咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
802 条 记 录,以下是301-310 订阅
排序:
Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge computing  3
Multi-keyword Cipher-text Retrieval Method for Smart Grid Ed...
收藏 引用
2020 3rd International Symposium on power Electronics and Control Engineering, ISPECE 2020
作者: Zhu, Jing Wu, Tao Li, Jintao Liu, Yanbin Jiang, Qixin School of Communication and Information Engineering Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China Electric Power Institute CSG Guangzhou China
With the continuous deepening of China's power grid intelligent upgrading and the rise of edge computing technology, power grid terminals can carry out data storage and intelligent calculation at the edge of the p... 详细信息
来源: 评论
Efficient attribute-based encryption with blackbox traceability  12th
Efficient attribute-based encryption with blackbox traceabil...
收藏 引用
12th International Conference on Provable security, ProvSec 2018
作者: Xu, Shengmin Yang, Guomin Mu, Yi Liu, Ximeng Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia School of Information Systems Singapore Management University Singapore Singapore College of Mathematics and Computer Science Fuzhou University FuzhouFujian China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability w... 详细信息
来源: 评论
A secure message delivery scheme with path tracking for delay tolerant networks
A secure message delivery scheme with path tracking for dela...
收藏 引用
2012 1st IEEE International Conference on Communications in China, ICCC 2012
作者: Jia, Zhongtian Raffay, Muhammad Ali Li, Lixiang Lin, Xiaodong Yang, Yixian Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Faculty of Business and Information Technology University of Ontario Institute of Technology Oshawa ON L1H 7K4 Canada
In delay tolerant networks (DTNs), message delivery is operated in an opportunistic way through store-carry and forward relaying, and every DTN node is in anticipation of cooperation for data forwarding from others. U... 详细信息
来源: 评论
Research on Virtual 3D Remote Sensing Technology of power Grid Station Based on 2D Vision  5
Research on Virtual 3D Remote Sensing Technology of Power Gr...
收藏 引用
5th International Conference on information Technologies and Electrical Engineering, ICITEE 2022
作者: Yu, Hai Tang, Shiyang Peng, Lin Yu, Zhen Qian, Kun School of Automation Southeast University Jiangsu Nanjing210096 China Power Grid Digitization Technology Research Institute State Grid Smart Grid Research Institute Jiangsu Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China
Aiming at the production safety management and control problems of substations, the digital twin 3D volume of substations is constructed based on 3D twinning technology, and the 2D/3D space fusion positioning percepti... 详细信息
来源: 评论
MAC Frame Resolution and PHY Protocol Type Detection of IEEE 802.11
收藏 引用
International Journal of Communications, network and System Sciences 2017年 第5期10卷 43-53页
作者: Ling Li Shi Peng June Li Kai Yuan Zhihao Wang Yinbin Liu Ping Chen Xianbing Wang China Electric Power Research Institute Beijing China Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education Wuhan China Wuhan University Wuhan China
Frame resolution and physical layer (PHY) protocol type detection are the basis of research and development of intrusion prevention systems for IEEE 802.11 wireless network. Aiming at the problems which cannot be solv... 详细信息
来源: 评论
Research on Dynamic Technology of Digital Benefit Intelligent Quantitative Control  11
Research on Dynamic Technology of Digital Benefit Intelligen...
收藏 引用
11th International Conference of information and Communication Technology, ICTech 2022
作者: He, Zhimin Dong, Aidi Pan, Jianhong Global Energy Interconnection Research Institute Co. Ltd Jiangsu Nanjing210003 China State Grid Key Laboratory of Information & Network Security Beiqijia Beijing100000 China State Grid Jilin Electric Power Co. Ltd Changchun130021 China
With the rapid development of the digital economy, combined with changes in the company's internal and external development situations, the digitization of grid companies is extending from supporting management di... 详细信息
来源: 评论
A JPEG compression-resistant data watermark embedding and detection algorithm  21
A JPEG compression-resistant data watermark embedding and de...
收藏 引用
5th International Conference on Electronic information Technology and Computer Engineering, EITCE 2021
作者: Yu, Pengfei Huang, Xiuli Hu, Bo Zhou, Xiaoming State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Co. Ltd. Nanjing Jiangsu Province China State Grid Liaoning Electric Power Supply Co. Ltd. Shenyang Liaoning Province China
When the image is processed by JPEG compression, the data watermark originally hidden in the image will not be extracted effectively according to resampling and noise addition. This would greatly limit the application... 详细信息
来源: 评论
Research on Multi-dimensional Sensitivity Economic Evaluation Method of Digital Technology in power Grid Enterprises  1
收藏 引用
5th International Conference on Wireless Communications and Applications, ICWCA 2021
作者: Zhu, Liang Dong, Aidi Pan, Jianhong Global Energy Interconnection Research Institute Co. Ltd. Jiangsu Nanjing China State Grid Key Laboratory of Information and Network Security Jiangsu Nanjing China State Grid Jilin Electric Power Co. Ltd. Changchun130021 China
The participation of power grid enterprises is essential to meet the requirements of new energy reform for carbon neutralization. Aiming at the multi-dimensional sensitivity of power grid enterprises, this paper propo... 详细信息
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision network for Image Recognition Tasks in Resource-Constrained Environments  29
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Yuchen Liang, Hu Qiu, Ran Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works... 详细信息
来源: 评论
FERI: Feature Enhancement and Relational Interaction for Image-text Matching  30
FERI: Feature Enhancement and Relational Interaction for Ima...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Yu Zhang, Jianqiang Song, Gongpeng Lu, Qin Zhao, Shuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm... 详细信息
来源: 评论