咨询与建议

限定检索结果

文献类型

  • 627 篇 会议
  • 187 篇 期刊文献

馆藏范围

  • 814 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 428 篇 工学
    • 319 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 153 篇 电气工程
    • 100 篇 信息与通信工程
    • 76 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 37 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 21 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 158 篇 理学
    • 102 篇 数学
    • 40 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 30 篇 法学
    • 21 篇 社会学
    • 10 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 41 篇 federated learni...
  • 40 篇 data models
  • 40 篇 training
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 51 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 shandong fundame...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 772 篇 英文
  • 37 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
814 条 记 录,以下是211-220 订阅
排序:
Design of power Grid Cyber security Framework Based on Whole Life Cycle Management  2
Design of Power Grid Cyber Security Framework Based on Whole...
收藏 引用
2020 2nd International Conference on Computer Modeling, Simulation and Algorithm, CMSA 2020
作者: He, Jindong Wu, Dan Zhao, Zhichao Guo, Qian State Grid Fujian Electric Power Research Institute Fuzhou China Global Energy Interconnection Research Institute Co. Ltd State Grid Key Laboratory of Information and Network Security Nanjing China
The whole process security of power information system is the key to make power grid operation safe and stable. Firstly, the concept and characteristics of whole life cycle management (WLCM) are summarized by this pap... 详细信息
来源: 评论
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE  21
Trusted Auditing of Data Operation Behaviors in Cloud based ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud computing, 16th IEEE International Conference on Social computing and networking and 13th International Conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Xu, Shujiang Wang, Fansheng Wang, Lianhai Mihaljevic, Miodrag J. Zhang, Shuhui Shao, Wei Huang, Qihao Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Mathematical Institute The Serbian Academy of Sciences and Arts Belgrade Serbia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of the new generation of information technologies, including cloud computing, 5G, and the Internet of Things, data outsourcing storage in the cloud has brought great convenience to data stor... 详细信息
来源: 评论
A New Method to Enhance Container with vTPM  8
A New Method to Enhance Container with vTPM
收藏 引用
8th IEEE International Conference on Computer and Communications, ICCC 2022
作者: Jian, Zhang Xiao Peng, Zhou Qi, Wang Peng, Gao Liang, Wang Yi State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch Hangzhou China
This paper proposes a new container security enhancement system and method for containers running on 5G edge computing nodes. The system consists of vTPM module, physical TPM, container manager, vTPM manager, MEC cont... 详细信息
来源: 评论
Research on Automated Penetration Testing Framework for power Web System Integrating Property information and Expert Experience  9th
Research on Automated Penetration Testing Framework for Powe...
收藏 引用
9th International Conference on Computer Engineering and networks, CENet2019
作者: Xi, Zesheng Cui, Jie Zhang, Bo Institute of Information and Communication Global Energy Interconnection Research Institute NanjingJiangsu China State Grid Key Laboratory of Information & Network Security NanjingJiangsu China State Grid Tianjin Electric Power Research Institute Tianjin China
Faced with the heterogeneous, intelligent and interconnected massive power Web system environment, it is difficult to meet the needs of existing and incremental services in efficiency by mining and verifying vulnerabi... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Cao, Xiaoya Chen, Zhenya Liu, Weisheng Liu, Yuanlong Wang, Wenting Wang, Xin Yang, Ming Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti... 详细信息
来源: 评论
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
A Study on a Reduced Indicator System for the network security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Hongbin Bai, Yikang Zhao, Dongmei Liu, Bin Xu, Ying Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is... 详细信息
来源: 评论
Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong information
Wrong-of-Thought: An Integrated Reasoning Framework with Mul...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Yongheng Chen, Qiguang Zhou, Jingxuan Wang, Peng Si, Jiasheng Wang, Jin Lu, Wenpeng Qin, Libo School of Computer Science and Engineering Central South University China Research Center for SCIR Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China Yunnan University Kunming China
Chain-of-Thought (CoT) has become a vital technique for enhancing the performance of Large Language Models (LLMs), attracting increasing attention from researchers. One stream of approaches focuses on the iterative en...
来源: 评论
A Self-adaptive Single-Objective Multitasking Optimization Algorithm  1
收藏 引用
17th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2022
作者: Li, Xiaoyu Wang, Lei Jiang, Qiaoyong Li, Wei Wang, Bin The Key Laboratory of Network Computing and Security Technology of Shaanxi Province Xi’an University of Technology Xi’an710048 China The Key Laboratory of Industrial Automation of Shaanxi Province Shaanxi University of Technology Hanzhong723001 China School of Electronic and Information Engineering Ankang University Ankang725000 China
Evolutionary multitasking optimization algorithms have been presented for dealing with multiple tasks simultaneously. Many studies have proved that EMTOs often perform better than conventional single-task evolutionary... 详细信息
来源: 评论
Evaluation of network security State of Industrial Control System Based on BP Neural network  4
Evaluation of Network Security State of Industrial Control S...
收藏 引用
4th World Symposium on Artificial Intelligence, WSAI 2022
作者: Zhang, Daojuan Zhang, Peng Wang, Wenhui Jin, Minghui Xiao, Fei State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Ltd Beijing China State Grid Shanghai Municipal Electric Power Company Shanghai China
With the development of computer and network technology, industrial control systems are connecting with the Internet and other public networks in various ways, viruses, trojans and other threats are spreading to indus... 详细信息
来源: 评论