咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 172 篇 期刊文献

馆藏范围

  • 798 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 413 篇 工学
    • 311 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 39 篇 data models
  • 39 篇 training
  • 38 篇 federated learni...
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 16 篇 anomaly detectio...

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 20 篇 key laboratory o...
  • 20 篇 shandong provinc...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 wenpeng lu
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xiaohui han
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 759 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
798 条 记 录,以下是291-300 订阅
排序:
Efficient CNN-Transformer Aggregation network for Remote Sensing Image Change Detection
Efficient CNN-Transformer Aggregation Network for Remote Sen...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Bingjie Kong Qinglong Meng Fengqi Hao Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Change detection is a crucial task in the field of remote sensing, focusing on identifying areas where significant changes occur between two remote sensing images captured at different time points. However, existing c... 详细信息
来源: 评论
Collaborative Prediction of Drug-target Interaction using Sequence-based CNN and Transformer
Collaborative Prediction of Drug-target Interaction using Se...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huiting Li Weiyu Zhang Yong Shang Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Drug-target interaction (DTI) prediction is a critical step in drug discovery. Deep learning has shown great potential in DTI prediction. In recent years, many sequence-based DTI prediction methods have been proposed.... 详细信息
来源: 评论
A Secure keyword Spotting Scheme Based on Complex Residual network
A Secure Keyword Spotting Scheme Based on Complex Residual N...
收藏 引用
Image Processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Jingyi Chen Xiangyu Gao Peijia Zheng Huiyu Zhou Jian Li Dong Wei Jianbin Zou School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Amazon Web Services Beijing China
To address the privacy risks associated with intelligent voice assistants, this paper proposes a non-interactive, end-to-end keyword spotting scheme in the encrypted domain. The scheme introduces an innovative complex... 详细信息
来源: 评论
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events
EventTrojan: Manipulating Non-Intrusive Speech Quality Asses...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Ying Ren Kailai Shen Zhe Ye Diqun Yan Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Juphoon System Software Co. Ltd Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-Intrusive speech quality assessment (NISQA) has gained significant attention for predicting speech’s mean opinion score (MOS) without requiring the reference speech. Researchers have gradually started to apply NI... 详细信息
来源: 评论
SML: A Backdoor Defense for Non-Intrusive Speech Quality Assessment via Semi-Supervised and Multi-Task Learning
SML: A Backdoor Defense for Non-Intrusive Speech Quality Ass...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ying Ren Wenjie Zhang Jiahong Ye Jie Li Diqun Yan Bin Ma Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China College of Digital Technology and Engineering Ningbo University of Finance and Economics Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-intrusive speech quality assessment (NISQA) is widely used in speech downstream tasks due to its ability to predict the quality of speech without a reference speech. However, few researchers have focused on the ba... 详细信息
来源: 评论
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges
Unleashing the Potential of Decentralized Federated Learning...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Haibo Cheng Wenjian Liu Youyang Qu Kexue Fu Qinyuan Wang Faculty of Data Science City University of Macau Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Federated learning (FL) is a distributed learning method that reduces data transmission and privacy risks. However, the existence of a central server may become a target of attackers, resulting in an increased risk of... 详细信息
来源: 评论
Improved YOLOv5 Object Detection Method for Cervical Fluid Cell Pathological Image Detection
Improved YOLOv5 Object Detection Method for Cervical Fluid C...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Qingyan Ding Xuecheng Dong Na Li Yu Pan Wan Zheng Dept. Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Cervical liquid-based cell pathology image detection and recognition is a key task in gynecological pathology aimed at early detection of cervical precancerous lesions. In this study, a deep learning based method is p... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
Flexible and Secure Access Control for Ehr Sharing Based on Blockchain
SSRN
收藏 引用
SSRN 2023年
作者: Ma, Haobin Zhou, Dehua Li, Peng College of Information Science and Technology Jinan University Guangzhou510632 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
With the rapid development of the healthcare industry, many Electronic Health Records (EHRs) have emerged in different healthcare centers. However, lots of personal medical data is stored directly in plaintext at a si... 详细信息
来源: 评论
Traffic Anomaly Detection Model of Electric power Industrial Control Based on DBN-LSTM  23
Traffic Anomaly Detection Model of Electric Power Industrial...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Shijun Lai, Ji Yao, Qigui Platform Operation and Safety Center Information and Communication Branch of State Grid Jibei Electric Power Co. Ltd Beijing China Global Energy Interconnection Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Security Nanjing China
With the construction of smart city and smart grid, energy Internet is booming, and the deployment of smart power terminals has increased, with a wide range of deployment locations, and the level of intelligence of th... 详细信息
来源: 评论