咨询与建议

限定检索结果

文献类型

  • 627 篇 会议
  • 187 篇 期刊文献

馆藏范围

  • 814 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 428 篇 工学
    • 319 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 153 篇 电气工程
    • 100 篇 信息与通信工程
    • 76 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 37 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 25 篇 机械工程
    • 24 篇 生物工程
    • 21 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 158 篇 理学
    • 102 篇 数学
    • 40 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 30 篇 法学
    • 21 篇 社会学
    • 10 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 semantics
  • 41 篇 federated learni...
  • 40 篇 data models
  • 40 篇 training
  • 27 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 predictive model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 51 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 shandong fundame...
  • 16 篇 key laboratory o...
  • 15 篇 global energy in...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 772 篇 英文
  • 37 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
814 条 记 录,以下是741-750 订阅
排序:
An Efficient Lightweight Satellite Image Classification Model with Improved MobileNetV3
An Efficient Lightweight Satellite Image Classification Mode...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Xiaoteng Yang Lei Liu Xifei Song Jie Feng Qingqi Pei Xiaoming Yuan Jianqiao Li School of Telecommunication Engineering Xidian University Xi'an China Guangzhou Institute of Technology Xidian University Guangzhou China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi'an Shaanxi China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an China Northeastern University Qinhuangdao Branch Campus Qinhuangdao China China Academy of Space Technology-Xi'an Xi'an China
In view of the huge satellite images, which will consume a large amount of resources if they are completely transmitted to the ground for processing, an improved lightweight on-orbit image classification model is prop... 详细信息
来源: 评论
Research on information security Protection System of Industrial Control System
Research on Information Security Protection System of Indust...
收藏 引用
IEEE Joint International information Technology and Artificial Intelligence Conference (ITAIC)
作者: Zhenwan Zou Yingsa Hou Huiting Yang Bin Wang Ruxia Yang Electric Power Research Institute of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Maintenance company of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Global Energy Interconnection Research Institute Co. Ltd. Nanjing Jiangsu China State Grid Key Laboratory of Information & Network Security Nanjing Jiangsu China
Aiming at the current status and risks of industrial control system information security, a security protection system was proposed from the technical and management levels. At the technical level, it strengthen secur... 详细信息
来源: 评论
Remote Healthcare Monitoring System for Aging Population Based on IoT and Big Data Analysis
Remote Healthcare Monitoring System for Aging Population Bas...
收藏 引用
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
作者: Qiang Liu Songlin Sun Liang Gong Zhongle Wu Mohamed Cheriet Michel Kadoch National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Academy of Broadcasting Planning NRTA China ETS University of Quebec Montreal Canada
As the population ages, this will put tremendous pressure on pensions and the medical system. Health insurance for the elderly poses a major challenge to the allocation of limited medical resources. The Internet of Th... 详细信息
来源: 评论
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with Partial CSI in Smart Factory
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with...
收藏 引用
IEEE Globecom Workshops
作者: Tingnan Bao Haiming Wang Hong-Chuan Yang Wen-Jing Wang Mazen O. Hasna Lenovo Research + Institute Of Computing Technology Chinese Academy of Sciences Beijing China Lenovo Reseach Lenovo Group Limited Bejiing China Department of Electrical and Computer Engineering University of Victoria Victoria Canada Shaanxi Key Laboratory of Information Communication Network and Security XUPT Xi'an China Department of Electrical Engineering Qatar University Doha Qatar
Factory automation applications impose stringent quality of service (QoS) over ultra-reliable and low-latency communication (URLLC) system. However, the existing wireless systems cannot meet the requirement for these ... 详细信息
来源: 评论
IBAQ: Frequency-Domain Backdoor Attack Threatening Autonomous Driving via Quadratic Phase
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Jinghan Qiu Honglong Chen Junjian Li Yudong Gao Junwei Li Xingang Wang College of Control Science and Engineering China University of Petroleum China the Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a... 详细信息
来源: 评论
Research on network security Risk and security Countermeasures of 5G Technology in power System Application
Research on Network Security Risk and Security Countermeasur...
收藏 引用
IEEE Advanced information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Zhenwan Zou Tao Chen Jia Chen Yingsa Hou Ruxia Yang Electric Power Research Institute of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Maintenance company of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Global Energy Interconnection Research Institute Co. Ltd. Nanjing China State Grid Key Laboratory of Information & Network Security Nanjing China
As a key area of new infrastructure, 5G development strategy is constantly clear, and various industries have developed around 5G. However, 5G new services, new architecture, new technologies, and openness of the netw... 详细信息
来源: 评论
An Early Detection Model of Prostate Cancer Based on MRI
An Early Detection Model of Prostate Cancer Based on MRI
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yuankun Liu Lumin Xing Di Wang Xin Nie Xueyan Zhang Di Wu Wenjian Liu Faculty of Data Science City University of Macau China Shandong Provincial Qianfoshan Hospital The First Affiliated Hospital of Shandong First Medical University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Chongqing Jianzhu College Chongqing China School of Information Work Office Shandong Youth University of Political Science Jinan China School of Mathematics Physics and Computing University of Southern Queensland Queensland Australia
Prostate cancer is a prevalent form of cancer among men, with a high rate of occurrence but relatively lower mortality compared to other types of cancer. Early detection is crucial because it allows for earlier interv... 详细信息
来源: 评论
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Shuo Zhao Qiliang Gu Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论
Semantic Relation-Based Cross Attention network for Image-Text Retrieval
Semantic Relation-Based Cross Attention Network for Image-Te...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Huanxiao Zhou Yushui Geng Jing Zhao Xishan Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text retrieval refers to querying the text or image of another modality given an image or text, and its key lies in the ability to accurately measure the similarity between text and image. Most of the existing r... 详细信息
来源: 评论
Semantic information Reasoning and Multi-Step Cross-Modal Interaction network for Image-Text Retrieval
Semantic Information Reasoning and Multi-Step Cross-Modal In...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xishan Ma Yushui Geng Jing Zhao Huanxiao Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text retrieval is a basic cross-modal task, and the basic idea is to learn image-text matching. The key to this task is to accurately measure the similarity between these two modalities. However, most existing m... 详细信息
来源: 评论