咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
802 条 记 录,以下是371-380 订阅
排序:
Bat-FG: A Broad Attention Based Fine-Grained Offloading in Green computing power networks
Bat-FG: A Broad Attention Based Fine-Grained Offloading in G...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zhutao Liu Chao Qiu Yunfeng Zhao Xiaofei Wang Jing Jiang College of Intelligence and Computing Tianjin University Tianjin China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China
computing power network (CPN) is an evolution of multi-access edge computing. Since the skyrocketing proliferation of CPN s, energy consumption aggravates explosively. However, majority of energy is wasted due to the ...
来源: 评论
Mobile Terminal security Protection Method Based on Community Detection Algorithms and Graph Matching networks  8th
Mobile Terminal Security Protection Method Based on Communit...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Chen, Mu Dai, Zaojian Li, Yong Zhang, Juling Wang, Sheng Zhou, Jian Wu, Fan Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China Electric Power Research Institute of State Grid Sichuan Chengdu610041 China State Grid Sichuan Electric Power Company Chengdu610041 China Computer Science Department Tuskegee University TuskegeeAL36088 United States
The rapid growth in the number of malware apps poses a great danger to users of power mobile terminals. Among smart devices, devices using the Android system are very popular and thus are easy targets for malware atta... 详细信息
来源: 评论
Scenario based intelligent desensitization and dynamic access control technology for power distribution and distributed new energy data resources  6
Scenario based intelligent desensitization and dynamic acces...
收藏 引用
6th International Conference on Intelligent computing, Communication, and Devices, ICCD 2023
作者: Min, Xu Aihua, Zhou Yiqing, Wang Xiaofeng, Shen Lin, Peng Nige, Li Gang, Wang He, Wang State Grid Smart Grid Research Institute Co. LTD. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China State Grid Jiangsu Electric Power Co. Ltd Jiangsu Nanjing210024 China State Grid Shanghai Electric Power Company Shanghai200122 China
The new power system has a new operation mode of "the source follows the load, the load follows the network, and the source loads interact". With the continuous excavation of flexible regulation resources, n... 详细信息
来源: 评论
Research on Automated Penetration Testing Framework for power Web System Integrating Property information and Expert Experience
Research on Automated Penetration Testing Framework for Powe...
收藏 引用
作者: Zesheng Xi Jie Cui Bo Zhang Institute of Information and Communication Global Energy Interconnection Research Institute State Grid Key Laboratory of Information & Network Security State Grid Tianjin Electric Power Research Institute
Faced with the heterogeneous,intelligent and interconnected massive power web system environment,it is difficult to meet the needs of existing and incremental services in efficiency by mining and verifying vulnerabili... 详细信息
来源: 评论
Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing  9
Continuous Verification of Catastrophic Recalling in Machine...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Y. Neil Ji, Zonghao Cui, Lei Zhang, Chong Liu, Lei Tian, Zhiyi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250031 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250031 China Deakin University School of IT VIC3125 Australia Xidian University Guangzhou Institute of Technology Guangzhou510555 China University of Technology School of Computer Science SydneyNSW2007 Australia
Throughout the process of machine unlearning, in order to fulfill the requirements of machine unlearning and to comply with the rules of the right to be forgotten, it is natural to verify whether the unlearning model ... 详细信息
来源: 评论
network security Situational Awareness Model Based on Threat Intelligence  14th
Network Security Situational Awareness Model Based on Threat...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Zhang, Hongbin Yin, Yan Zhao, Dongmei Liu, Bin Gao, Hongbin School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050018 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang05000 China
In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awarene... 详细信息
来源: 评论
Enhance information Flow Tracking with Function Recognition
收藏 引用
China Communications 2010年 第6期7卷 24-29页
作者: Zhou Kan Huang Shiqiu Huang Shan Qi Zhengwei Gu Jian Guan Haibing School of software Shanghai Jliao Tong University Shanghai 200240 P. R. China Key Lab of Information Network Security Ministry of Public Security Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China Shanghai Key Laboratory of Scalable Computing & System Shanghai P. R. China
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... 详细信息
来源: 评论
Data-Driven Active power Dispatch for Wind Farms  13
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
13th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2024
作者: Jiao, Xuguo Zhang, Daoyuan Wang, Xin Ma, Zhaoxing Zhang, Zhenyong Liu, Wenfeng School of Information and Control Engineering Qingdao University of Technology Qingdao266520 China College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China School of Civil Engineering Qingdao University of Technology Qingdao266520 China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论
Spatial-Spectral Transformer for Local and Global Hyperspectral Image Classification
Spatial-Spectral Transformer for Local and Global Hyperspect...
收藏 引用
Signal, information and Data Processing (ICSIDP), IEEE International Conference on
作者: MengXin Cao Guixin Zhao Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Deep learning techniques have become increasingly prevalent in hyperspectral image (HSI) classification. However, convolutional neural network (CNN)-based approaches often struggle with inefficient utilization of spec... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Zefang Bai Guijuan Wang Meijie Ma School of Mathematics and Statistics Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论