咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
802 条 记 录,以下是611-620 订阅
排序:
A Multi-Path Orchestration Method for Cloud-Edge Data Transmission Based on DRL
A Multi-Path Orchestration Method for Cloud-Edge Data Transm...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zhihui Wang Xubing Dou Shuyun Li Huan Ma Xinchang Zhang Maoli Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China QuFu normal university Jining China
In addressing the multi-path problem of cloud-edge data transmission, this paper introduces a multi-path orchestration method based on deep reinforcement learning (DRL) within the context of software-defined networks ... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Ru Li Aimin Li Rong Fei Xie Guo Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ...
来源: 评论
Learning Fine-Grained information Alignment for Calibrated Cross-Modal Retrieval
Learning Fine-Grained Information Alignment for Calibrated C...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jianhua Dong Shengrong Zhao Hu Liang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Masked Language Modeling (MLM) and Image-Text Matching (ITM) are always used in fusion encoder to learn the joint representation of images and text. In existing methods, the masking strategy of MLM leads to the neglec...
来源: 评论
Dual Prototypes Contrastive Learning for Semi-Supervised Medical Image Segmentation
SSRN
收藏 引用
SSRN 2024年
作者: Yue, Tianai Xu, Rongtao Wu, Jingqian Yang, Wenjie Du, Shide Wang, Changwei Johns Hopkins University Baltimore21218 United States State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing100190 China The University of Hong Kong Hong Kong999077 Hong Kong College of Computer and Big Data Fuzhou University Fuzhou350108 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan250014 China
Semi-supervised techniques for medical image segmentation have demonstrated potential, effectively training models using scarce labeled data alongside a wealth of unlabeled data. Therefore, semi-supervised medical ima... 详细信息
来源: 评论
External Knowledge Is Not Always Needed: An Adaptive Retrieval Augmented Generation Method  4
External Knowledge Is Not Always Needed: An Adaptive Retriev...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Guan, Wenbo Lu, Jiyu Feng, Qinyu Li, Xiaoqian Zhou, Jun Key Laboratory of Speech Acoustics and Content Understanding Institute of Acoustics Chinese Academy of Sciences Beijing100190 China Institute of Information Engineering Chinese Academy of Sciences Beijing100084 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Artificial Intelligence Technology Co. Ltd China Southern Power Grid Guangzhou510663 China School of Computing Science and Engineering South China University of Technology Guangzhou510006 China
Retrieval augmented generation (RAG), by integrating external knowledge with large language models (LLMs), has become a common practice to alleviate LLMs’ hallucination problem. The performance of RAG, however, depen... 详细信息
来源: 评论
Fair and autonomous sharing of federate learning models in mobile Internet of Things
arXiv
收藏 引用
arXiv 2020年
作者: Hao, Xiaohan Ren, Wei Xiong, Ruoting Zheng, Xianghan Zhu, Tianqing Xiong, Neal N. School of Computer Science China University of Geoscience Wuhan China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Mingbyte Technology QingDao China School of Software University of Technology Sydney UltimoNSW2007 Australia Dept. of Mathematics and Computer Science Northeastern State University United States
Federate learning can conduct machine learning as well as protect the privacy of self-owned training data on corresponding ends, instead of having to upload to a central trusted data aggregation server. In mobile scen... 详细信息
来源: 评论
The Utility Model Relates to a Real-Time Interaction Method of Mobile Terminal information Based on power Emergency Scene
The Utility Model Relates to a Real-Time Interaction Method ...
收藏 引用
International Conference on Data Science and Business Analytics (ICDSBA)
作者: Zhansheng Hou Shijun Sun Lin Peng Zhen Yu Jinyin Song He Wang Min Xu Gang Wang Xingchuan Bao Hai Yu Zhimin He Liang Zhu Xiyuan Xu Zehao Zhang Shiyang Tang State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Nanjing China State Grid ZheJiang Electric Power Co. Ltd Hangzhou China Global Energy Interconnection Research Institute Nanjing China
At present domestic emergency information interaction lack of flexibility, after a natural disaster, on-site rescue workers with the rescue headquarters, emergency command center, sharing of information between were s... 详细信息
来源: 评论
Adaptive Fine-grained Access Control Method in Social Internet of Things
收藏 引用
International Journal of network security 2021年 第1期23卷 42-48页
作者: Zhang, Hongbin Ma, Pengcheng Liu, Bin School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal China School of Economics and Management Hebei University of Science China Technology Research Center of Big Data and Social Computing Hebei University of Science China
Social Internet of Things (SloT), as a new carrier of integration of social and Internet of Things, applies the research results of social networks from different aspects of the Internet of Things. Different types of ... 详细信息
来源: 评论
An Emergency Drill Command System Facing the power Grid Emergency Operation Site
An Emergency Drill Command System Facing the Power Grid Emer...
收藏 引用
International Conference on Data Science and Business Analytics (ICDSBA)
作者: Zhan Sheng Hou Qin Yi Zhang Bin Geng Xi Yuan Xu Shi Jun Sun Global Energy Interconnection Research Institute Nanjing China State Grid Key Laboratory of Information & Network Security Nanjing China State Grid JiLin Electric Power Co. Ltd JiLin China State Grid ZheJiang Electric Power Co. Ltd Hangzhou China
Emergency command system is now working at an emergency exercise special technical support on the strength is limited, play a role in the various emergency drills support is not enough, difficult to meet the urgent ne... 详细信息
来源: 评论
Strong security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论