咨询与建议

限定检索结果

文献类型

  • 637 篇 会议
  • 197 篇 期刊文献

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 440 篇 工学
    • 335 篇 计算机科学与技术...
    • 272 篇 软件工程
    • 148 篇 电气工程
    • 99 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 30 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 162 篇 理学
    • 104 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 53 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 41 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 231 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 27 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 14 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 wang changwei
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xu rongtao
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang

语言

  • 760 篇 英文
  • 69 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
834 条 记 录,以下是321-330 订阅
排序:
Edge-Based Resilient Consensus Control of Islanded Microgrids
Edge-Based Resilient Consensus Control of Islanded Microgrid...
收藏 引用
Cyber-Energy Systems and Intelligent Energy (ICCSIE), International Conference on
作者: Yixin Jiang Peiming Xu Wenqian Xu Zhihong Liang Yiwei Yang Yunan Zhang Kaitian Huang Meina Zhai CSG and Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute Guangzhou Guangdong China College of Information Science and Engineering Northeastern University Shenyang China
We present a resilient output voltage recovery strategy for AC microgrids (MGs). In the presence of network attacks, distributed generators (DGs) may experience partial loss of effectiveness (PLOE) and bias faults in ...
来源: 评论
HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted network Traffic
HG-ETC: Fine-Grained Application Behaviors Classification Fr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Weihua Liu Xiaohui Han Wenbo Zuo Yu Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quancheng Provincial Laboratory Jinan China
The classification of encrypted traffic has garnered widespread attention from both researchers and industrial companies. However, existing application behavior-based encrypted traffic classification methods often ext... 详细信息
来源: 评论
A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted network Traffic
A Knowledge Distillation-Driven Lightweight CNN Model for De...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yuecheng Wen Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quancheng Provincial Laboratory Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the realm of cybersecurity, efficiently and precisely identifying and mitigating potential threats from malicious encrypted traffic is crucial. As deep learning evolves, methods relying on Convolutional Neural Netw... 详细信息
来源: 评论
From Data Integrity to Global ModeI Integrity for Decentralized Federated Learning: A Blockchain-based Approach
From Data Integrity to Global ModeI Integrity for Decentrali...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Na Wang Yao Zhao Youyang Qu Lei Cui Bai Li Longxiang Gao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of IT Deakin University VIC Australia Zhejiang Tianheng Information Technology Company China
Decentralized Federated Learning (DFL) is extensively applied in various areas, e.g., healthcare, finance, and Internet of Things (loT), offering practical solutions for distributed intelligent applications and data c... 详细信息
来源: 评论
Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier network
Joint Extraction of Entities and Relationships from Cyber Th...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiqing Lv Xiaohui Han Hui Cui Peipei Wang Wenbo Zuo Yang Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
The increasing complexity of cyber threats and the emergence of new attack technologies have brought huge challenges to attack incident analysis and source tracing. Using cyber threat intelligence to build a Cyber sec... 详细信息
来源: 评论
Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback
Lombard-VLD: Voice Liveness Detection Based on Human Auditor...
收藏 引用
IEEE Symposium on security and Privacy
作者: Hongcheng Zhu Zongkun Sun Yanzhen Ren Kun He Yongpeng Yan Zixuan Wang Wuyang Liu Yuhong Yang Weiping Tu School of Cyber Science and Engineering Wuhan University Wuhan China State Grid Wuhan Electric Power Supply Company Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan
Voice Liveness Detection (VLD) aims to protect speaker authentication from speech spoofing by determining whether speeches come from live speakers or loudspeakers. Previous methods mainly focus on their differences at... 详细信息
来源: 评论
PTGFI: A Prompt-Based Two-Stage Generative Framework for Function Name Inference
PTGFI: A Prompt-Based Two-Stage Generative Framework for Fun...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Menglu Wang Xiaohui Han Peipei Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
In the field of cybersecurity, analyzing malicious software or programs is crucial for preventing network attacks. Malicious code often exists in a stripped binary form to thwart analysis, presenting challenges for an... 详细信息
来源: 评论
A High-Dimensional Temporal Data Publishing Method Based on Dynamic Bayesian networks and Differential Privacy
A High-Dimensional Temporal Data Publishing Method Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yaxin Wang Zhen Zhang Heng Qian Yongchao Gao Qiuyue Wang Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Massive high-dimensional data generated by the Internet typically contains sensitive privacy information. Protecting data privacy while maintaining utility has become a pressing challenge. We propose a novel high-dime... 详细信息
来源: 评论
BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zhiyao Li Aimin Li Yuechen Zhang Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method...
来源: 评论
Generalization Boosted Adapter for Open-Vocabulary Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Wenhao Wang, Changwei Feng, Xuxiang Xu, Rongtao Huang, Longzhao Zhang, Zherui Guo, Li Xu, Shibiao School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250013 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China The Aerospace Information Research Institute Chinese Academy of Sciences China The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China
Vision-language models (VLMs) have demonstrated remarkable open-vocabulary object recognition capabilities, motivating their adaptation for dense prediction tasks like segmentation. However, directly applying VLMs to ... 详细信息
来源: 评论