咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
802 条 记 录,以下是611-620 订阅
排序:
SCARE of Secret Ciphers under Rough Leakage Model
收藏 引用
security and Communication networks 2023年 第1期2023卷
作者: Wang, Mengxing Tang, Ming Zhang, Xige Chen, Qi Ding, Haili Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430000 China Beijing Smartchip Microelectronics Technology Co. Ltd. Beijing100192 China Marketing Service Center State Grid Electric Power Co. Ltd. Ningxia750002 China
Most previousside-channel analysis-based reverse engineering (SCARE) methods were based on collision attack. However, the collision-based methods generally need noise-free traces and can hardly be verified by realisti... 详细信息
来源: 评论
Social-enhanced recommendation using graph-based contrastive learning
Social-enhanced recommendation using graph-based contrastive...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Peng Xue Qian Gao Jun Fan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong China China Telecom Digital Intelligence Techonology Co Ltd Jinan Shandong China
The social network-based recommendation model use social network information to mitigate data sparsity issues and improve the accuracy of recommendation models. However, In most social network-based recommendation alg...
来源: 评论
A Load-Balancing Algorithm for power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections  7th
A Load-Balancing Algorithm for Power Internet of Things Reso...
收藏 引用
7th International Conference on Artificial Intelligence and security, ICAIS 2021
作者: Zhang, Mingming Mao, Jiaming Chen, Lu Li, Nige Fan, Lei Shuang, Leshan State Grid Jiangsu Electric Power Co. Ltd. Information and Telecommunication Branch Nanjing Jiangsu210003 China Institute of Information and Communication Global Energy Interconnection Research Institute State Grid Key Laboratory of Information and Network Security Nanjing Jiangsu210003 China Broadband Wireless Communication Technology Engineering Research Center of the Ministry of Education Nanjing University of Posts and Telecommunications Nanjing Jiangsu210003 China
With the gradual increase of user visits in the power Internet of Things, load imbalances often appear, affecting server operation efficiency. This article is an improvement based on the weighted minimum number of con... 详细信息
来源: 评论
LI-FPN: Depression and Anxiety Detection from Learning and Imitation
LI-FPN: Depression and Anxiety Detection from Learning and I...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xingyun Li Lin Lu Xinyu Yi Hao Wang Yunshao Zheng Yanhong Yu Qingxiang Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Mental Health Center Jinan China Shandong University of Traditional Chinese Medicine Jinan China
With the rise in societal pressures, depression and anxiety have increasingly become prominent mental health conditions impacting people’s lives. To enhance the efficacy of automatic detection for these disorders, we...
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
External Knowledge Is Not Always Needed: An Adaptive Retrieval Augmented Generation Method
External Knowledge Is Not Always Needed: An Adaptive Retriev...
收藏 引用
Artificial Intelligence and Intelligent Manufacturing (AIIM), International Symposium on
作者: Wenbo Guan Jiyu Lu Qinyu Feng Xiaoqian Li Jun Zhou Key Laboratory of Speech Acoustics and Content Understanding Institute of Acoustics Chinese Academy of Sciences Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China China Southern Power Grid Artificial Intelligence Technology Co. Ltd Guangzhou China School of Computing Science and Engineering South China University of Technology Guangzhou China
Retrieval augmented generation (RAG), by integrating external knowledge with large language models (LLMs), has become a common practice to alleviate LLMs’ hallucination problem. The performance of RAG, however, depen... 详细信息
来源: 评论
Multi-Channel Hypergraph Convolution Group Recommendation with Member information Enhancement
Multi-Channel Hypergraph Convolution Group Recommendation wi...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Tianhao Chen Qian Gao Jun Fan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong China China Telecom Digital Intelligence Techonology Co Ltd Jinan Shandong China
Group recommendation involves comprehensively considering various aspects, including members and items, to predict the overall interests of a group and recommend suitable items through a recommendation system. With th...
来源: 评论
Several constructions of optimal LCD codes over small finite fields
arXiv
收藏 引用
arXiv 2022年
作者: Li, Shitao Shi, Minjia Liu, Huizhou School of Mathematical Sciences Anhui University Hefei230601 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education School of Mathematical Sciences Anhui University Hefei230601 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Grid Anhui Electric Power Co. Ltd. Hefei China
Linear complementary dual (LCD) codes are linear codes which intersect their dual codes trivially, which have been of interest and extensively studied due to their practical applications in computational complexity an...
来源: 评论
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial network
收藏 引用
Computer Systems Science & Engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论
Wireless powered Backscatter Communications with Spatially Random Tags
Wireless Powered Backscatter Communications with Spatially R...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Yingting Liu Yinghui Ye Xingwang Li Zhongyu Ma Zhiyang Zhou School of Electronic and Information Engineering Lanzhou Jiaotong University Lanzhou China State Grid Gansu Electric Power Research Institute Lanzhou China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an China School of Physics and Electronic Information Engineering Henan Polytechnic University Jiaozuo China College of Computer Science and Engineering Northwest Normal University Lanzhou China
In this paper, a wireless powered backscatter communication (BackCom) system is considered, which consists of one dedicated radio-frequency source node (S), one destination node and multiple tags randomly located in t...
来源: 评论