咨询与建议

限定检索结果

文献类型

  • 628 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 420 篇 工学
    • 316 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 144 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 建筑学
  • 157 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 40 篇 training
  • 39 篇 data models
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 visualization
  • 21 篇 adaptation model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 224 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 771 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
810 条 记 录,以下是201-210 订阅
排序:
Risk Modeling and Traceability of Boundary Attacks on Internet of power Systems Based on Complex networks  9
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Xin Qu, Zhaoyang Yu, Tong Xie, Ming Yu, Fu Ding, Wei Northeast Electric Power University School of Electrical Engineering Jilin132012 China People's Bank of China Qinghai Provincial Branch Xining810000 China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning530023 China China Guizhou Power Grid Co. Ltd. Bijie Power Supply Bureau Bijie551700 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
Efficient Sensitive Data Identification Using Multi-Protocol Automatic Parsing and Vector Classification Based on Feature Fusion
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第22期48卷 55-62页
作者: Hu, Jian Zhang, Lina Lu, Guangqian Xu, Wenqian Jiang, Yixin Yunnan Power Grid Information Center China Southern Power Grid Kunming650217 China Electric Power Research Institute China Southern Power Grid Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
At this stage, data has become essential and important information in people's daily life, and how to automate the identification and classification of sensitive attributes of structured datasets in the production... 详细信息
来源: 评论
TSF-Net:Abnormal Video Behavior Detection Framework Based on Two-Stream Appearance Motion Semantic Fusion  23
TSF-Net:Abnormal Video Behavior Detection Framework Based on...
收藏 引用
Proceedings of the 2023 International Conference on information Education and Artificial Intelligence
作者: Bonan Li Rui Cao Xingang Wang Hong Zhang Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China
Video anomalous behavior detection aims to detect rare and random anomalous events, which usually deviate from expectations. Existing detection methods do not consider the appearance semantics and motion semantics of ...
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-indistinguishable Approach
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Anhui University of Science and Technology State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining the School of Computer Science and Engineering Anhui University of Science and Technology Huainan232001 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan 650221 China Key Laboratory of Equipment Data Security and Guarantee Technology Ministry of Education Key Laboratory of Computing Power Network and Information Security Ministry of Education China Beijing University of Posts and Telecommunications China Zhejiang University China Nanjing University of Aeronautics and Astronautics China University of Southern Queensland China
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Lightweight fuzzy testing method based on stake points of power control system
Lightweight fuzzy testing method based on stake points of po...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yiwei Yang Binyuan Yan Chao Hong Lipeng Wei Zhihong Liang Yun Fu Lin Chen Jiaye Tao China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute Guangzhou China Information Centre of Guizhou Power Grid Co. Guiyang China
Cyber threats are extremely frequent, and fuzz testing is an effective method to discover vulnerabilities. Regarding the optimization of fuzz testing cost, firstly, the cost distribution of each module during the fuzz... 详细信息
来源: 评论
Switched Event-Triggering Secondary Frequency Control of power Systems Considering Wind and Solar Stochastics Under Denial of Service Attack
Switched Event-Triggering Secondary Frequency Control of Pow...
收藏 引用
IEEE PES Asia-Pacific power and Energy Engineering Conference (APPEEC)
作者: Chao Hong Yun Fu Lin Chen Jiaye Tao Zhihong Liang Lipeng Wei Yiwei Yang Qiucheng Ban Shutan Wu China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute Guangdong China Information Centre of Guizhou Power Grid Co. Guizhou China
This paper addresses the stochastic nature of wind and photovoltaic power generation, along with the increasing threat of denial of service (DoS) attacks on power systems. To counteract the growing incidence of DoS at... 详细信息
来源: 评论
Enhancing power System Stability Against DoS Attacks Through Hardware-in-the-Loop Simulation
Enhancing Power System Stability Against DoS Attacks Through...
收藏 引用
IEEE PES Asia-Pacific power and Energy Engineering Conference (APPEEC)
作者: Jiaye Tao Zhihong Liang Lipeng Wei Chao Hong Yun Fu Yiwei Yang Zeyuan Zhou Lin Chen Information Centre of Guizhou Power Grid Co. Guizhou China Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute China Southern Power Grid Guangzhou China
This study explores the stability and security of power systems in the face of Denial of Service (DoS) attacks through Hardware-in-the-Loop (HiL) simulation technology. As the application of Distributed Energy Resourc... 详细信息
来源: 评论
Comprehensive Feature Processing Based on Attention Mechanism for Co-Salient Object Detection
Comprehensive Feature Processing Based on Attention Mechanis...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Mao Yuan Zengbin Zhang Zhengyang Zhang Zhenhui Ding Guangxiao Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Co-salient object detection (CoSOD) aims to detect common salient objects across multiple related images. However, existing methods often struggle with limited attention coverage, missing some co-salient objects. To a... 详细信息
来源: 评论
Research on Classification Method of Sensitive Structural Data of Electric power  12
Research on Classification Method of Sensitive Structural Da...
收藏 引用
12th IEEE International Conference on Electronics information and Emergency Communication, ICEIEC 2022
作者: Guan, Xiaojuan Zhou, Cheng Cao, Wantian Security State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Power Grid Digitizing Technology Department Jiangsu Province Nanjing China
This paper analyzes the necessity of classification of sensitive data from the importance of electric power structured data, and puts forward the classification identification method of structural sensitive data of el... 详细信息
来源: 评论