咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 172 篇 期刊文献

馆藏范围

  • 798 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 413 篇 工学
    • 311 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 39 篇 data models
  • 39 篇 training
  • 38 篇 federated learni...
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 16 篇 anomaly detectio...

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 20 篇 key laboratory o...
  • 20 篇 shandong provinc...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 wenpeng lu
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xiaohui han
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 759 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
798 条 记 录,以下是341-350 订阅
排序:
Text information Mining in Cyberspace: An information Extraction Method Based on T5 and keyBERT
Text Information Mining in Cyberspace: An Information Extrac...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Kuan Liu Yumei Li Yuanhua Qi Ning Qi Mengran Zhai Information Research Institute of Shandong Academy of Sciences Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Shandong Institute of Economy and Informatization Development Jinan China
With the development of the digital economy and the advent of the big data era, the rapid growth of textual information in cyberspace has placed higher demands on information processing technology. This paper proposes... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Research on Digital Architecture of power Grid and Dynamic Analysis Technology of Digital Project  1
收藏 引用
4th International Conference on 3D Imaging Technologies- Multidimensional Signal Processing and Deep Learning, 3D IT-MSP and DL 2022
作者: Wu, Xinping Wang, Gang Lv, Changhui Zhao, Bo Pan, Jianhong Dong, Aidi State Grid Economic and Technological Research Institute Co. Ltd Beijing102209 China State Grid Smart Grid Research Institute CO. LTD Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China Power Economic Research Institute of Jilin Electric Power Co. Ltd Changchun30011 China State Grid Jilin Electric Power Company Limited Changchun130021 China
The traditional project technical and economic evaluation only considers the business needs of the project itself, but does not consider the project construction from the overall situation of power grid construction, ... 详细信息
来源: 评论
Color and Feature Space Classification Methods Solve the Problem of Covariate Semantic information Deviation in Complex Scene Detection Tasks
Color and Feature Space Classification Methods Solve the Pro...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Mingle Zhou Rui Xing Min Li Delong Han Gang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong SCICOM Information and Economy Research Institute Co. Ltd Jinan China
The field weed detection task under the perspective of Plant Protection UAVs (PPU) is characterized by multi-scale targets and rich background semantic information, which belongs to the target detection task in comple... 详细信息
来源: 评论
Gradient-YOLO: Exploring the integration of gradient architecture into the YOLO network
Gradient-YOLO: Exploring the integration of gradient archite...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Gang Li Cheng Zhang Delong Han Letian Gao Mingle Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China
Object detection is an essential task in the field of computer vision. The one-stage object detection model directly completes object detection through a single forward propagation and has fast real-time object detect... 详细信息
来源: 评论
Enhancement for Versatile Video Coding in Vehicular Ad Hoc network Scenarios
Enhancement for Versatile Video Coding in Vehicular Ad Hoc N...
收藏 引用
International Symposium on Communications and information Technologies (ISCIT)
作者: Jiacheng Wu Jiaqi Zou Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications (BUPT) Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China
Vehicular Ad hoc network (VANET) allows infor-mation exchange between vehicles. In VANET, video is the most recommended medium for transmitting information. However, the characteristics of VANET and the requirements o... 详细信息
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论
LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Systems in 5G-Enabled Industrial Internet
LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Sys...
收藏 引用
2021 IEEE Globecom Workshops, GC Wkshps 2021
作者: Liang, Siyuan Wang, Xuefen Du, Jianbo Zhao, Feng Cao, Haotong Xi'An University of Posts and Telecommunications Shanxi Key Laboratory of Information Communication Network and Security Xi'an China The Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
Orthogonal frequency division multiplexing/offset quadrature amplitude modulation (OFDM/OQAM) passive optical network (PON) is an attractive technique for 5G-enabled Industrial Internet due to the large bandwidth and ... 详细信息
来源: 评论
CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence
CTI-JE: A Joint Extraction Framework of Entities and Relatio...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yang Liu Xiaohui Han Wenbo Zuo Haiqing Lv Jing Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology(Shandong Academy of Sciences) Jinan China
Advanced Persistent Threat (APT) pose an increasingly serious challenge to the security of businesses and organizations. In order to cope with these threats more effectively, effective utilization of cybers threat int... 详细信息
来源: 评论
Research on Virtual 3D Remote Sensing Technology of power Grid Station Based on 2D Vision  5
Research on Virtual 3D Remote Sensing Technology of Power Gr...
收藏 引用
5th International Conference on information Technologies and Electrical Engineering, ICITEE 2022
作者: Yu, Hai Tang, Shiyang Peng, Lin Yu, Zhen Qian, Kun School of Automation Southeast University Jiangsu Nanjing210096 China Power Grid Digitization Technology Research Institute State Grid Smart Grid Research Institute Jiangsu Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China
Aiming at the production safety management and control problems of substations, the digital twin 3D volume of substations is constructed based on 3D twinning technology, and the 2D/3D space fusion positioning percepti... 详细信息
来源: 评论