 51 篇 社会学
  • 55 篇 医学
    • 47 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 18 篇 农学
  • 5 篇 教育学
  • 5 篇 军事学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 118 篇 feature extracti...
  • 85 篇 accuracy
  • 63 篇 semantics
  • 62 篇 training
  • 60 篇 computational mo...
  • 51 篇 data models
  • 50 篇 federated learni...
  • 44 篇 deep learning
  • 36 篇 neural networks
  • 30 篇 data mining
  • 29 篇 predictive model...
  • 29 篇 visualization
  • 27 篇 object detection
  • 26 篇 transformers
  • 26 篇 privacy
  • 26 篇 robustness
  • 25 篇 image segmentati...
  • 24 篇 security
  • 24 篇 network security
  • 24 篇 adaptation model...

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 193 篇 school of inform...
  • 125 篇 shandong provinc...
  • 82 篇 shandong provinc...
  • 58 篇 college of compu...
  • 50 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 40 篇 shandong provinc...
  • 38 篇 fujian provincia...
  • 38 篇 state grid key l...
  • 35 篇 fujian key labor...
  • 34 篇 shandong provinc...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 27 篇 state grid key l...
  • 26 篇 fujian key labor...
  • 24 篇 quan cheng labor...

作者

  • 34 篇 feng zhiquan
  • 25 篇 chen yuehui
  • 24 篇 zhiquan feng
  • 23 篇 guo wenzhong
  • 21 篇 yang bo
  • 20 篇 xiaoming wu
  • 20 篇 guo kun
  • 18 篇 yang yang
  • 18 篇 zhang bo
  • 18 篇 xi zesheng
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 15 篇 niu sijie
  • 15 篇 wang gang
  • 14 篇 chen zhenxiang
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 zhenxiang chen
  • 13 篇 zhang jing
  • 13 篇 yang xiaohui

语言

  • 1,670 篇 英文
  • 58 篇 其他
  • 47 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information"
1766 条 记 录,以下是81-90 订阅
排序:
Coverage-guided fuzz testing method based on reinforcement learning seed scheduling  4
Coverage-guided fuzz testing method based on reinforcement l...
收藏 引用
2024 4th International Conference on Artificial Intelligence and Industrial Technology Applications, AIITA 2024
作者: Tao, Jiaye Hong, Chao Fu, Yun Yang, Yiwei Wei, Lipeng Liang, Zhihong Liu, Junrong Information Centre of Guizhou Power Grid Co Guizhou China Electric Power Research Institute China Southern Power Grid Guangdong Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China
The existing fuzz testing methods for industrial control protocols suffer from insufficient coverage, false positives, and an inability to handle protocol semantics. This paper proposes a reinforcement learning-based ... 详细信息
来源: 评论
A Method of Computer Automatic Scoring for Subjective Questions  2
A Method of Computer Automatic Scoring for Subjective Questi...
收藏 引用
2nd International Conference on Artificial Intelligence, Human-Computer Interaction and Robotics, AIHCIR 2023
作者: Jiang, Yan Liu, Hua Li, Jinping Xia, Yingjie School of Information Science and Engineering China University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China
In response to the limitations of question types and difficulties of automatic scoring, a method of scoring subjective questions automatically in the computer exams is proposed, and then it is implemented. In general,... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression  9
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wen, Yuecheng Li, Xiaotong Lv, Haiqing Wang, Menglu Zuo, Wenbo Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论
A Patent Fast Recommendation Algorithm Based on User Requirements Combined with an Inverted Table
A Patent Fast Recommendation Algorithm Based on User Require...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zheng, Wan Ding, Qingyan Li, Na Pan, Yu Dong, Xuecheng Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Patent recommendation has always been an essential service for the innovation and development of all walks of life. The matching of demand and patent information can enable enterprises to quickly obtain the innovation... 详细信息
来源: 评论
A novel firmware secure transmission scheme based on SM2 threshold key agreement algorithm
A novel firmware secure transmission scheme based on SM2 thr...
收藏 引用
2023 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Wang, Kun Gao, Shaofeng Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
During the process of embedded firmware upgrade, to protect the security of the firmware during transmission, this paper proposes an improved firmware transmission scheme based on the combination of the SM2 threshold ... 详细信息
来源: 评论
Distributed acoustic sensing signal event recognition and localization based on improved YOLOv7
Distributed acoustic sensing signal event recognition and lo...
收藏 引用
2023 International Congress on Ultrasonics, ICU Beijing 2023
作者: Zhang, Hongyu Wang, Chang Zhang, Faxiang Jiang, Shaodong Sun, Zhihui Wang, Xiaodong Duan, Zhenhui Gao, Fengxia Liu, Zhaoying Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The distributed acoustic sensing (DAS) system based on phase-sensitive optical time domain reflection (Φ -OTDR) technology is widely used in pipeline safety monitoring, perimeter security, structure monitoring, etc. ... 详细信息
来源: 评论
Enhancing Stance Detection on Social Media via Core Views Discovery  27
Enhancing Stance Detection on Social Media via Core Views Di...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Yan, Yu Shen, Yinghan Liu, Teli Jiang, Xuhui Yin, Dechun School of Information and Network Security People Public Security University of China China Institute of Computing Technology Chinese Academy of Sciences China Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences China
Stance detection aims to identify the expressed attitude towards a target from the text, which is significant for learning public cognition from social media. The short and implicit nature of social media users' e... 详细信息
来源: 评论
Patent Recommendation Methods Based on Transformer Encoders and Regularization Strategies
Patent Recommendation Methods Based on Transformer Encoders ...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zheng, Wan Ding, Qingyan Li, Na Pan, Yu Dong, Xuecheng Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Patent recommendation service has become a major demand of all walks of life in the society. Patent data collection and analysis can not only help enterprises grasp the development status of the industry, but also pro... 详细信息
来源: 评论
An adaptive time-convolutional network online prediction method for ocean observation data  36
An adaptive time-convolutional network online prediction met...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Li, Enjing Li, Xiang Zhao, Zhigang Wu, Lu Wang, Yinglong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Deep learning is particularly important in the field of time series data analysis, and has been applied to tasks such as marine data prediction. However, there is a’concept drift’ problem in marine observation data,... 详细信息
来源: 评论