咨询与建议

限定检索结果

文献类型

  • 627 篇 会议
  • 187 篇 期刊文献

馆藏范围

  • 814 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 428 篇 工学
    • 319 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 153 篇 电气工程
    • 100 篇 信息与通信工程
    • 76 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 37 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 21 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 158 篇 理学
    • 102 篇 数学
    • 40 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 30 篇 法学
    • 21 篇 社会学
    • 10 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 41 篇 federated learni...
  • 40 篇 data models
  • 40 篇 training
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 51 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 shandong fundame...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 772 篇 英文
  • 37 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
814 条 记 录,以下是191-200 订阅
排序:
Research on network Intrusion Detection Technology Based on DCGAN  5
Research on Network Intrusion Detection Technology Based on ...
收藏 引用
5th IEEE Advanced information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Chao, Wang Wenhui, Wang Jiahan, Dong Guangxin, Guo State Grid Beijing Electric Power Company Beijing China Global Energy Interconnection Research Institute Beijing China State Grid Key Laboratory of Information and Network Security Beijing China
Traditional network intrusion detection algorithms tend to lack learning in a small number of classes due to data imbalance. In reality, intrusion detection systems pay more attention to the detection accuracy of a sm... 详细信息
来源: 评论
Wishart Deeplab network for Polarimetric SAR Image Classification  3rd
Wishart Deeplab Network for Polarimetric SAR Image Classific...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Shi, Junfei He, Tiansheng Jin, Haiyan Wang, Hua Xu, Weinan State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an710048 China School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi’an710048 China
Polarimetric Synthetic Aperture Radar (PolSAR) images have attracted much attention with abundant polarimetric scattering information. In recent years, many deep learning models have been proposed and highly expanded ... 详细信息
来源: 评论
network Topology Overlapping Group Detection Based on h-Core Pruning  6
Network Topology Overlapping Group Detection Based on h-Core...
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Zhang, Qi Liu, Yan Cai, Yuheng Zhong Yuan Network Security Research Institute Zhengzhou University Zhengzhou China Pla Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The network group detection has a large number of application researches and has achieved certain results in network security, IP entity location and load balancing. However, due to the large scale of the network topo... 详细信息
来源: 评论
A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
A firmware upgrade solution based on hardware unique ID and ...
收藏 引用
2023 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Gao, Shaofeng Wang, Kun Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt... 详细信息
来源: 评论
Channel Drop Out: A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI  7th
Channel Drop Out: A Simple Way to Prevent CNN from Overfitti...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Luo, Jing Wang, Yaojie Xu, Rong Liu, Guangming Wang, Xiaofan Gong, Yijing Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design Xi’an China
With the development of deep learning, many motor imagery brain-computer interfaces based on convolutional neural networks (CNNs) show outstanding performances. However, the trial number of EEG in the training set is ... 详细信息
来源: 评论
information system security function validating using model checking
Information system security function validating using model ...
收藏 引用
2010 2nd International Conference on Computer Engineering and Technology, ICCET 2010
作者: Ma, Jianli Xu, Guoai Yang, Yixian Ji, Yong Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing China China Electronics System Engineering Computing station Beijing China
information systems will be encountered more and more security threats due to the development of computer attack method and technology. Generally, different security policies are used to protect the sensitive informat... 详细信息
来源: 评论
Research on Classification Method of Sensitive Structural Data of Electric power  12
Research on Classification Method of Sensitive Structural Da...
收藏 引用
12th IEEE International Conference on Electronics information and Emergency Communication, ICEIEC 2022
作者: Guan, Xiaojuan Zhou, Cheng Cao, Wantian Security State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Power Grid Digitizing Technology Department Jiangsu Province Nanjing China
This paper analyzes the necessity of classification of sensitive data from the importance of electric power structured data, and puts forward the classification identification method of structural sensitive data of el... 详细信息
来源: 评论
security risk analysis of on-site terminal of marketing specialty in power industry under the environment of internet of things  12
Security risk analysis of on-site terminal of marketing spec...
收藏 引用
12th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2020
作者: Yang, Ruxia Gao, Peng Gao, Xianzhou Fang, Zhou Global Energy Interconnection Research Institute State Grid Key Laboratory of Information and Network Security Nanjing China State Grid Zhejiang Electric Power Co. Ltd. Zhejiang China
Due to the weak protection of the field terminal equipment and the uncontrollable environment, once it is illegally used, it will directly affect the overall security protection system of the State Grid Corporation. T... 详细信息
来源: 评论
A Light-weight Kernel-level Mandatory Access Control Framework for Android
A Light-weight Kernel-level Mandatory Access Control Framewo...
收藏 引用
2019 IEEE International Conference on power, Intelligent computing and Systems, ICPICS 2019
作者: Wu, Fei Luo, Fucai Chen, Kuosong Lin, Wei Lu, Ziang State Grid Fujian Electric Power Company Fuzhou Fujian China Fujian Yirong Information Technology Co. Ltd Fuzhou Fujian China State Grid Key Laboratory of Information Network Security Nanjing Jiangsu China
With the rapid development of mobile communication technology and mobile Internet technology, mobile terminals are becoming more and more irreplaceable in people's life and work. In the present power industry, And... 详细信息
来源: 评论
A survey on cryptographic techniques for protecting big data security: present and forthcoming
收藏 引用
Science China(information Sciences) 2022年 第10期65卷 73-106页
作者: Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU School of Cyberspace Security Information Engineering University Henan Key Laboratory of Network Cryptography Technology Institute of Security Technology Shanghai Key Laboratory of Trustworthy Computing East China Normal University Cyberspace Security Research Center Peng Cheng Laboratory Shanghai Institute of Intelligent Science and Technology Tongji University
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfully impact... 详细信息
来源: 评论