咨询与建议

限定检索结果

文献类型

  • 627 篇 会议
  • 187 篇 期刊文献

馆藏范围

  • 814 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 428 篇 工学
    • 319 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 153 篇 电气工程
    • 100 篇 信息与通信工程
    • 76 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 37 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 21 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 158 篇 理学
    • 102 篇 数学
    • 40 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 30 篇 法学
    • 21 篇 社会学
    • 10 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 41 篇 federated learni...
  • 40 篇 data models
  • 40 篇 training
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 51 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 shandong fundame...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 772 篇 英文
  • 37 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
814 条 记 录,以下是1-10 订阅
排序:
Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第2期27卷 748-781页
作者: Zhu, Xiaoqiang Liu, Jiqiang Lu, Lingyun Zhang, Tao Qiu, Tie Wang, Chunpeng Liu, Yuan Beijing Jiaotong University School of Software Engineering Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University College of Intelligence and Computing Tianjin300350 China Qilu University of Technology School of Cyber Security and the Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China
The rapid growth of intelligent sensing capabilities and super computation power in 6G mobile communication systems has facilitated their application in diverse domains such as smart health, smart factories, and the i... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
A Chain-of-Task Framework for Instruction Tuning of LLMs Based on Chinese Grammatical Error Correction  31
A Chain-of-Task Framework for Instruction Tuning of LLMs Bas...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Xinpeng Xu, Bing Yang, Muyun Cao, Hailong Zhu, Conghui Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China
Over-correction is a critical issue for large language models (LLMs) to address Grammatical Error Correction (GEC) task, esp. for Chinese. This paper proposes a Chain-of-Task (CoTask) framework to reduce over-correcti... 详细信息
来源: 评论
Anomaly Detection in network Access-Using LSTM and Encoder-Enhanced Generative Adversarial networks
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第7期49卷 175-186页
作者: Hu, Jian He, Yingjun Xu, Wenqian Jiang, Yixin Liang, Zhihong Yang, Yiwei Yunnan Power Grid Information Center China Southern Power Grid Kunming650217 China Electric Power Research Institute China Southern Power Grid Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
Along with the continuous development of information technology, the database has become an important module for enterprises and individuals to apply computers, and some important data are stored in the database, whic... 详细信息
来源: 评论
Multiple Edge Data Integrity Verification With Multi-Vendors and Multi-Servers in Mobile Edge computing
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 4668-4683页
作者: Islam, Md Rashedul Xiang, Yong Uddin, Md Palash Zhao, Yao Kua, Jonathan Gao, Longxiang Deakin University School of Information Technology GeelongVIC3220 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
Ensuring Edge Data Integrity (EDI) is imperative in providing reliable and low-latency services in mobile edge computing. Existing EDI schemes typically address single-vendor (App Vendor, AV) single-server (Edge Serve... 详细信息
来源: 评论
k-TEVS: A k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2326-2337页
作者: Liu, Yang He, Debiao Luo, Min Wang, Lianhai Peng, Cong Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shenzhen Institute of Information Technology Institute of Information Technology Shenzhen518172 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Matrix Elements Technologies Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Shanghai200232 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Thee-vote is regarded as a waytoexpress the opinion that the voters ask for. Actually, the e-vote could be applied wildly likequestionnaire,***,thecoexistences of efficiency and security as well as transparency and pr... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
Adaptive Early Warning Method of Cascading Failures Caused by Coordinated Cyber-Attacks
收藏 引用
CSEE Journal of power and Energy Systems 2025年 第1期11卷 406-423页
作者: Yufei Wang June Li Jian Qiu Yangrong Chen Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan Hubei430072China China Electric Power Research Institute Beijing102209China Electric Power Planning&Engineering Institute Beijing 100120China
In order to accurately receive early warning of the cascading failures caused by coordinated cyber-attacks(CFCC)in grid cyber-physical systems(GCPS),an adaptive early warning method of CFCC is ***,the evolutionary mec... 详细信息
来源: 评论
network Intrusion Detection for Modern Smart Grids Based on Adaptive Online Incremental Learning
收藏 引用
IEEE Transactions on Smart Grid 2025年 第3期16卷 2541-2553页
作者: Lu, Qiuyu An, Kexin Li, Jun'e Wang, Jin Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China State Grid Hubei Electric Power Research Institute Energy Internet Research Center Wuhan430072 China
New and evolving cyber attacks against smart grids are emerging. This necessitates that the network intrusion detection systems (IDSs) have online learning ability. However, most existing methods struggle to handle ne... 详细信息
来源: 评论