咨询与建议

限定检索结果

文献类型

  • 628 篇 会议
  • 180 篇 期刊文献

馆藏范围

  • 808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 143 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
  • 157 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 224 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 769 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=The Key Laboratory of Computing Power Network and Information Security"
808 条 记 录,以下是151-160 订阅
排序:
Research and Application of Speech Transmission Index in Acoustic Leakage Detection
Research and Application of Speech Transmission Index in Aco...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qiuyun Hao FuQiang Wang Peng Zhang XiaoFeng Ma Jianqiang Zhang Wei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
A Blockchain-Based Hierarchical Dynamic Collaborative Storage Model
A Blockchain-Based Hierarchical Dynamic Collaborative Storag...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qile Yuan Xiangzhi Liu Yu Wang Yunfeng Dong Haoyu Jia Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The pervasive application of blockchain technology has led to a significant increase in data volume, presenting significant challenges to existing storage architectures in environments characterized by large volumes o... 详细信息
来源: 评论
SGNet: A Multi-Scale Method for Steel Surface Defect Detection
SGNet: A Multi-Scale Method for Steel Surface Defect Detecti...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The large variation in target scales within steel surface defect images often results in low detection accuracy. To address this issue, we have developed a multi-scale defect detection method named SGNet. Initially, w... 详细信息
来源: 评论
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction
Infringement Detection and Traceability Scheme Based on Ciph...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Lianhai Wang Xinlei Wang Tianrui Liu Yingxiaochun Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl... 详细信息
来源: 评论
SRv6-INT Enabled network Monitoring and Measurement: Toward High-Yield network Observability for Digital Twin  3rd
SRv6-INT Enabled Network Monitoring and Measurement: Toward...
收藏 引用
3rd International Conference on Machine Learning, Cloud computing and Intelligent Mining, MLCCIM 2024
作者: Zhang, Xu Feng, Chuan Han, Pengchao Liu, Wei Gong, Xiaoxue Zhang, Qiupei Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China School of Information Engineering Guangdong University of Technology Guangzhou510006 China
network monitoring and measurement is an important part of realizing the network digital twin. However, it introduces the problem of high cost when obtaining the status data of physical networks. Therefore, to efficie... 详细信息
来源: 评论
Research and implementation of grid based on electric distribution network composite evaluation method  6
Research and implementation of grid based on electric distri...
收藏 引用
6th International Conference on Intelligent computing, Communication, and Devices, ICCD 2023
作者: Qiao, Junfeng Yang, Pei Pan, Sen Shen, Xiaofeng Huang, Xingde Huang, Chenhong Gu, Hua State Grid Key Laboratory of Information and Network Security State Grid Smart Grid Research Institute Co.LTD. Jiangsu Nanjing210003 China Qingpu Power Supply Company State Grid Shanghai Electric Power Company Shanghai201799 China
As an important guide for grid development and a key link of grid construction, distribution network planning should not only adapt to the trend of intelligence and refinement in grid development and construction, but... 详细信息
来源: 评论
Research on optimal scheduling decision method of mobile emergency power supply vehicle under emergency condition
Research on optimal scheduling decision method of mobile eme...
收藏 引用
IEEE Conference on Energy Internet and Energy System Integration (EI2)
作者: Zehao Zhang Jie Feng Cheng Guan Zeyu Liu Yiran Yan Xiyuan Xu State Grid Key Laboratory of Information & Network Security China Electric Power Research Institute Co. Ltd Beijing China
In the current power grid emergency repair process, there is often a situation in which the mobile emergency power supply vehicles of different power supply units in a region "fight for themselves", resultin... 详细信息
来源: 评论
Memory-guided two-stream spatio-temporal coding network based for video anomaly detection  23
Memory-guided two-stream spatio-temporal coding network base...
收藏 引用
Proceedings of the 2023 International Conference on information Education and Artificial Intelligence
作者: Bonan Li Hong Zhang Xingang Wang Rui Cao Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) China
In the paper, we propose a memory-guided dual-stream spatio-temporal encoder network (MSTAE) based on the U-Net network as the backbone, the spatial stream uses the time displacement module to obtain the spatial featu...
来源: 评论
A research framework for constructing the knowledge database of public security information
收藏 引用
International Journal of Wireless and Mobile computing 2021年 第3期21卷 191-197页
作者: Zhong, Han Zhang, Shiqiang Liu, Jianli College of Information Technology and Network Security People’s Public Security University of China Xicheng Beijing China Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China
At present, the public security organs in China have accumulated a great deal of public security data. These data have broad sources, complex structures, large and increasing scales. How to effectively integrate, mana... 详细信息
来源: 评论
Research on Static Reverse Analysis Technology for security Detection of power Industrial Control Software  3
Research on Static Reverse Analysis Technology for Security ...
收藏 引用
3rd International Conference on Intelligent power and Systems, ICIPS 2023
作者: Chen, Jinshan Yu, Sihang Xie, Xuanxuan Cheng, Yu Tang, Zhijun Deng, Chaoping Li, June State Grid Fujian Electric Power Research Institute Fujian Fuzhou350000 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430072 China
In the power industrial control software, defects of software and possible pre-implanted backdoors and malicious codes are important factors that threaten the security of the power industrial control system. The compl... 详细信息
来源: 评论