咨询与建议

限定检索结果

文献类型

  • 624 篇 会议
  • 178 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 311 篇 计算机科学与技术...
    • 259 篇 软件工程
    • 146 篇 电气工程
    • 94 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 机械工程
    • 24 篇 生物工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 155 篇 理学
    • 100 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 30 篇 法学
    • 21 篇 社会学
    • 10 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 15 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 39 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 51 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 761 篇 英文
  • 36 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
802 条 记 录,以下是781-790 订阅
排序:
A Lithium-Ion Battery Health State Assessment and Remaining Useful Life Prediction Method Based on Multi Slope Features
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Gaige Zhong, Siqi Yang, Yahong Zhang, Xiaoshen Deng, Wei Liu, Jinsong School of Communications and Information Engineering School of Artificial Intelligence Xi’an University of Posts and Telecommunications Shaanxi Xi’an710121 China Shaanxi Union Research Center of University and Enterprise for 5G+ Industrial Internet Communication Terminal Technology Xi’an University of Posts and Telecommunications Shaanxi Xi’an710121 China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Shaanxi Xi’an710121 China State Key Laboratory of Space Power Sources Shanghai Institute of Space Power-sources Shanghai200245 China Xi'an Aviation Brake Technology Co. Ltd Shaanxi Xi’an710065 China Contemporary Amperex Technology Co. Ltd. Fujian Ningde352107 China
In the field of battery management, accurately predicting the remaining useful life (RUL) of lithium-ion batteries is critical to guarding battery and device safety. However, current prediction methods are mainly base... 详细信息
来源: 评论
S3 Agent: Unlocking the power of VLLM for Zero-Shot Multi-modal Sarcasm Detection
收藏 引用
ACM Transactions on Multimedia computing, Communications, and Applications 1000年
作者: Peng Wang Yongheng Zhang Hao Fei Qiguang Chen Yukai Wang Jiasheng Si Wenpeng Lu Min Li Libo Qin School of Computer Science and Engineering Central South University China National University of Singapore Singapore Harbin Institute of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success... 详细信息
来源: 评论
Uncertainty-Aware Relational Graph Neural network for Few-Shot Knowledge Graph Completion
arXiv
收藏 引用
arXiv 2024年
作者: Li, Qian Guo, Shu Chen, Yingjia Ji, Cheng Sheng, Jiawei Li, Jianxin Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The State Key Laboratory of Software Development Environment Beihang University Beijing100083 China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100083 China School of Mathematics Edinburgh University Edinburgh United Kingdom Institute of Information Engineering Chinese Academy of Sciences Beijing100083 China School of Cyber Security University of Chinese Academy of Sciences Beijing100083 China
Few-shot knowledge graph completion (FKGC) aims to query the unseen facts of a relation given its few-shot reference entity pairs. The side effect of noises due to the uncertainty of entities and triples may limit the... 详细信息
来源: 评论
Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation
收藏 引用
ACM Transactions on information Systems 1000年
作者: Ziang Lu Lei Guo Xu Yu Zhiyong Cheng Xiaohui Han Lei Zhu Shandong Normal University China China University of Petroleum (East China) China Hefei University of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China Tongji University China
In the evolving landscape of recommender systems, the challenge of effectively conducting privacy-preserving Cross-Domain Recommendation (CDR), especially under strict non-overlapping constraints, has emerged as a key... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
G²Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
收藏 引用
IEEE Transactions on information Forensics and security 2024年 19卷 8773-8785页
作者: Haoxin Yang Xuemiao Xu Cheng Xu Huaidong Zhang Jing Qin Yi Wang Pheng-Ann Heng Shengfeng He School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science Guangzhou China Centre for Smart Health The Hong Kong Polytechnic University Hong Kong China School of Future Technology South China University of Technology Guangzhou China School of Computer Science and Network Security Dongguan University of Technology Dongguan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong SAR China School of Computing and Information Systems Singapore Management University Victoria St Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Implementation Method Of Remote Assistance Instruction Based On Hardware Secure Encryption
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2136卷
作者: Birong Huang Zhansheng Hou Peng Lin Fei Zhou Zhangjiagang Power Supply Branch of State Grid Jiangsu Electric Power Co. LTD JiangsuChina Global Energy Interconnection Research Institute nanjing Jiangsu China State Grid Key Laboratory Of Information & Network Security Nanjing China
As a public service enterprise related to energy security and national economy and people's livelihood, the safe work is related to all walks of life and thousands of households. In power scenarios, the remote coo...
来源: 评论
Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478]
收藏 引用
Journal of Systems and Software 2013年 第3期86卷 868-868页
作者: Xi Xiao Xinguang Tian Qibin Zhai Shutao Xia Graduate School at Shenzhen Tsinghua University 518055 Shenzhen China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences 100049 Beijing China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences 100190 Beijing China
来源: 评论
Research on Mimic Defence Technology for Smart Unit Application Environment of power Grid
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1314卷
作者: Zesheng Xi Bo Zhang Xin Sun Xiaojuan Guan Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing Jiangsu China State Grid Key Laboratory of Information & Network Security Nanjing Jiangsu China State Grid Zhejiang Electric Power Research Institute Hangzhou Zhejiang China
Aiming at the problem that the new network attack cannot be effectively defended at present, this paper proposes a framework of application-level mimic defense technology for smart grid units to solve the active attac...
来源: 评论
Research on Electric Micro-Meteorological Monitoring and Early Warning System
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1449卷
作者: Zehao Zhang Zhen Yu Xiyuan Xu Cheng Guan Song Zhang Global Energy Interconnection Research Institute co. Ltd Research Institute of Information Technology & Communication Beijing 102206 China. State Grid Key Laboratory of Information & Network Security State Grid FuJian Electric Power co. LTD
This paper studies and analyzes the influence of micro-meteorological disasters on power system, points out the main problems in the establishment of power micro-meteorological monitoring and early warning system, put...
来源: 评论