咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
802 条 记 录,以下是541-550 订阅
排序:
Overlapping Community Detection Based on Influence and Seeds Extension
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2019年 第1期47卷 153-160页
作者: Yu, Zhi-Yong Chen, Ji-Jie Guo, Kun Chen, Yu-Zhong Xu, Qian College of Mathematics and Computer Sciences Fuzhou University FuzhouFujian350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing FuzhouFujian350116 China Ministry of Education Key Laboratory of Spatial Data Mining & Information Sharing FuzhouFujian350116 China State Grid Info-Telecom Great Power Science and Technology Co. Ltd. FuzhouFujian350003 China
Community detection is a significant research direction in the research of social networks. To improve the quality of seeds selection and expansion, we propose an influence seeds extension overlapping community detect... 详细信息
来源: 评论
Research on Electric power Business Terminal Classification Technology based on Unsupervised Algorithms
Research on Electric Power Business Terminal Classification ...
收藏 引用
International Conference on Smart Grid and Electrical Automation (ICSGEA)
作者: Xianzhou Gao Ruxia Yang Peng Gao Lei Chen Zhou Fang State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Nanjing Jiangsu 21000 China State Grid Zhejiang Electirc Power co. Ltd Zhejiang China
Electric power Business terminal has many characteristics, such as openness, heterogeneity and diversity. It has become an important entry point for network attacks. In order to effectively realize the security contro... 详细信息
来源: 评论
A New Method to Enhance Container with vTPM
A New Method to Enhance Container with vTPM
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Zhang Xiao Jian Zhou Peng Wang Qi Gao Peng Wang Yi Liang State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch Hangzhou China
This paper proposes a new container security enhancement system and method for containers running on 5G edge computing nodes. The system consists of vTPM module, physical TPM, container manager, vTPM manager, MEC cont... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
Artificial Intelligence of Things and Systems (AIoTSys), International Conference on
作者: Xiaoya Cao Zhenya Chen Weisheng Liu Yuanlong Liu Wenting Wang Xin Wang Ming Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti...
来源: 评论
Time Series Anomaly Detection Based on Graph Convolutional networks
Time Series Anomaly Detection Based on Graph Convolutional N...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Zhiwei Hu Tao Wu Yunan Zhang Jintao Li Longsheng Jiang School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute China Southern Power Grid Guangzhou China
With the popularization of my country's electric vehicles and the continuous deepening of smart grid upgrades, the electricity consumption data of domestic power grid companies has increased significantly. Due to ... 详细信息
来源: 评论
ESSVCS: An enriched secret sharing visual cryptography
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8363卷 1-24页
作者: Liu, Feng Yan, Wei Q. Li, Peng Wu, Chuankun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computing and Mathematical Sciences Auckland University of Technology 1142 New Zealand Department of Mathematics and Physics North China Electric Power University Baoding Hebei 071003 China
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to... 详细信息
来源: 评论
Research and Implementation of Electric Supply Reliability Evaluation Model for Distribution network
Research and Implementation of Electric Supply Reliability E...
收藏 引用
information and Communication Technology (ICTech), International Conference of
作者: Junfeng Qiao Chenhong Huang Aihua Zhou Hua Gu Lin Peng Xingde Huang Xiaofeng Shen Jingde Chen State grid key laboratory of information Network Security State Grid Smart Grid Research Institute Co.LTD Nanjing Jiangsu China Qingpu Power Supply Company State Grid Shanghai Electric Power Company Shanghai China
The scale of distribution network is expanding, the construction of distribution automation and ubiquitous power Internet of Things is advancing, and the multi-level and multisource real-time operation monitoring data...
来源: 评论
A Study on a Reduced Indicator System for the network security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Hongbin Zhang Yikang Bai Dongmei Zhao Bin Liu Ying Xu Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is...
来源: 评论
Towards practical anonymous quantum communication: A measurement-device-independent approach
收藏 引用
Physical Review A 2021年 第5期104卷 052415-052415页
作者: Yu-Guang Yang Xiao-Xiao Liu Shang Gao Yi-Hua Zhou Wei-Min Shi Jian Li Dan Li Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China College of Network Security Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China
The multipartite Greenberger-Horne-Zeilinger (GHZ) entangled state is an important resource for anonymous quantum communication tasks. But its low intensity and fragility limit the practical applications of these anon... 详细信息
来源: 评论
security Vulnerability Assessment of power IoT based on Business security
Security Vulnerability Assessment of Power IoT based on Busi...
收藏 引用
作者: Jiaxuan Fei Kai Chen Qigui Yao Qian Guo Xiangqun Wang State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co.Ltd. State Grid Hebei Information &Telecommunication Branch State Grid Hebei Electric Power Co.Ltd.
power Internet of Things is the application of IoT in smart power *** attacked,it will cause huge ***,it is necessary to conduct a security assessment to take defensive ***,the traditional vulnerability assessment met... 详细信息
来源: 评论