咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
802 条 记 录,以下是251-260 订阅
排序:
MEDIAN: Adaptive Intermediate-grained Aggregation network for Composed Image Retrieval
MEDIAN: Adaptive Intermediate-grained Aggregation Network fo...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qinlei Huang Zhiwei Chen Zixu Li Chunxiao Wang Xuemeng Song Yupeng Hu Liqiang Nie School of Software Shandong University Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) School of Computer Science and Technology Shandong University School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
The Composed Image Retrieval (CIR) task aims to retrieve a target image that meets the requirements based on a given multimodal query (includes a reference image and modification text). Most existing works align multi... 详细信息
来源: 评论
PAIR: Complementarity-guided Disentanglement for Composed Image Retrieval
PAIR: Complementarity-guided Disentanglement for Composed Im...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhiheng Fu Zixu Li Zhiwei Chen Chunxiao Wang Xuemeng Song Yupeng Hu Liqiang Nie School of Software Shandong University Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) School of Computer Science and Technology Shandong University School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Composed Image Retrieval (CIR) is a novel image retrieval paradigm that aims at searching for the target images via the multimodal query including a reference image and a modification text. Although existing works hav... 详细信息
来源: 评论
Revisiting the Application of Twin Connected Parallel networksand Regression Loss Functions in Industrial Defect Detection
SSRN
收藏 引用
SSRN 2023年
作者: Su, Zhanzhi Zhou, Mingle Li, Min Zhang, Zekai Zhang, Cheng Xing, Rui Li, Gang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250353 China
Industrial product surface defects can affect the reliability and lifetime of products. However, industrial scenes are complex, with a wide variety of products, and product surface defects often have characteristics s... 详细信息
来源: 评论
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography  20th
How to Construct Public Timeline for RSA-Formed Time-Lock ...
收藏 引用
20th International Conference on information security and Cryptology, Inscrypt 2024
作者: Jin, Huixuan Peng, Cong Fu, Jintao Luo, Min Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou China Inspur Academy of Science and Technology Jinan China
Time-Locked Puzzle (TLP) and timed-release encryption (T-RE) are both time-based locking mechanisms. The former requires the decryptor to perform a predetermined amount of computation, while the latter requires a trus... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
A Cloud computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论
Bat-FG: A Broad Attention Based Fine-Grained Offloading in Green computing power networks
Bat-FG: A Broad Attention Based Fine-Grained Offloading in G...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zhutao Liu Chao Qiu Yunfeng Zhao Xiaofei Wang Jing Jiang College of Intelligence and Computing Tianjin University Tianjin China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China
computing power network (CPN) is an evolution of multi-access edge computing. Since the skyrocketing proliferation of CPN s, energy consumption aggravates explosively. However, majority of energy is wasted due to the ...
来源: 评论
Scenario based intelligent desensitization and dynamic access control technology for power distribution and distributed new energy data resources  6
Scenario based intelligent desensitization and dynamic acces...
收藏 引用
6th International Conference on Intelligent computing, Communication, and Devices, ICCD 2023
作者: Min, Xu Aihua, Zhou Yiqing, Wang Xiaofeng, Shen Lin, Peng Nige, Li Gang, Wang He, Wang State Grid Smart Grid Research Institute Co. LTD. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China State Grid Jiangsu Electric Power Co. Ltd Jiangsu Nanjing210024 China State Grid Shanghai Electric Power Company Shanghai200122 China
The new power system has a new operation mode of "the source follows the load, the load follows the network, and the source loads interact". With the continuous excavation of flexible regulation resources, n... 详细信息
来源: 评论
From Data Integrity to Global Model Integrity for Federated Learning: An MHT-based Approach
From Data Integrity to Global Model Integrity for Federated ...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Nannan Zhang Yao Zhao Y. Neil Qu Bruce Gu Keshav Sood Longxiang Gao Shui Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China School of IT Deakin University VIC Australia School of Computer Science University of Technology Sydney NSW Australia
Federated Learning (FL) is a distributed machine learning (ML) approach that enables multiple edge nodes to collaboratively train ML models by sharing model parameters, thus addressing privacy concerns. However, in hi... 详细信息
来源: 评论
A Novel Collaborative Edge Caching via User Preference Awareness and Adaptive Clustering in MENs
A Novel Collaborative Edge Caching via User Preference Aware...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Pengfei Gu Huiling Shi Hao Hao Mingfa Li Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In this paper, we propose a collaborative caching placement scheme leveraging user preference awareness and adaptive clustering (UPAAC), which jointly considers the heterogeneity of user preferences and user activity ... 详细信息
来源: 评论