咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=The Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是441-450 订阅
排序:
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
KA$^{2}$2SE: key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor networks
收藏 引用
IEEE Transactions on Services computing 2024年 第1期18卷 226-238页
作者: Haijiang Wang Jianting Ning Wei Wu Chao Lin Kai Zhang School of Information and Electronic Engineering Zhejiang University of Science and Technology Zhejiang China School of Cyber Science and Engineering Wuhan University Wuhan China Faculty of Data Science City University of Macau Macau China College of Education Sciences Hong Kong University of Science and Technology Guangzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou China College of Computer Science and Technology Shanghai University of Electric Power Shanghai China
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in m... 详细信息
来源: 评论
An Abnormal Login Detection Method Based on Local Outlier Factor and Gaussian Mixture Model
收藏 引用
International Journal of network security 2023年 第2期25卷 297-305页
作者: Guo, Wei He, Yue Chen, He-Xiong Hang, Fei-Lu Li, Yun-Jie Information Center of Yunnan Power Grid Company Limited Yunnan Kunming650034 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu610054 China
Nowadays, various enterprises have gradually begun to provide Internet services for customers. And the security of customer accounts is constantly threatened by various factors, which may result in account password di... 详细信息
来源: 评论
Construction and Application of the SMART Model for Adaptive Industrial Data Collection Based on Knowledge Graphs
Construction and Application of the SMART Model for Adaptive...
收藏 引用
IEEE International Conference on Big Data
作者: Wendan Cheng Zhen Zhang Heng Qian Qiuyue Wang Guanqun Su Lingge Meng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shu Ju (Shandong) Intelligent Technology Co. Ltd. Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Qingniao IIoT Co. Ltd. Jinan China
Industrial data collection is the foundation for implementing enterprise digitization, which is of great significance to the development of intelligent manufacturing. However, Industrial Data Collection Standards (IDC... 详细信息
来源: 评论
Significance-aware Medication Recommendation with Medication Representation Learning
Significance-aware Medication Recommendation with Medication...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yishuo Li Zhufeng Shao Weimin Chen Shoujin Wang Yuehan Du Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Mental Health Center Jinan China Data Science Institute University of Technology Sydney Sydney Australia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The goal of medication recommendation system is to recommend appropriate pharmaceutical interventions based on a patient’s diagnosis. Most of existing approaches often formulate these recommendations use data on diag... 详细信息
来源: 评论
Fusion of Dynamic Hypergraph and Clinical Event for Sequential Diagnosis Prediction
Fusion of Dynamic Hypergraph and Clinical Event for Sequenti...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xin Zhang Xueping Peng Hongjiao Guan Long Zhao Xinxiao Qiao Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Sequential diagnosis prediction (SDP) is a challenging task, aiming to predict patients’ future diagnoses based on their historical medical records. While methods based on graph neural networks (GNNs) have proven suc...
来源: 评论
Wireless powered Backscatter Communications with Spatially Random Tags
Wireless Powered Backscatter Communications with Spatially R...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Liu, Yingting Ye, Yinghui Li, Xingwang Ma, Zhongyu Zhou, Zhiyang Lanzhou Jiaotong University School of Electronic and Information Engineering Lanzhou730070 China State Grid Gansu Electric Power Research Institute Lanzhou730070 China Beijing University of Posts and Telecommunications School of Electronic Engineering Beijing100876 China Xi'an University of Posts & Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454000 China College of Computer Science and Engineering Northwest Normal University Lanzhou730070 China
In this paper, a wireless powered backscatter communication (BackCom) system is considered, which consists of one dedicated radio-frequency source node (S), one destination node and multiple tags randomly located in t... 详细信息
来源: 评论
A Shortest Path Query Approach for Encrypted Graphs Based on Padding Dictionary Structure
A Shortest Path Query Approach for Encrypted Graphs Based on...
收藏 引用
Chinese Automation Congress (CAC)
作者: Ming Yang Kaiyang Zhang Chao Mu Xin Wang Yuanlong Liu Heng Zhang Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Grid Shandong Electric Power Company Jinan China School of Computer Engineering Jiangsu Ocean University Lianyungang China
Hybrid intelligence has emerged as an innovative approach that synergistically combines the strengths of human intelligence and artificial intelligence (AI) to address complex problems. In this paradigm, knowledge gra...
来源: 评论
Traffic Engineering in Dynamic Hybrid Segment Routing networks
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yonghao Yu Yongde Guo Dawei Zhao Kexue Fu Yongwei Tang Qinyuan Wang Faculty of Data Science City University of Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Shandong University Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论