咨询与建议

限定检索结果

文献类型

  • 623 篇 会议
  • 178 篇 期刊文献

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 411 篇 工学
    • 306 篇 计算机科学与技术...
    • 254 篇 软件工程
    • 140 篇 电气工程
    • 90 篇 信息与通信工程
    • 67 篇 控制科学与工程
    • 34 篇 安全科学与工程
    • 32 篇 电子科学与技术(可...
    • 29 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 20 篇 交通运输工程
    • 16 篇 光学工程
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
    • 10 篇 土木工程
  • 154 篇 理学
    • 99 篇 数学
    • 39 篇 统计学(可授理学、...
    • 30 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 74 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 data models
  • 40 篇 training
  • 38 篇 federated learni...
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 27 篇 state grid key l...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 19 篇 shandong provinc...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 shandong fundame...
  • 12 篇 faculty of data ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 762 篇 英文
  • 33 篇 其他
  • 7 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
801 条 记 录,以下是91-100 订阅
排序:
Remote Attestation for Intelligent Electronic Devices in Smart Grid Based on Trusted Level Measurement
收藏 引用
Chinese Journal of Electronics 2020年 第3期29卷 437-446页
作者: WANG Yong LI Jun'e CHEN Xiong LIN Hai YU Fajiang LUO Jianbo Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and Engineering Wuhan University NARI Group Corporation State Grid Electric Power Research Institute NARI Technology Co.Ltd. State Key Laboratory of Smart Grid Protection and Control
To reduce the implementation complexity and excessive overhead caused by remote attestation,we propose a new remote attestation scheme based on trusted level measurement considering the limited system resources of the... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
Some classes of complete permutation polynomials over Fq
收藏 引用
Science China Mathematics 2015年 第10期58卷 2081-2094页
作者: WU GaoFei LI Nian HELLESETH Tor ZHANG YuQing State Key Laboratory of Integrated Service Networks Xidian University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Department of Informatics University of Bergen National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Ni... 详细信息
来源: 评论
Anomaly detection of user behavior based on DTMC with states of variable-length sequences
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第6期18卷 106-115页
作者: XIAO Xi XIA Shu-tao TIAN Xin-guang ZHAI Qi-bin Graduate School at Shenzhen Tsinghua University Shenzhen 518055 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
In anomaly detection, a challenge is how to model a user's dynamic behavior. Many previous works represent the user behavior based on fixed-length models. To overcome their shortcoming, we propose a novel method base... 详细信息
来源: 评论
SSEM: Secure, Scalable and Efficient Multi-Owner Data Sharing in Clouds
收藏 引用
China Communications 2016年 第8期13卷 231-243页
作者: Shungan Zhou Ruiying Du Jing Chen Hua Deng Jian Shen Huanguo Zhang The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School of Wuhan University Wuhan 430072 Hubei Province China State Grid Information and Communication Company of Hunan Electric Power Corp Changsha 410000 Hunan Province China
Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication Software and networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论