咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 172 篇 期刊文献

馆藏范围

  • 798 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 413 篇 工学
    • 311 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 39 篇 data models
  • 39 篇 training
  • 38 篇 federated learni...
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 16 篇 anomaly detectio...

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 20 篇 key laboratory o...
  • 20 篇 shandong provinc...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 wenpeng lu
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xiaohui han
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 759 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
798 条 记 录,以下是201-210 订阅
排序:
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
Efficient Sensitive Data Identification Using Multi-Protocol Automatic Parsing and Vector Classification Based on Feature Fusion
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第22期48卷 55-62页
作者: Hu, Jian Zhang, Lina Lu, Guangqian Xu, Wenqian Jiang, Yixin Yunnan Power Grid Information Center China Southern Power Grid Kunming650217 China Electric Power Research Institute China Southern Power Grid Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
At this stage, data has become essential and important information in people's daily life, and how to automate the identification and classification of sensitive attributes of structured datasets in the production... 详细信息
来源: 评论
TSF-Net:Abnormal Video Behavior Detection Framework Based on Two-Stream Appearance Motion Semantic Fusion  23
TSF-Net:Abnormal Video Behavior Detection Framework Based on...
收藏 引用
Proceedings of the 2023 International Conference on information Education and Artificial Intelligence
作者: Bonan Li Rui Cao Xingang Wang Hong Zhang Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China
Video anomalous behavior detection aims to detect rare and random anomalous events, which usually deviate from expectations. Existing detection methods do not consider the appearance semantics and motion semantics of ...
来源: 评论
Lightweight fuzzy testing method based on stake points of power control system
Lightweight fuzzy testing method based on stake points of po...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yiwei Yang Binyuan Yan Chao Hong Lipeng Wei Zhihong Liang Yun Fu Lin Chen Jiaye Tao China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute Guangzhou China Information Centre of Guizhou Power Grid Co. Guiyang China
Cyber threats are extremely frequent, and fuzz testing is an effective method to discover vulnerabilities. Regarding the optimization of fuzz testing cost, firstly, the cost distribution of each module during the fuzz... 详细信息
来源: 评论
Switched Event-Triggering Secondary Frequency Control of power Systems Considering Wind and Solar Stochastics Under Denial of Service Attack
Switched Event-Triggering Secondary Frequency Control of Pow...
收藏 引用
IEEE PES Asia-Pacific power and Energy Engineering Conference (APPEEC)
作者: Chao Hong Yun Fu Lin Chen Jiaye Tao Zhihong Liang Lipeng Wei Yiwei Yang Qiucheng Ban Shutan Wu China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute Guangdong China Information Centre of Guizhou Power Grid Co. Guizhou China
This paper addresses the stochastic nature of wind and photovoltaic power generation, along with the increasing threat of denial of service (DoS) attacks on power systems. To counteract the growing incidence of DoS at... 详细信息
来源: 评论
Enhancing power System Stability Against DoS Attacks Through Hardware-in-the-Loop Simulation
Enhancing Power System Stability Against DoS Attacks Through...
收藏 引用
IEEE PES Asia-Pacific power and Energy Engineering Conference (APPEEC)
作者: Jiaye Tao Zhihong Liang Lipeng Wei Chao Hong Yun Fu Yiwei Yang Zeyuan Zhou Lin Chen Information Centre of Guizhou Power Grid Co. Guizhou China Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute China Southern Power Grid Guangzhou China
This study explores the stability and security of power systems in the face of Denial of Service (DoS) attacks through Hardware-in-the-Loop (HiL) simulation technology. As the application of Distributed Energy Resourc... 详细信息
来源: 评论
Comprehensive Feature Processing Based on Attention Mechanism for Co-Salient Object Detection
Comprehensive Feature Processing Based on Attention Mechanis...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Mao Yuan Zengbin Zhang Zhengyang Zhang Zhenhui Ding Guangxiao Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Co-salient object detection (CoSOD) aims to detect common salient objects across multiple related images. However, existing methods often struggle with limited attention coverage, missing some co-salient objects. To a... 详细信息
来源: 评论
Research on Classification Method of Sensitive Structural Data of Electric power  12
Research on Classification Method of Sensitive Structural Da...
收藏 引用
12th IEEE International Conference on Electronics information and Emergency Communication, ICEIEC 2022
作者: Guan, Xiaojuan Zhou, Cheng Cao, Wantian Security State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Power Grid Digitizing Technology Department Jiangsu Province Nanjing China
This paper analyzes the necessity of classification of sensitive data from the importance of electric power structured data, and puts forward the classification identification method of structural sensitive data of el... 详细信息
来源: 评论
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Haiqing Lv Xiaohui Han Peipei Wang Wenbo Zuo Jing Guo Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision network for Image Recognition Tasks in Resource-Constrained Environments  29
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Yuchen Liang, Hu Qiu, Ran Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works... 详细信息
来源: 评论