咨询与建议

限定检索结果

文献类型

  • 623 篇 会议
  • 178 篇 期刊文献

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 411 篇 工学
    • 306 篇 计算机科学与技术...
    • 254 篇 软件工程
    • 140 篇 电气工程
    • 90 篇 信息与通信工程
    • 67 篇 控制科学与工程
    • 34 篇 安全科学与工程
    • 32 篇 电子科学与技术(可...
    • 29 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 20 篇 交通运输工程
    • 16 篇 光学工程
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
    • 10 篇 土木工程
  • 154 篇 理学
    • 99 篇 数学
    • 39 篇 统计学(可授理学、...
    • 30 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 74 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 data models
  • 40 篇 training
  • 38 篇 federated learni...
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 27 篇 state grid key l...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 19 篇 shandong provinc...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 shandong fundame...
  • 12 篇 faculty of data ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 762 篇 英文
  • 33 篇 其他
  • 7 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
801 条 记 录,以下是791-800 订阅
排序:
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haoxin Xu, Xuemiao Xu, Cheng Zhang, Huaidong Qin, Jing Wang, Yi Heng, Pheng-Ann He, Shengfeng The School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The School of Future Technology South China University of Technology Guangzhou China The School of Computer Science and Network Security Dongguan University of Technology Dongguan China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong The School of Computing and Information Systems Singapore Management University Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
A vulnerability scanning scheme based on attack graph for smart grid industrial control system
收藏 引用
IOP Conference Series: Earth and Environmental Science 2021年 第1期645卷
作者: Kai Xu Xiangqun Wang Hao Xu Ning Dong Meng Han Xianfei Zhou State Grid Beijing Electric Power Company Beijing 100031 China Global Energy Interconnection Research Institute Co. Ltd Nanjing 210003 China State Grid Key Laboratory of Information & Network Security Nanjing 210003 China
As the core of national development, smart grid industrial control system has extremely high security requirements. However, due to the existence of many security vulnerabilities and lack of effective security protect...
来源: 评论
Transferring knowledge distillation for multilingual social event detection
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Wu, Jia Tong, Yongxin Wang, Lihong Bai, Xu Wang, Bo Yang, Qiang Institute of Information Engineering Chinese Academy of Sciences The School of Cyber Security University of Chinese Academy of Sciences Beijing100041 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Institute of Information Engineering Chinese Academy of Sciences Beijing100041 China The Department of Computing Macquarie University Sydney Australia The State Key Laboratory of Software Development Environment The School of Computer Science and Engineering Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong AI Group WeBank Co. Ltd. China
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ... 详细信息
来源: 评论
Research on Intelligent Monitoring and Maintenance Technology of Substation Based on Digital Twin
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2136卷
作者: He Wang Peng Lin Zhansheng Hou Shijun Sun Global Energy Interconnection Research Institute Nanjing Jiangsu 210003 China State Grid Key Laboratory of Information & Network Security Nanjing 210003 China State Grid ZheJiang Electric Power Co. LTD Zhejiang Hangzhou 310000 China
The design, research and development, test, operation and maintenance of power grid substation equipment are relatively independent. Related problems in each link cannot be comprehensively managed from the perspective...
来源: 评论
Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge computing
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1754卷
作者: Jing Zhu Tao Wu Jintao Li Yanbin Liu Qixin Jiang School of Communication and Information Engineering Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China Electric Power Institute CSG Guangzhou China
With the continuous deepening of China's power grid intelligent upgrading and the rise of edge computing technology, power grid terminals can carry out data storage and intelligent calculation at the edge of the p...
来源: 评论
Risk Assessment of power Monitoring System Based on Fuzzy Analytical Hierarchy Process
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2137卷
作者: Huifeng Li Tiecheng Li Qigui Yao Weixun Li Libo Yang Guanghui Sun State Grid Hebei Electric Power Research Institute Shijiazhuang Hebei China Global Energy Interconnection Research Institute Co. Ltd Nanjing Jiangsu China State Grid Key Laboratory of Information & Network Security Nanjing Jiangsu China State Grid Hebei Electric Power Co.Ltd Shijiazhuang Hebei China
The security threat of power monitoring system is increasing, it is valuable to carry out effective risk assessment, which helps to find the security threats of the system in time, then carry out security management a...
来源: 评论
Performance analysis of parallel replica molecular dynamics
收藏 引用
AIP Conference Proceedings 2018年 第1期1978卷
作者: Boyao Zhang Jue Wang Yangde Feng Ji Xiang Lei Wang 1Computer Network Information Center Chinese Academy of Science Department of High Performance Computing Technology and Application Development Beijing China 2University of Chinese Academy of Sciences Beijing China 3State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China 4School of cybersecurity Chinese Academy of Sciences China
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations...
来源: 评论
Dynamics and Resonance Fluorescence from a Superconducting Artificial Atom Doubly Driven by Quantized and Classical Fields
arXiv
收藏 引用
arXiv 2024年
作者: Ruan, Xinhui Wang, Jia-Heng He, Dong Song, Pengtao Li, Shengyong Zhao, Qianchuan Kuang, L.M. Tsai, Jaw-Shen Zou, Chang-Ling Zhang, Jing Zheng, Dongning Astafiev, O.V. Liu, Yu-Xi Peng, Zhihui Department of Automation Tsinghua University Beijing100084 China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics and Synergetic Innovation Center of Quantum Effects and Applications Hunan Normal University Changsha410081 China School of Integrated Circuits Tsinghua University Beijing100084 China Institute of Physics Chinese Academy of Sciences Beijing100190 China School of Physical Sciences University of Chinese Academy of Sciences Beijing100190 China Center for Quantum Computing RIKEN Saitama351-0198 Japan Graduate School of Science Tokyo University of Science 1-3 Kagurazaka Shinjuku Tokyo162-0825 Japan CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei Anhui230026 China Hefei National Laboratory Hefei230088 China School of Automation Science and Engineering Xi'an Jiaotong University Xi’an710049 China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China Skolkovo Institute of Science and Technology Nobel str. 3 Moscow143026 Russia Moscow Institute of Physics and Technology Institutskiy Pereulok 9 Dolgoprudny141701 Russia Royal Holloway University of London Surrey EghamTW20 0EX United Kingdom
We report an experimental demonstration of resonance fluorescence in a two-level superconducting artificial atom under two driving fields coupled to a detuned cavity. One of the fields is classical and the other is va... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1284卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology 710048 Xi'an China Telematics Group the University of Goettingen 37077 Goettingen Germany Shaanxi Key Laboratory of Network Computing and Security 710048 Xi'an China School of Electronic and Information Engineering Xi'an Jiaotong University 710048 Xi'an China College of Xi'an Innovation Yan'an University 710100 Xi'an China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in...
来源: 评论