咨询与建议

限定检索结果

文献类型

  • 623 篇 会议
  • 178 篇 期刊文献

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 412 篇 工学
    • 311 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 94 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 19 篇 交通运输工程
    • 15 篇 光学工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 9 篇 材料科学与工程(可...
  • 153 篇 理学
    • 99 篇 数学
    • 39 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 111 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 74 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 data models
  • 40 篇 training
  • 38 篇 federated learni...
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 219 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 27 篇 state grid key l...
  • 19 篇 key laboratory o...
  • 19 篇 global energy in...
  • 19 篇 shandong provinc...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 12 篇 faculty of data ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 wenpeng lu
  • 12 篇 peng lin
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 765 篇 英文
  • 31 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
801 条 记 录,以下是111-120 订阅
排序:
Knowledge Distillation Using Global Fusion and Feature Restoration for Industrial Defect Detectors
Knowledge Distillation Using Global Fusion and Feature Resto...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Feng, Zhengqian Yue, Xiyao Li, Wang Zhou, Mingle Han, Delong Li, Gang Shandong Scicom Information and Economy Research Institute CO.. Ltd China Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Deep learning technology has been widely applied in industrial quality inspection tasks to improve the accuracy of defect detection, object recognition, and classification. However, in the task of object detection, bo... 详细信息
来源: 评论
Advancing MobileNet security: Weighted Adversarial Learning in Convolutional Neural networks  11
Advancing MobileNet Security: Weighted Adversarial Learning ...
收藏 引用
11th International Conference on Machine Intelligence Theory and Applications, MiTA 2024
作者: Quadri, Hakeem Gu, Bruce Wang, Hua Islam, Sardar Victoria University Department of Information Technology Melbourne Australia Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Jinan China Victoria University Institute for sustainable Industries and Liveable Cities Melbourne Australia
Convolutional Neural networks (CNN), particularly low latency models such as MobileNets have excelled in many applications, including object detection in images, speech recognition and natural language processing, but... 详细信息
来源: 评论
A Deep Single Image Rectification Approach for Pan-Tilt-Zoom Cameras
arXiv
收藏 引用
arXiv 2025年
作者: Xiao, Teng Hu, Qi Yan, Qingsong Liu, Wei Ye, Zhiwei Deng, Fei School of Computer Science Hubei University of Technology Wuhan China Hubei Key Laboratory of Green Intelligent Computing Power Network Wuhan China School of Surveying and Mapping Wuhan University Wuhan China Wuhan Tianjihang Information Technology Co. Ltd. Wuhan China
Pan-Tilt-Zoom (PTZ) cameras with wide-angle lenses are widely used in surveillance but often require image rectification due to their inherent nonlinear distortions. Current deep learning approaches typically struggle... 详细信息
来源: 评论
Neural network-Based Safety Optimization Control for Constrained Discrete-Time Systems  49
Neural Network-Based Safety Optimization Control for Constra...
收藏 引用
49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023
作者: Wang, Xueli Zhao, Shangwei Yang, Ming Wu, Xiaoming Wang, Xin Xu, Shuo Hu, Xu Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Jinan China Shanghai Jiao Tong University Department of Automation Shanghai China Public Security Bureau of Jinan Jinan China
This paper proposes a constraint-aware safety control approach via adaptive dynamic programming (ADP) to address the control optimization issues for discrete-time systems subjected to state constraints. First, the con... 详细信息
来源: 评论
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Kai Zhao, Jing Ding, Lichao Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social networks  25th
BLAC: A Blockchain-Based Lightweight Access Control Scheme i...
收藏 引用
25th International Conference on information and Communications security, ICICS 2023
作者: Zuo, Yuting Xu, Li Zhang, Yuexin Kang, Zhaozhe Zhao, Chenbin Fujian Normal University Fuzhou China Fujian provincial Key Laboratory of Network Security and Cryptology Fuzhou China Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China
Vehicular Social networks (VSNs) rely on data shared by users to provide convenient services. Data is outsourced to the cloud server and the distributed roadside unit in VSNs. However, roadside unit has limited resour... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
Enhancing Stance Detection on Social Media via Core Views Discovery  27
Enhancing Stance Detection on Social Media via Core Views Di...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Yan, Yu Shen, Yinghan Liu, Teli Jiang, Xuhui Yin, Dechun School of Information and Network Security People Public Security University of China China Institute of Computing Technology Chinese Academy of Sciences China Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences China
Stance detection aims to identify the expressed attitude towards a target from the text, which is significant for learning public cognition from social media. The short and implicit nature of social media users' e... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis  9
An automated construction method for symmetric encryption ro...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Du, Gaolei Sun, Yunge Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论