咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
802 条 记 录,以下是261-270 订阅
排序:
Credible Identity Authentication Mechanism of Electric Internet of Things Based on Blockchain  10th
Credible Identity Authentication Mechanism of Electric Inter...
收藏 引用
10th International Conference on Computer Engineering and networks, CENet 2020
作者: Wang, Liming Huang, Xiuli Chen, Lei Fan, Jie Zhang, Ming State Grid Jiangsu Electric Power Co. Ltd. Nanjing211106 China State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co. Ltd. Beijing102200 China
In order to solve the problems of low authentication efficiency and easy tampering of authentication data in the electric IoT system, this paper proposes the electric IoT based on blockchain. First, the authentication... 详细信息
来源: 评论
power Grid Disaster Loss information Fusion Analysis and Prediction Technology  5
Power Grid Disaster Loss Information Fusion Analysis and Pre...
收藏 引用
5th Annual International Conference on Data Science and Business Analytics, ICDSBA 2021
作者: Xu, Min Yang, Jianhua Yang, Jian Peng, Lin Tang, Shiyang Li, Nige Hou, Zhansheng He, Zhimin Wang, Gang Wang, He Bao, Xingchuan Yu, Hai Zhu, Liang Zhang, Zehao Li, Jing Gu, Tianxiong Yang, Yang Ye, Dailiang Global Energy Interconnection Research Institute Jiangsu Nanjing210003 China State Grid ZheJiang Electric Power Co. LTD Hangzhou Zhejiang310000 China State Grid Key Laboratory of Information Network Security Nanjing210003 China
After the natural disaster attacks the power grid, a large number of alarm information will flow into the control center, especially when the power grid has complex faults or the automatic device acts abnormally. Beca... 详细信息
来源: 评论
Trusted Identity Cross-Domain Dynamic Authorization Mechanism Based on Master-Slave Chain  10th
Trusted Identity Cross-Domain Dynamic Authorization Mechanis...
收藏 引用
10th International Conference on Computer Engineering and networks, CENet 2020
作者: Huang, Xiuli Guo, Qian Yao, Qigui Huo, Xuesong State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co. Ltd. Beijing102200 China State Grid Jiangsu Electric Power Co. Ltd. Nanjing211106 China
In order to solve the security problems existing when power users access power services in different domains, this paper proposes a dynamic authorization model for power users based on master-slave chain. In this mode... 详细信息
来源: 评论
A secret enriched visual cryptography
A secret enriched visual cryptography
收藏 引用
11th International Workshop on Digital Forensics and Watermaking, IWDW 2012
作者: Liu, Feng Yan, Wei Q. Li, Peng Wu, Chuankun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computing and Mathematical Sciences Auckland University of Technology 1142 New Zealand Department of Mathematics and Physics North China Electric Power University Baoding Hebei 071003 China
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to... 详细信息
来源: 评论
Research on Video Reuse and Structured Spatio-Temporal Big Data Technology Based on 3D Remote Sensing  5th
Research on Video Reuse and Structured Spatio-Temporal Big D...
收藏 引用
5th International Conference on 3D Imaging Technologies-Multidimensional Signal Processing and Deep Learning, 3DIT-MSP and DL 2023
作者: Tan, Haibin Cai, Bin Xue, Yuan Liu, Yiling Jin, Yuxin Wei, Renjia Yu, Hai Xianyang Power Supply Company Shaanxi Electric Power Co Ltd. Shaanxi Xianyang712000 China Power Grid Digitization Technology Research Institute State Grid Smart Grid Research Institute Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
The panoramic twin monitoring and analysis technology based on multi-mode fusion and video recycling is an important means to improve the level of substation equipment status operation and maintenance, production and ... 详细信息
来源: 评论
Design of power supply system for portable aviation inspection equipment  3
Design of power supply system for portable aviation inspecti...
收藏 引用
2023 3rd International Conference on Measurement Control and Instrumentation, MCAI 2023
作者: Yang, Yang Ai, Hao Li, Shibo Xiao, Guokai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Given that airborne electronic equipment may have a variety of wiring methods and may encounter a set of systems using multiple power supplies, it is necessary to take some measures on the circuit to ensure the normal... 详细信息
来源: 评论
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain
Non-aligned double JPEG compression detection based on refin...
收藏 引用
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yun-Qing Jha, Sunil Kr. School of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu China Nanjing University of Information Science and Technology Nanjing China Shanxi Key Laboratory of Network and System Security Xidian University Shanxi China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China New Jersey Institute of Technology NewarkNJ United States
Due to the widespread use of the JPEG format, non-aligned double JPEG (NA-DJPEG) compression is very common in image tampering. Therefore, non-aligned double JPEG compression detection has attracted significant attent... 详细信息
来源: 评论
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government  9
Research on the Design of Government Data Governance Evaluat...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Xu, Zirui Sun, Jinyang Lu, Zhe Han, Delong Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
In the context of the digital era, government data governance is a key factor in promoting the modernization of government governance, but there is a lack of a complete set of evaluation index system to standardize th... 详细信息
来源: 评论
Research on Classroom Behavior Target Detection Algorithm based on YOLOv7  6
Research on Classroom Behavior Target Detection Algorithm ba...
收藏 引用
6th IEEE Advanced information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2024
作者: Qiu, Wenke Wu, Xiaoming Liu, Xiangzhi Computer Science and Qilu University of Technology Shandong Academy of Sciences ShanDong Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The integration of video information for the purpose of detecting students' behavior in the classroom, with the aim of enhancing teaching efficiency and maintaining a stable classroom environment, offers significa... 详细信息
来源: 评论
Fairness of Large Music Models: From a Culturally Diverse Perspective  9
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Qinyuan Gu, Bruce Zhang, He Li, Yunfeng University of Sydney School of Music NSW2008 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250031 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250031 China CNPIEC KEXIN Ltd. Beijing100020 China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论