咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
802 条 记 录,以下是181-190 订阅
排序:
Self-Evaluation of Large Language Model based on Glass-box Features
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
Risk Assessment Method of power Monitoring System Vulnerability Based on Attack Graph  14th
Risk Assessment Method of Power Monitoring System Vulnerabil...
收藏 引用
14th International Conference on Genetic and Evolutionary computing, ICGEC 2021
作者: Ye, Hongbo Qian, Kexiang Jin, Minghui Han, Xiao Xiao, Fei State Grid Shanghai Municipal Electric Power Company Shanghai China State Grid Key Laboratory of Information and Network Security Institute of Information and Telecommunication Global Energy Interconnection Research Institute Beijing China
In recent years, incidents threatening the network security of the power system industry have become more frequent, hackers’ attack methods have become more and more complex, and the difficulty of power system networ... 详细信息
来源: 评论
Large-Scale network Adaptive Situation Awareness Method in Spatio-Temporal Dimension  1
收藏 引用
1st International Artificial Intelligence Conference, IAIC 2023
作者: Zhang, Hongbin Xu, Ying Liu, Bin Zhao, Dongmei Bai, Yikang School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang China
In large-scale networks, the state space is exploding and changing dynamically. This leads to difficulties in collecting and analyzing situational awareness data, so we construct an adaptive situational awareness mode... 详细信息
来源: 评论
A Lightweight Node Verification and Protection Strategy for Edge computing
A Lightweight Node Verification and Protection Strategy for ...
收藏 引用
Artificial Intelligence, networking and information Technology (AINIT), International Seminar on
作者: Jiayuan Du Guowei Zhang School of Cyber Science and Engineering Qufu Normal University Qufu China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China
To alleviate the burden on the core network, edge computing has rapidly advanced to support distributed computing. However, as sensitive information is delegated to the edge layer closer to endpoints, the privacy prot... 详细信息
来源: 评论
network security Situation Assessment Method Based on Absorbing Markov Chain
Network Security Situation Assessment Method Based on Absorb...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Gao, Hongbin Wang, Shangxing Zhang, Hongbin Liu, Bin Zhao, Dongmei Liu, Zhen Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China
This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It... 详细信息
来源: 评论
Cooperative structure of Li/Ni mixing and stacking faults for achieving high-capacity Co-free Li-rich oxides
收藏 引用
Journal of Energy Chemistry 2024年 第8期95卷 315-324,I0007页
作者: Zhen Wu Yu-Han Zhang Hao Wang Zewen Liu Xudong Zhang Xin Dai Kunyang Zou Xiaoming Lou Xuechen Hu Lijing Ma Yan Liu Yongning Liu State Key Laboratory for Mechanical Behavior of Materials Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina Qingdao Industrial Energy Storage Research Institute Qingdao Institute of Bioenergy and Bioprocess TechnologyChinese Academy of SciencesQingdao 266101ShandongChina Hefei Advanced Computing Center Operation Management Corp Ltd Hefei 230088AnhuiChina Center for High Performance Computing Network Information CenterXi’an Jiaotong UniversityXi’an 710049ShaanxiChina Wuhan Dongfeng Motor Corporation Ltd Wuhan 430056HubeiChina School of Materials Science and Intelligent Engineering Nanjing UniversitySuzhou 215163JiangsuChina Key Laboratory of MEMS of the Ministry of Education Southeast UniversityNanjing 210096JiangsuChina International Research Center for Renewable Energy State Key Laboratory of Multiphase Flow in Power Engineering Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina
Co-free Li-rich layered oxides(LLOs)are emerging as promising cathode materials for Li-ion batteries due to their low cost and high ***,they commonly face severe structural instability and poor electrochemical activit... 详细信息
来源: 评论
Research on Cross-site Scripting Vulnerability of XSS Based on International Student Website  5
Research on Cross-site Scripting Vulnerability of XSS Based ...
收藏 引用
5th International Conference on Computer network, Electronic and Automation, ICCNEA 2022
作者: Wang, Tianma Zhao, Dongmei Qi, Jianjun International Education Institute North China Electric Power University Beijing China Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
The international student website is the window of the school's external publicity. Through the website, international students can understand the school in a wider range and in all aspects. The website is often a... 详细信息
来源: 评论
Towards an Ontology of Traceable Impact Management in the Food Supply Chain
arXiv
收藏 引用
arXiv 2025年
作者: Gajderowicz, Bart Fox, Mark S. Gao, Yongchao Urban Data Centre School of Cities University of Toronto Toronto Canada Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China
The pursuit of quality improvements and accountability in the food supply chains, especially how they relate to food-related outcomes, such as hunger, has become increasingly vital, necessitating a comprehensive appro...
来源: 评论
Long and Recent Preference Learning with Recent-k Items Distribution for Recommender System
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Gao, Yongbiao Niu, Sijie Lv, Guohua Ling, Miaogen Geng, Xin Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China Southeast University Ministry of Education Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing School of Information Science and Engineering China Nanjing University of Information Science and Technology School of Computer Science China Southeast University School of Computer Science and Engineering China
Reinforcement learning (RL) aims to formulate the recommendation task as a Markov decision process (MDP) and trains an agent to automatically learn the optimal recommendation policy from interaction trajectories throu... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for power Micro-Application Server  2
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
2nd International Conference on Advanced Electronics, Electrical and Green Energy, AEEGE 2023
作者: Nige, Li Lu, Chen Lei, Zhao Zhenning, Teng Zhiqiang, Wang Yiyang, Shao Xiaolin, Gui State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd. Nanjing China Xi'an Jiaotong University Faculty of Electronic and Information Engineering Shaanxi Province Key Laboratory of Computer Network Xi'an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e... 详细信息
来源: 评论