咨询与建议

限定检索结果

文献类型

  • 628 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 420 篇 工学
    • 316 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 144 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 建筑学
  • 157 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 40 篇 training
  • 39 篇 data models
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 visualization
  • 21 篇 adaptation model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 224 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 771 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
810 条 记 录,以下是431-440 订阅
排序:
Research and Implementation of Electric Supply Reliability Evaluation Model for Distribution network
Research and Implementation of Electric Supply Reliability E...
收藏 引用
information and Communication Technology (ICTech), International Conference of
作者: Junfeng Qiao Chenhong Huang Aihua Zhou Hua Gu Lin Peng Xingde Huang Xiaofeng Shen Jingde Chen State grid key laboratory of information Network Security State Grid Smart Grid Research Institute Co.LTD Nanjing Jiangsu China Qingpu Power Supply Company State Grid Shanghai Electric Power Company Shanghai China
The scale of distribution network is expanding, the construction of distribution automation and ubiquitous power Internet of Things is advancing, and the multi-level and multisource real-time operation monitoring data...
来源: 评论
Channel Drop Out: A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI  7th
Channel Drop Out: A Simple Way to Prevent CNN from Overfitti...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Luo, Jing Wang, Yaojie Xu, Rong Liu, Guangming Wang, Xiaofan Gong, Yijing Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design Xi’an China
With the development of deep learning, many motor imagery brain-computer interfaces based on convolutional neural networks (CNNs) show outstanding performances. However, the trial number of EEG in the training set is ... 详细信息
来源: 评论
A Study on a Reduced Indicator System for the network security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Hongbin Zhang Yikang Bai Dongmei Zhao Bin Liu Ying Xu Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is...
来源: 评论
Mobile Terminal security Protection Method Based on Community Detection Algorithms and Graph Matching networks  8th
Mobile Terminal Security Protection Method Based on Communit...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Chen, Mu Dai, Zaojian Li, Yong Zhang, Juling Wang, Sheng Zhou, Jian Wu, Fan Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China Electric Power Research Institute of State Grid Sichuan Chengdu610041 China State Grid Sichuan Electric Power Company Chengdu610041 China Computer Science Department Tuskegee University TuskegeeAL36088 United States
The rapid growth in the number of malware apps poses a great danger to users of power mobile terminals. Among smart devices, devices using the Android system are very popular and thus are easy targets for malware atta... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
KA$^{2}$2SE: key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor networks
收藏 引用
IEEE Transactions on Services computing 2024年 第1期18卷 226-238页
作者: Haijiang Wang Jianting Ning Wei Wu Chao Lin Kai Zhang School of Information and Electronic Engineering Zhejiang University of Science and Technology Zhejiang China School of Cyber Science and Engineering Wuhan University Wuhan China Faculty of Data Science City University of Macau Macau China College of Education Sciences Hong Kong University of Science and Technology Guangzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou China College of Computer Science and Technology Shanghai University of Electric Power Shanghai China
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in m... 详细信息
来源: 评论
An Abnormal Login Detection Method Based on Local Outlier Factor and Gaussian Mixture Model
收藏 引用
International Journal of network security 2023年 第2期25卷 297-305页
作者: Guo, Wei He, Yue Chen, He-Xiong Hang, Fei-Lu Li, Yun-Jie Information Center of Yunnan Power Grid Company Limited Yunnan Kunming650034 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu610054 China
Nowadays, various enterprises have gradually begun to provide Internet services for customers. And the security of customer accounts is constantly threatened by various factors, which may result in account password di... 详细信息
来源: 评论
Construction and Application of the SMART Model for Adaptive Industrial Data Collection Based on Knowledge Graphs
Construction and Application of the SMART Model for Adaptive...
收藏 引用
IEEE International Conference on Big Data
作者: Wendan Cheng Zhen Zhang Heng Qian Qiuyue Wang Guanqun Su Lingge Meng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shu Ju (Shandong) Intelligent Technology Co. Ltd. Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Qingniao IIoT Co. Ltd. Jinan China
Industrial data collection is the foundation for implementing enterprise digitization, which is of great significance to the development of intelligent manufacturing. However, Industrial Data Collection Standards (IDC... 详细信息
来源: 评论
Significance-aware Medication Recommendation with Medication Representation Learning
Significance-aware Medication Recommendation with Medication...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yishuo Li Zhufeng Shao Weimin Chen Shoujin Wang Yuehan Du Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Mental Health Center Jinan China Data Science Institute University of Technology Sydney Sydney Australia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The goal of medication recommendation system is to recommend appropriate pharmaceutical interventions based on a patient’s diagnosis. Most of existing approaches often formulate these recommendations use data on diag... 详细信息
来源: 评论
Fusion of Dynamic Hypergraph and Clinical Event for Sequential Diagnosis Prediction
Fusion of Dynamic Hypergraph and Clinical Event for Sequenti...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xin Zhang Xueping Peng Hongjiao Guan Long Zhao Xinxiao Qiao Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Sequential diagnosis prediction (SDP) is a challenging task, aiming to predict patients’ future diagnoses based on their historical medical records. While methods based on graph neural networks (GNNs) have proven suc...
来源: 评论