咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 172 篇 期刊文献

馆藏范围

  • 798 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 413 篇 工学
    • 311 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 39 篇 data models
  • 39 篇 training
  • 38 篇 federated learni...
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 16 篇 anomaly detectio...

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 20 篇 key laboratory o...
  • 20 篇 shandong provinc...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 wenpeng lu
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xiaohui han
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 759 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
798 条 记 录,以下是281-290 订阅
排序:
An Adaptive Residual Coordinate Attention-Based network for Hat and Mask Wearing Detection in Kitchen Environments
An Adaptive Residual Coordinate Attention-Based Network for ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Ying Zhao Xiaoming Wu Xiangzhi Liu Hao Chen Bei Qi Huomin Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In order to ensure food safety, it is required for personnel to wear hats and masks during food handling processes. To accurately detect the wearing status of kitchen staff, the ARP-YOLO model is proposed. Firstly, im... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yuecheng Wen Xiaotong Li Haiqing Lv Menglu Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论
DTBNet: medical image segmentation model based on dual transformer bridge
DTBNet: medical image segmentation model based on dual trans...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Kequan Chen Yuli Wang Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Accurate medical image segmentation [1] techniques help doctors make better diagnoses. The traditional U-Net [2] model usually uses skip connections to directly connect the corresponding layers of the encoder and deco... 详细信息
来源: 评论
An Efficient Multi-Layer Indexing Method on Blockchain for Multimodal Data Querying
An Efficient Multi-Layer Indexing Method on Blockchain for M...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Haoyu Jia Xiaoming Wu Shanshan Liu Qile Yuan Bei Qi Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the digital society era, the generation frequency of multimodal data is rapidly increasing. Blockchain, recognized as a trusted distributed database technology, provides a new solution for the trustworthy storage a... 详细信息
来源: 评论
MMFI-Net: Multilevel Multimodal Feature Injection network for Infrared and Visible Image Fusion
MMFI-Net: Multilevel Multimodal Feature Injection Network fo...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Rundong Du Jinyong Cheng Huixuan Zhao Ying Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Infrared and visible image fusion aims at a better transfer of feature information from both modalities into the fused image. However, almost all existing methods currently focus on the performance of only one part of... 详细信息
来源: 评论
Student Behavior Detection Method Based on Improved YOLOv5 Algorithm
Student Behavior Detection Method Based on Improved YOLOv5 A...
收藏 引用
Computer Vision, Image and Deep Learning (CVIDL), International Conference on
作者: Haitao Hu Meihong Yang Ying Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
When using computer vision technology to identify students in the classroom, it will be affected by the inconsistency of the seating layout in different classrooms, the complexity of the background, as well as the exi... 详细信息
来源: 评论
TIBS: A Deep-Learning Model for network Intrusion Detection for SDN Environments
TIBS: A Deep-Learning Model for Network Intrusion Detection ...
收藏 引用
International Conference on Computers, Communications, and Systems (ICCCS)
作者: Yilin Zhang Xiaoming Wu Huomin Dong Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center (National Supercomputer Center in Jinan) Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Software-Defined networking (SDN) is a modern network strategy that replaces traditional network structures. Its management efficiency and convenience are significantly higher than traditional networks. However, it sh... 详细信息
来源: 评论
Collaborative Computation Model Based on Dependency Types and Constituent Trees for Aspect-Based Sentiment Analysis
Collaborative Computation Model Based on Dependency Types an...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jia Yi Xiaoming Wu Yunfeng Dong Bei Qi Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Aspect-based sentiment analysis(ABSA) is a fine-grained sentiment classification task that aims to identify the sentiment polarity of specific aspects in a sentence. Graph convolutional networks(GCN) have recently bee... 详细信息
来源: 评论
An Efficient Energy Consumption Prediction Framework for High Performance computing Cluster Jobs
An Efficient Energy Consumption Prediction Framework for Hig...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yantao Lou Jibin Wang Shoupeng Feng Xian Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Public Security of Shandong Province Shandong Intelligent Public Security Technology Innovation Center Jinan China
Energy consumption prediction is a crucial approach to enhance the operational efficiency of HPC (High Performance computing) clusters. Existing predicting methods for the energy consumption mainly rely on time series... 详细信息
来源: 评论
YOLO-RDD: A road defect detection algorithm based on YOLO
YOLO-RDD: A road defect detection algorithm based on YOLO
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jiabin Pei Xiaoming Wu Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Road maintenance is an indispensable part of the transportation system, ensuring road safety and maximizing road efficiency. The rapid and accurate acquisition of road surface information is crucial for effective road... 详细信息
来源: 评论