咨询与建议

限定检索结果

文献类型

  • 286 篇 会议
  • 24 篇 期刊文献

馆藏范围

  • 310 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 211 篇 工学
    • 160 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 85 篇 电气工程
    • 42 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 30 篇 安全科学与工程
    • 16 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 13 篇 生物工程
    • 11 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 7 篇 仪器科学与技术
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 交通运输工程
    • 4 篇 机械工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 石油与天然气工程
  • 87 篇 理学
    • 48 篇 数学
    • 16 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 生物学
    • 12 篇 化学
    • 12 篇 系统科学
  • 67 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 法学
    • 12 篇 社会学
    • 4 篇 法学
  • 3 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 17 篇 internet of thin...
  • 16 篇 network security
  • 11 篇 access control
  • 11 篇 authentication
  • 10 篇 data models
  • 9 篇 automation
  • 9 篇 security
  • 8 篇 containers
  • 7 篇 power grids
  • 6 篇 conferences
  • 6 篇 data privacy
  • 6 篇 sensitive data
  • 6 篇 analytical model...
  • 6 篇 training
  • 5 篇 data security
  • 5 篇 electric power t...
  • 5 篇 anomaly detectio...
  • 5 篇 computational mo...
  • 5 篇 feature extracti...
  • 4 篇 power systems

机构

  • 69 篇 state grid key l...
  • 44 篇 state grid key l...
  • 25 篇 global energy in...
  • 24 篇 global energy in...
  • 16 篇 global energy in...
  • 12 篇 state grid smart...
  • 11 篇 institute of inf...
  • 10 篇 institute of inf...
  • 10 篇 state grid smart...
  • 10 篇 state grid zheji...
  • 8 篇 state grid corpo...
  • 7 篇 global energy in...
  • 7 篇 state grid key l...
  • 7 篇 state grid key l...
  • 6 篇 state grid key l...
  • 6 篇 state grid smart...
  • 6 篇 state grid beiji...
  • 6 篇 state grid smart...
  • 6 篇 state grid xinji...
  • 6 篇 state grid key l...

作者

  • 22 篇 peng lin
  • 20 篇 lin peng
  • 18 篇 wang gang
  • 16 篇 lu chen
  • 15 篇 xu min
  • 15 篇 chen mu
  • 15 篇 yang ruxia
  • 15 篇 shao zhipeng
  • 14 篇 min xu
  • 13 篇 gang wang
  • 13 篇 wang he
  • 13 篇 yu hai
  • 13 篇 ruxia yang
  • 12 篇 yu pengfei
  • 12 篇 hou zhansheng
  • 12 篇 chen lu
  • 12 篇 mu chen
  • 11 篇 li nige
  • 11 篇 qiao junfeng
  • 11 篇 huang xiuli

