咨询与建议

限定检索结果

文献类型

  • 529 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 657 篇 工学
    • 474 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 robustness
  • 13 篇 contrastive lear...
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 56 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 932 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1019 条 记 录,以下是1001-1010 订阅
排序:
Improved MILP modeling for automatic security evaluation and application to fox
Improved MILP modeling for automatic security evaluation and...
收藏 引用
作者: Qiao, Kexin Hu, Lei Sun, Siwei Ma, Xiaoshuang Kan, Haibin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences Beijing100049 China Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China
Counting the number of differentially active S-boxes is of great importance in evaluating the security of a block cipher against differential attack. Mouha et al. proposed a technique based on Mixed-Integer Linear Pro... 详细信息
来源: 评论
An Economic Dispatch Model Based on Scenario Tree in Industrial Micro-grid with Wind Power
An Economic Dispatch Model Based on Scenario Tree in Industr...
收藏 引用
第27届中国控制与决策会议
作者: Hao Ding Feng Gao Kun Liu Xiaohong Guan State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Networks Security Xi'an Jiaotong University
Wind power is a kind of clean and renewable energy,and it is of great benefit to utilize it in an industrial *** paper establishes an economic dispatch model of industrial micro-grid with wind power that aims at minim... 详细信息
来源: 评论
Matching a desirable generation pattern for large-scale wind farm with autonomous energy storage control strategy
Matching a desirable generation pattern for large-scale wind...
收藏 引用
IEEE General Meeting Power& Energy Society
作者: Jiaojiao Dong Feng Gao Xiaohong Guan Qiaozhu Zhai Jiang Wu State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xi'an China Ministry of Education Key Lab for Intelligent Networks and Networks Security Xi'an Jiaotong University Xi'an China
The major obstacle toward wind farm integration is power mismatch between wind output and grid desirable generation due to wind uncertainty and negative effect on peak load regulation. Storage can be used as assistanc... 详细信息
来源: 评论
Remotely wiping sensitive data on stolen smartphones  14
Remotely wiping sensitive data on stolen smartphones
收藏 引用
9th ACM Symposium on Information, Computer and Communications security, ASIA CCS 2014
作者: Yu, Xingjie Wang, Zhan Sun, Kun Zhu, Wen Tao Gao, Neng Jing, Jiwu State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Data Assurance and Communication Security Research Center Chinese Academy of Sciences China University of Chinese Academy of Sciences China Center for Secure Information System George Mason University United States
Smartphones are playing an increasingly important role in personal life and carrying massive private data. Unfortunately, once the smartphones are stolen, all the sensitive information, such as contacts, messages, pho... 详细信息
来源: 评论
Self-balancing robust scheduling model for demand response considering electricity load uncertainty in enterprise microgrid
Self-balancing robust scheduling model for demand response c...
收藏 引用
IEEE General Meeting Power& Energy Society
作者: Kun Liu Feng Gao Zhaojie Wang Xiaohong Guan Qiaozhu Zhai Jiang Wu State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xi’ an China Ministry of Education Key Lab for Intelligent Networks and Networks Security Xian Jiaotong University Xi’ an China
In enterprise microgrid such as steel plants, the self-generating output is not equal to the electricity load because of the electricity load uncertainty and the self-generation power plant's limits. In order to d... 详细信息
来源: 评论
Wind power accommodation robust model considering demand response in enterprise microgird
Wind power accommodation robust model considering demand res...
收藏 引用
World Congress on intelligent Control and Automation (WCICA)
作者: Kun Liu Feng Gao Hao Ding Xiaohong Guan Dai Wang State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xi'an Shanxi Province China Ministry of Education Key Lab for Intelligent Networks and Networks Security Xi'an Jiaotong University Xi'an Shanxi Province China
With the development of wind power, how to use wind power fully has become an important research. In this paper, wind power accommodation robust model with security constraints considering demand response is built to ... 详细信息
来源: 评论
Self-power generation scheduling model under uncertainty in Energy Intensive Enterprises
Self-power generation scheduling model under uncertainty in ...
收藏 引用
Chinese Control Conference (CCC)
作者: Liu Kun Feng Gao Zhaojie Wang Haifeng Zhang Xiaohong Guan Qiaozhu Zhai Jiang Wu State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xian China State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University 710049 China Ministry of Education Key Lab For Intelligent Networks and Networks Security Xi'an 710049 China
Scheduling of the self-generation plants is very helpful to both the energy saving and emission reduction for Energy Intensive Enterprises. Uncertainty exists, so how to reduce the cost considering the uncertainty is ... 详细信息
来源: 评论
Self-power generation scheduling model under uncertainty in Energy Intensive Enterprises
Self-power generation scheduling model under uncertainty in ...
收藏 引用
32nd Chinese Control Conference, CCC 2013
作者: Kun, Liu Gao, Feng Wang, Zhaojie Zhang, Haifeng Guan, Xiaohong Zhai, Qiaozhu Wu, Jiang State Key Laboratory for Manufacturing System Engineering Xi'An Jiaotong University Xi'an 710049 China Ministry of Education Key Lab for Intelligent Networks and Networks Security Xi'an 710049 China
Scheduling of the self-generation plants is very helpful to both the energy saving and emission reduction for Energy Intensive Enterprises. Uncertainty exists, so how to reduce the cost considering the uncertainty is ... 详细信息
来源: 评论
TriggerCas: Enabling wireless consrucive collisions
TriggerCas: Enabling wireless consrucive collisions
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Yin Wang Yuan He Dapeng Cheng Yunhao Liu Xiang-yang Li MOE Key Laboratory for Information System Security School of Software TNLIST Tsinghua University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China Key Laboratory of Intelligent Information Processing Universities of Shandong China Department of Computer Science Illinois Institute of Technology USA
Constructive Interference (CI) proposed in the existing work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication ... 详细信息
来源: 评论
Binary particle swarm optimization with multiple evolutionary strategies
收藏 引用
Science China(Information Sciences) 2012年 第11期55卷 2485-2494页
作者: ZHAO Jing1,HAN ChongZhao1 & WEI Bin2 1Ministry of Education key Lab For intelligent Networks and Network security,State key laboratory for Manufacturing systems Engineering,Institute of Integrated Automation,School of Electronics and Information Engineering,Xi'an Jiaotong University,Xi'an 710049,China 2Institute of system Engineering,School of Electronics and Information Engineering,Xi'an Jiaotong University,Xi'an 710049,China 1. Ministry of Education Key Lab For Intelligent Networks and Network Security State Key Laboratory for Manufacturing Systems Engineering Institute of Integrated Automation School of Electronics and Information Engineering Xi’an Jiaotong University Xi’an 710049 China2. Institute of System Engineering School of Electronics and Information Engineering Xi’an Jiaotong University Xi’an 710049 China
This paper introduces a novel variation of binary particle swarm optimization(BPSO) algorithm and a further extension to improve its ***,mimicking the behaviors of some creatures group,multiple evolutionary strategies... 详细信息
来源: 评论