咨询与建议

限定检索结果

文献类型

  • 628 篇 会议
  • 180 篇 期刊文献

馆藏范围

  • 808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 143 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
  • 157 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 224 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 769 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
808 条 记 录,以下是381-390 订阅
排序:
A Global Task Scheduling Method Based on network Measurement and Prediction in computing power networks
A Global Task Scheduling Method Based on Network Measurement...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Chuanfu Zhang Wen Li Jing Chen Jing Ge Di Wang Na Li Hao Sun Yudong Geng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
To improve the task scheduling efficiency in computing power networks, this paper proposes a global task scheduling method based on network measurement and prediction in computing power networks (GTS-MP), which select...
来源: 评论
Method and system of power load classification and decomposition based on deep learning
Method and system of power load classification and decomposi...
收藏 引用
Smart Grid and Energy Engineering (SGEE), International Conference on
作者: Hao Sun Hongtai Yuan Yudong Geng Jing Chen Chuanfu Zhang Wen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
This paper introduces a system for the classification and decomposition of electrical loads, addressing the shortcomings of current non-intrusive load decomposition methods that are prone to errors. We propose a metho...
来源: 评论
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Job power Consumption Prediction Framework
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Jo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jie Zhang Jian Song Xiang Li Xuesen Tian Zhigang Zhao Lu Wu Chunxiao Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the context of the rapid development of big data and artificial intelligence, the field of HPC is facing significant challenges in energy consumption. To address this challenge, this paper proposes a power consumpt...
来源: 评论
Cluster Caching Strategy Based on User Characteristics in Edge networks
Cluster Caching Strategy Based on User Characteristics in Ed...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Ye Zhang Wei Zhang Hao Hao Kai Zhang Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
To meet the growing traffic demand and relieve the pressure on the core network, edge caching and device-to-device (D2D) communication are used in next generation mobile networks. In this paper, based on a three-way c...
来源: 评论
network Situation Awareness Model Based on Incomplete information Game  5th
Network Situation Awareness Model Based on Incomplete Inform...
收藏 引用
5th International Conference on security and Privacy in New computing Environments, SPNCE 2022
作者: Zhang, Hongbin Yin, Yan Zhao, Dongmei Liu, Bin Wang, Yanxia Liu, Zhen School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science and Technology Shijiazhuang050000 China Hebei Geological Workers’ University Shijiazhuang050081 China
Game theory has been widely used in network security situational awareness. However, most of the currently proposed game-based offensive and defensive situational awareness methods are for traffic data, and there are ... 详细信息
来源: 评论
Graph-Based Time Series Edge Anomaly Detection in Smart Grid  7
Graph-Based Time Series Edge Anomaly Detection in Smart Grid
收藏 引用
7th IEEE International Conference on Big Data security on Cloud, 7th IEEE International Conference on High Performance and Smart computing, and 6th IEEE International Conference on Intelligent Data and security, BigDatasecurity/HPSC/IDS 2021
作者: Xu, Aidong Wu, Tao Zhang, Yunan Hu, Zhiwei Jiang, Yixin Electric Power Research Institute CSG. Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China
With the popularity of smart devices in the power grid and the advancement of data collection technology, the amount of electricity usage data has exploded in recent years, which is beneficial for optimizing service q... 详细信息
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area networks (HAN) and Neighborhood Area networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
network Intrusion Anomaly Detection Model Based on Multiclassifier Fusion Technology
收藏 引用
Mobile information Systems 2023年 第1期2023卷
作者: Hang, Feilu Guo, Wei Chen, Hexiong Xie, Linjiang Bai, Xiaoyu Liu, Yao Information Center Yunnan Power Grid Co. Ltd. Yunnan Kunming650034 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu610054 China
With the increasing development of the industrial Internet, network security has attracted more and more attention. Among the numerous network security technologies, anomaly detection technology based on network traff... 详细信息
来源: 评论
Trust Evaluation Model of Social Internet of Things Based on Multi-relationships
Trust Evaluation Model of Social Internet of Things Based on...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Fan, Fan Zhang, Hongbin Zhao, Dongmei Wang, Yanxia Liu, Bin Liu, Jian Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei Geological Workers' University Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
Trust plays a vital role in ensuring the security of the Social Internet of Things. Due to the increased mobility of intelligent devices, there are frequent interactions between machines and changes in social relation... 详细信息
来源: 评论