语言

  • 309 篇 英文
  • 1 篇 中文
检索条件"机构=State Grid Key Laboratory of Information&Network Security"
310 条 记 录,以下是1-10 订阅
排序:
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Exploring Triple Knowledge Cues for Zero-Shot Human-Object Interaction Detection
Exploring Triple Knowledge Cues for Zero-Shot Human-Object I...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Ni Zhang Qidong Liu Wei Jing Guang Dai Yan Chen Feng Tian Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Lenovo Research Bei Jing China SGIT AI Lab State Grid Corporation of China
Current zero-shot human-object interaction detection methods often follow a two-phase pipeline, which uses a pre-trained detector to detect instances and then adopts CLIP to perform interaction prediction. During the ... 详细信息
来源: 评论
security Vulnerability Assessment of Power IoT based on Business security
Security Vulnerability Assessment of Power IoT based on Busi...
收藏 引用
2020 International Conference on Control, Robotics and Intelligent System, CCRIS 2020
作者: Fei, Jiaxuan Chen, Kai Yao, Qigui Guo, Qian Wang, Xiangqun State Grid Key Laboratory of Information and Network Security China
Power Internet of Things is the application of IoT in smart power grid. Once attacked, it will cause huge losses. Therefore, it is necessary to conduct a security assessment to take defensive measures. However, the tr... 详细信息
来源: 评论
Dynamic Access Control and Authorization System based on Zero-trust architecture
Dynamic Access Control and Authorization System based on Zer...
收藏 引用
2020 International Conference on Control, Robotics and Intelligent System, CCRIS 2020
作者: Yao, Qigui Wang, Qi Zhang, Xiaojian Fei, Jiaxuan State Grid Key Laboratory of Information and Network Security China
With the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats. The traditional security architecture based on bo... 详细信息
来源: 评论
Density-aware and Depth-aware Visual Representation for Zero-Shot Object Counting
Density-aware and Depth-aware Visual Representation for Zero...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Feng Tian Ni Zhang Nian Liu Haonan Miao Guang Dai Mengmeng Wang Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Computer Vision Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi UAE SGIT AI Lab State Grid Corporation of China Zhejiang University of Technology Hang Zhou China
Previous methods often utilize CLIP semantic classifiers with class names for zero-shot object counting. However, they ignore crucial density and depth knowledge for counting tasks. Thus, we propose a density-aware an... 详细信息
来源: 评论
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power information System  2
An Attack Intention Recognition Method Based on Evaluation I...
收藏 引用
2017 IEEE 2nd information Technology, networking, Electronic and Automation Control Conference (ITNEC 2017)
作者: Xiaojuan Guan Yuanyuan Ma Ye Hua State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute
With the increasing scale of the network, the power information system has many characteristics, such as large number of nodes, complicated structure, diverse network protocols and abundant data, which make the networ... 详细信息
来源: 评论
Sensitive Data Comparison Algorithm Based Spatio-temporal Label Distribution Fusion  2
Sensitive Data Comparison Algorithm Based Spatio-temporal La...
收藏 引用
2nd International Conference on Algorithms, High Performance Computing and Artificial Intelligence, AHPCAI 2022
作者: Yu, Pengfei Shi, Congcong State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Security Nanjing China
While the IoT cooperates with big data to deeply reconstruct all walks of life, it also poses more severe challenges to data security. Accurate identification of sensitive data is a prerequisite for data security. Com... 详细信息
来源: 评论
Research on "cloud-Edge-End" security Protection System of Internet of Things Based on National Secret Algorithm  4
Research on "cloud-Edge-End" Security Protection System of I...
收藏 引用
4th IEEE Advanced information Technology, Electronic and Automation Control Conference, IAEAC 2019
作者: Gao, Peng Yang, Ruxia Gao, Xianzhou Global Energy Interconnection Research Institute State Grid Key Laboratory of Information and Network Security China
With the rapid development of Internet of Things applications, Internet of Things technology and applications have become more and more popular, and the perceived risk of sensing layer terminals, transmission and appl... 详细信息
来源: 评论
Research and Implementation of Electric Equipment Connectivity Data Analysis Model Based on Graph Database  1
收藏 引用
4th International Conference on 3D Imaging Technologies- Multidimensional Signal Processing and Deep Learning, 3D IT-MSP and DL 2022
作者: Qiao, Junfeng Peng, Lin Zhou, Aihua Zhu, Lipeng Yang, Pei Pan, Sen State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Ltd Nanjing210014 China
Effective description of electric data resources is an important basis for electric data modeling. With the access of large-scale distributed new energy, electric allocation data resources are more complex and changea... 详细信息
来源: 评论
security situation awareness method of power mobile application based on big data architecture  5
Security situation awareness method of power mobile applicat...
收藏 引用
5th International Conference on Data Science and information Technology, DSIT 2022
作者: Yong, Li Mu, Chen Zaojian, Dai Lu, Chen State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Enstitute Co. Ltd Nanjing210003 China
According to the characteristics of security threats and massive users in power mobile applications, a mobile application security situational awareness method based on big data architecture is proposed. The method us... 详细信息
来源: 评论