咨询与建议

限定检索结果

文献类型

  • 628 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 420 篇 工学
    • 316 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 144 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 建筑学
  • 157 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 40 篇 training
  • 39 篇 data models
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 visualization
  • 21 篇 adaptation model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 224 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 771 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
810 条 记 录,以下是511-520 订阅
排序:
Generative Sentiment Analysis via Latent Category Distribution and Constrained Decoding
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Jun Yu, Dongyang Aziz, Kamran Su, Fangfang Zhang, Qing Li, Fei Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Beijing Rigour Technology Co. Ltd. China School of Cyberspace Hangzhou Dianzi University China North China Power Engineering Co. Ltd. of China Power Engineering Consulting Group China
Fine-grained sentiment analysis involves extracting and organizing sentiment elements from textual data. However, existing approaches often overlook issues of category semantic inclusion and overlap, as well as inhere... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of power Systems Based on Complex networks
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xin Li Zhaoyang Qu Tong Yu Ming Xie Fu Yu Wei Ding School of Electrical Engineering Northeast Electric Power University Jilin China People’s Bank of China Qinghai Provincial Branch Xining China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning China Bijie Power Supply Bureau China Guizhou Power Grid Co. Ltd. Bijie China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
MSONoC: A Metasurface-assisted Hybrid Waveguide/FSO network-on-Chip Architecture
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2024年
作者: Sun, Wei Li, Jingsi Guo, Pengxing He, Xiangyu Wang, Zimo Hu, Cong Liu, Weichen Hou, Weigang Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communications and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin541004 China School of Computer Science and Engineering Nanyang Technological University Singapore
Optical networks-on-chips (ONoCs) have emerged as the most promising solution for on-chip interconnection networks, offering distinct advantages such as high bandwidth and low latency. However, traditional wired-based... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
Spatio-temporal GNN-Based Cell-Free Massive MIMO network with Maximal Benefit-Cost Ratio
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Jiang, Jing Li, Yanni Ye, Yinghui Feng, Dan Zhang, Jiayi Sutthiphan, Worakrin Niyato, Dusit Xi'an Uni versity of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Beijing Jiaotong University Frontiers Science Center for Smart High-Speed Railway System Beijing100044 China National Telecommunication Public Company Mobile System Development Department Bangkok10210 Thailand Nanyang Technological University College of Computing and Data Science Singapore
Due to the network's rapid expansion, mobile networks bear extra high deployment costs. Being a key enabler of 6th generation (6G) mobile networks, it is crucial that cell-free massive MIMO (CF mMIMO) networks ach... 详细信息
来源: 评论
HCF-Net: Hierarchical Context Fusion network for Infrared Small Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Shibiao Zheng, ShuChen Xu, Wenhao Xu, Rongtao Wang, Changwei Zhang, Jiguang Teng, Xiaoqiang Li, Ao Guo, Li Artificial Intelligence Beijing University of Posts and Telecommunications China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence University of Chinese Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China School of Computer Science and Technology Harbin University of Science and Technology China
Infrared small object detection is an important computer vision task involving the recognition and localization of tiny objects in infrared images, which usually contain only a few pixels. However, it encounters diffi... 详细信息
来源: 评论
A vulnerability scanning scheme based on attack graph for smart grid industrial control system
A vulnerability scanning scheme based on attack graph for sm...
收藏 引用
2020 International Conference on Smart Grid and Energy Engineering, SGEE 2020
作者: Xu, Kai Wang, Xiangqun Xu, Hao Dong, Ning Han, Meng Zhou, Xianfei State Grid Beijing Electric Power Company Beijing100031 China Global Energy Interconnection Research Institute Co. Ltd Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
As the core of national development, smart grid industrial control system has extremely high security requirements. However, due to the existence of many security vulnerabilities and lack of effective security protect... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for power Micro-Application Server
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
Advanced Electronics, Electrical and Green Energy (AEEGE), International Conference on
作者: Li Nige Chen Lu Zhao Lei Teng Zhenning Wang Zhiqiang Shao Yiyang Gui Xiaolin State Grid Smart Grid Research Institute Co. Ltd. State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Nanjing China Shaanxi Province Key Laboratory of Computer Network Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e...
来源: 评论
Research on security hardening technology of container image File configuration for power intelligent IoT Terminal
Research on security hardening technology of container image...
收藏 引用
2021 IEEE Sustainable power and Energy Conference, iSPEC 2021
作者: Zhimin, Guo Zhuo, Lv Jiaxuan, Fei Xiangqun, Wang Gui, Yaoqi Nuannuan, Li Cen, Chen State Grid Henan Electric Power Research Institute State Grid Henan Electric Power Company Henan province China State Grid Key Laboratory of Information Network Security Global Energy Interconnection Research Institute Co. Ltd. Nanjing210003 China
With the development of cloud computing, Docker container technology has rapidly gained wide market applications with its advantages of light weight and high performance. Docker has the characteristics of a shared ker... 详细信息
来源: 评论
Rafmnet:Reinforced Attention Fusion and Multiscale network For Noisy Infrared and Visible Image Fusion
Rafmnet:Reinforced Attention Fusion and Multiscale Network F...
收藏 引用
IEEE International Conference on Image Processing
作者: Guohua Lv Xiyan Wang Yongbiao Gao Yi Zhai Guixin Zhao Guangxiao Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Comuter Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
The purpose of infrared and visible image fusion is to combine the advantages of different types of images to produce more robust and informative images. However, if the source images are noisy, existing fusion method... 详细信息
来源: 评论