咨询与建议

限定检索结果

文献类型

  • 627 篇 会议
  • 187 篇 期刊文献

馆藏范围

  • 814 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 428 篇 工学
    • 319 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 153 篇 电气工程
    • 100 篇 信息与通信工程
    • 76 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 37 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 21 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 158 篇 理学
    • 102 篇 数学
    • 40 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 30 篇 法学
    • 21 篇 社会学
    • 10 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 41 篇 federated learni...
  • 40 篇 data models
  • 40 篇 training
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 51 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 shandong fundame...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 772 篇 英文
  • 37 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
814 条 记 录,以下是661-670 订阅
排序:
3D Data Fusion and Registration Technology of Substation Based on Digital Twin Space Analysis  22
3D Data Fusion and Registration Technology of Substation Bas...
收藏 引用
Proceedings of the 5th International Conference on information Technologies and Electrical Engineering
作者: Min Xu Xinhe Chen Zhimin Guo Lin Peng Weijian Zhang State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co.LTD China Institute of Electrical Engineering Chinese Academy of Sciences China State Grid Henan Electric Power Co. LTD China
In view of the difficulties in sharing 3D digital resources, insufficient interconnection and interaction of massive heterogeneous 3D data resources, and lack of spatial data analysis foundation for equipment diagnosi... 详细信息
来源: 评论
IEdroid:Detecting Malicious Android network Behavior Using Incremental Ensemble of Ensembles
IEdroid:Detecting Malicious Android Network Behavior Using I...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Cong Liu Anli Yan Zhenxiang Chen Haibo Zhang Qiben Yan Lizhi Peng Chuan Zhao Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan China School of Information Science and Engineering University of Jinan China School of Cyberspace Security (School of Cryptology) Hainan University China University of Otago Dunedin New Zealand Michigan State University USA
Malware detection has attracted widespread attention due to the growing malware sophistication. Machine learning based methods have been proposed to find traces of malware by analyzing network traffic. However, networ... 详细信息
来源: 评论
Video rain/snow removal by transformed online multiscale convolutional sparse coding
arXiv
收藏 引用
arXiv 2019年
作者: Li, Minghan Cao, Xiangyong Zhao, Qian Zhang, Lei Gao, Chenqiang Meng, Deyu School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi China Department of Computing Hong Kong Polytechnic University Hung Hom Hong Kong Chongqing Key Laboratory of Signal and Information Processing Chongqing University of Posts and Telecommunications Chongqing400065 China
Video rain/snow removal from surveillance videos is an important task in the computer vision community since rain/snow existed in videos can severely degenerate the performance of many surveillance system. Various met... 详细信息
来源: 评论
EEG based Parkinson Detection through Supervised information Enhanced Contrastive Learning
EEG based Parkinson Detection through Supervised Information...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jian Song Xiang Li Wenjing Jiang Chunxiao Wang Zhigang Zhao Jialiang Lv Bin Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Geriatric Neurology Key Laboratory of Cardiovascular Proteomics of Shandong Province Qilu Hospital of Shandong University Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study presents a novel Supervised information Enhanced Contrastive Learning Algorithm for Parkinson’s Disease Detection (SI-CLAPD) based on Electroencephalography (EEG). SI-CLAPD performs contrastive learning in...
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yonghao Yu Yongde Guo Dawei Zhao Kexue Fu Yongwei Tang Qinyuan Wang Faculty of Data Science City University of Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Shandong University Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
Several constructions of optimal LCD codes over small finite fields
arXiv
收藏 引用
arXiv 2022年
作者: Li, Shitao Shi, Minjia Liu, Huizhou School of Mathematical Sciences Anhui University Hefei230601 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education School of Mathematical Sciences Anhui University Hefei230601 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Grid Anhui Electric Power Co. Ltd. Hefei China
Linear complementary dual (LCD) codes are linear codes which intersect their dual codes trivially, which have been of interest and extensively studied due to their practical applications in computational complexity an...
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
Research and Implementation of User Behavior Simulation Technology Based on power Industry Cyber Range
Research and Implementation of User Behavior Simulation Tech...
收藏 引用
information Technology,Big Data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Huiting Yang Tao Chen Yunxiao Bai Feng Li Mingxuan Li Ruxia Yang State Grid Xinjiang Electric Power Research Institute Urumqi China State Grid Xinjiang Electric Power Co. Ltd Urumqi China State Grid Key Laboratory of Information & Network Security Nanjing China Global Energy Interconnection Research Institute Co. Ltd Nanjing Jiangsu China
The current cyber range of the electric power industry has background traffic simulation problems, prospect behavior generation problems, and target simulation diversity problems in large-scale network environments. I... 详细信息
来源: 评论
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization——Taking Standardization Practice in Shandong Province as an Example
Research on the Distribution Characteristics of Standardized...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Jinyang Sun Dongdong Peng Zhe Lu Mengran Zhai Ning Qi Yuanhua Qi SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Jinan Municipal Bureau of Big Data Jinan China Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology Shandong Academy of Sciences Jinan China
Standardized big data, as a product of the combination of big data and standardization work, objectively reflects the status quo and trends of standardization work. An in-depth study of the distribution characteristic... 详细信息
来源: 评论
Parallel Optimization of Computational Fluid Dynamics Application code_saturne Based on Next Generation Sunway Supercomputer
Parallel Optimization of Computational Fluid Dynamics Applic...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Anjun Liu Yin Liao Xihao Xu YanYan Chen Hongjun Zhong Jianming Wu Bo Kong Alexander Raikov Meng Guo Jinan Key Laboratory of High Performance Industrial Software Jinan Institute of Supercomputing Technology Jinan China Jinan Supercomputing-Zhejiang Yuansuan Industrial Simulation System Joint Laboratory Zhejiang Yuansuan Technology Co. Ltd Hangzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan ) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
code_saturne is an open-source general large-scale computational fluid dynamics software independently developed by Electricite de France since 1997. Due to its high computing performance, code_saturne has been widely...
来源: 评论