咨询与建议

限定检索结果

文献类型

  • 627 篇 会议
  • 187 篇 期刊文献

馆藏范围

  • 814 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 428 篇 工学
    • 319 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 153 篇 电气工程
    • 100 篇 信息与通信工程
    • 76 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 37 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 21 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 158 篇 理学
    • 102 篇 数学
    • 40 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 30 篇 法学
    • 21 篇 社会学
    • 10 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 41 篇 federated learni...
  • 40 篇 data models
  • 40 篇 training
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 51 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 shandong fundame...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 772 篇 英文
  • 37 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
814 条 记 录,以下是131-140 订阅
排序:
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Generating Personalized Imputations for Patient Health Status Prediction in Electronic Health Records
Generating Personalized Imputations for Patient Health Statu...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yang Zhang, Weiyu Si, Jiasheng Li, Zhao Peng, Xueping Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Evay Info Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China University of Technology Sydney Australian Artificial Intelligence Institute Sydney Australia
Electronic health records (EHRs) play a crucial role in the development of personalized treatment plans for patients. However, EHRs are often highly incomplete, posing significant challenges for predictive modeling. W... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
Self-Evaluation of Large Language Model based on Glass-box F...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
Correlation-Aware Virtual Machine Placement in Data Center networks  7th
Correlation-Aware Virtual Machine Placement in Data Center N...
收藏 引用
7th EAI International Conference on Cloud computing, CloudComp 2016 and 1st EAI International Conference on security and Privacy in New computing Environments, SPNCE 2016
作者: Chen, Tao Zhu, Yaoming Gao, Xiaofeng Kong, Linghe Chen, Guihai Wang, Yongjian Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Key Laboratory of Information Network Security of Ministry of Public Security The Third Research Institute of Ministry of Public Security Shanghai China
The resource utilization (CPU, memory) is a key performance metric in data center networks. The goal of the cloud platform supported by data center networks is achieving high average resource utilization while guarant... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Min He, Jinghui Ying, Zuobin Li, Gang Zhou, Mingle Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme...
来源: 评论
Anomaly-Free Prior Guided Knowledge Distillation for Industrial Anomaly Detection
Anomaly-Free Prior Guided Knowledge Distillation for Industr...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Gang Chen, Tianjiao Li, Min Han, Delong Zhou, MingLe Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In industrial manufacturing, visual anomaly detection is critical for maintaining product quality by detecting and preventing production anomalies. Anomaly detection methods based on knowledge distillation demonstrate... 详细信息
来源: 评论
Switched Event-Triggering Secondary Frequency Control of power Systems Considering Wind and Solar Stochastics Under Denial of Service Attack  16
Switched Event-Triggering Secondary Frequency Control of Pow...
收藏 引用
16th IEEE PES Asia-Pacific power and Energy Engineering Conference, APPEEC 2024
作者: Hong, Chao Fu, Yun Chen, Lin Tao, Jiaye Liang, Zhihong Wei, Lipeng Yang, Yiwei Ban, Qiucheng Wu, Shutan Electric Power Research Institute China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Guangdong China Information Centr Guizhou Power Grid Co. Guizhou China
This paper addresses the stochastic nature of wind and photovoltaic power generation, along with the increasing threat of denial of service (DoS) attacks on power systems. To counteract the growing incidence of DoS at... 详细信息
来源: 评论
Enhancing power System Stability Against DoS Attacks Through Hardware-in-the-Loop Simulation  16
Enhancing Power System Stability Against DoS Attacks Through...
收藏 引用
16th IEEE PES Asia-Pacific power and Energy Engineering Conference, APPEEC 2024
作者: Tao, Jiaye Liang, Zhihong Wei, Lipeng Hong, Chao Fu, Yun Yang, Yiwei Zhou, Zeyuan Chen, Lin Information Centre Guizhou Power Grid Co. Guizhou China Electric Power Research Institute China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
This study explores the stability and security of power systems in the face of Denial of Service (DoS) attacks through Hardware-in-the-Loop (HiL) simulation technology. As the application of Distributed Energy Resourc... 详细信息
来源: 评论