咨询与建议

限定检索结果

文献类型

  • 676 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 868 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 430 篇 工学
    • 325 篇 计算机科学与技术...
    • 265 篇 软件工程
    • 144 篇 电气工程
    • 94 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 33 篇 安全科学与工程
    • 28 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 13 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 11 篇 生物医学工程(可授...
    • 10 篇 动力工程及工程热...
  • 162 篇 理学
    • 102 篇 数学
    • 39 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 14 篇 化学
    • 11 篇 系统科学
  • 115 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 92 篇 accuracy
  • 87 篇 feature extracti...
  • 63 篇 federated learni...
  • 58 篇 computational mo...
  • 47 篇 semantics
  • 46 篇 training
  • 45 篇 data models
  • 32 篇 transformers
  • 29 篇 adaptation model...
  • 28 篇 neural networks
  • 28 篇 robustness
  • 25 篇 deep learning
  • 25 篇 privacy
  • 23 篇 visualization
  • 23 篇 attention mechan...
  • 22 篇 real-time system...
  • 21 篇 data mining
  • 21 篇 measurement
  • 20 篇 object detection
  • 19 篇 data privacy

机构

  • 267 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 39 篇 state grid key l...
  • 34 篇 shandong provinc...
  • 28 篇 state grid key l...
  • 27 篇 qilu university ...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 faculty of data ...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...

作者

  • 24 篇 xiaoming wu
  • 18 篇 xiangzhi liu
  • 15 篇 lin peng
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 wei zhang
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 12 篇 wang gang
  • 11 篇 huijuan hao
  • 11 篇 wang changwei
  • 11 篇 zhao dongmei

语言

  • 751 篇 英文
  • 112 篇 其他
  • 9 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=The Key Laboratory of Computing Power Network and Information Security"
868 条 记 录,以下是621-630 订阅
排序:
Sensitive Data Recognition and Filtering Model of Webpage Content Based on Decision Tree Algorithm  2nd
Sensitive Data Recognition and Filtering Model of Webpage Co...
收藏 引用
2nd International Conference on Big Data and security, ICBDS 2020
作者: Ye, Sheng Cheng, Yong Yang, Yonggang Guo, Qian State Grid ZheJiang Electric Power Company Ltd Hangzhou310000 China State Grid ShanXi Electric Power Company Xi’an710000 China Global Energy Interconnection Research Institute Co. Ltd Nanjing210000 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China
In recent years, privacy-protecting data mining has attracted widespread concern because it is necessary to provide protection for the privacy level of sensitive and confidential data from unauthorized attacks. The pu... 详细信息
来源: 评论
Research and Implementation of User Behavior Simulation Technology Based on power Industry Cyber Range  2
Research and Implementation of User Behavior Simulation Tech...
收藏 引用
2nd IEEE International Conference on information Technology, Big Data and Artificial Intelligence, ICIBA 2021
作者: Yang, Huiting Chen, Tao Bai, Yunxiao Li, Feng Li, Mingxuan Yang, Ruxia State Grid Xinjiang Electric Power Research Institute Urumqi China State Grid Xinjiang Electric Power Co. Ltd Urumqi China State Grid Key Laboratory of Information Network Security Nanjing China Global Energy Interconnection Research Institute Co. Ltd. Jiangsu Nanjing China
The current cyber range of the electric power industry has background traffic simulation problems, prospect behavior generation problems, and target simulation diversity problems in large-scale network environments. I... 详细信息
来源: 评论
Research on the security Sharing Model of power Grid Data Based on Federated Learning  5
Research on the Security Sharing Model of Power Grid Data Ba...
收藏 引用
5th IEEE information Technology, networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Yang, Huiting Bai, Yunxiao Zou, Zhenwan Shi, Yuanyuan Yang, Ruxia State Grid Xinjiang Electric Power Research Institute Urumqi China State Grid Kuitun Electric Power Supply Company Kuitun China State Grid Key Laboratory of Information Network Security Nanjing210003 China Global Energy Interconnection Research Institute Co. Ltd. Jiangsu Nanjing210003 China
In order to meet the needs of data availability and practicality in the power grid system to achieve data security and efficient sharing, this paper proposes a power grid data security sharing model based on federated... 详细信息
来源: 评论
YOLO-TP: A process detection model of tunnel real scene based on gradient information interaction
YOLO-TP: A process detection model of tunnel real scene base...
收藏 引用
Computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: Jiaying Fan Shuping Pan Xinbo Jiang Shengtao Zhang Hongliang Liu Chuan Wang Jianghua Li Chenglin Ke Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China China Railway 14th Bureau Group First Engineering Development Co. Ltd RiZhao China
Target detection technology is an effective method to detect tunnel operation safety. Although the field has made some progress in detection models, the lack of datasets and detection models has hindered its developme... 详细信息
来源: 评论
An edge enhancement-based fusion method of infrared and visible images in low light
An edge enhancement-based fusion method of infrared and visi...
收藏 引用
Signal, information and Data Processing (ICSIDP), IEEE International Conference on
作者: Xiang Gao Xiyan Wang Hanbin Bao Qian Li Guohua Lv Faculty of Comupter Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Bresee Technology Co. Ltd. Jinan China Shandong Grain Group Co. Ltd. Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The combination of infrared and visible images can result in the generation of a single image with a high degree of detail and important targets in a variety of scenes, which is beneficial for human recognition. Howev... 详细信息
来源: 评论
Research on the Role-Based Access Control Model and Data security Method  2nd
Research on the Role-Based Access Control Model and Data Sec...
收藏 引用
2nd International Conference on Big Data and security, ICBDS 2020
作者: Deng, Junhua Zhao, Lei Yuan, Xuechong Tang, Zhu Guo, Qian Nanjing210000 China State Grid Beijing Electric Power Co. Ltd Beijing100000 China Global Energy Interconnection Research Institute Co. Ltd Nanjing210000 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
For management of massive data and centralized network, the data security research team has become a central issue. Role-based access control (RBAC) is a common practice to control access to sensitive data. This artic... 详细信息
来源: 评论
Adversarial Attacks on Deep Neural networks for Time Series Prediction  2021
Adversarial Attacks on Deep Neural Networks for Time Series ...
收藏 引用
2021 10th International Conference on Internet computing for Science and Engineering
作者: Aidong Xu Xuechun Wang Yunan Zhang Tao Wu Xingping Xian Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute CSG China School of Computer Science and Technology Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications China
Time series data is widespread in real-world scenarios. To recover and infer missing information in practical domains, such as stock price monitoring, electricity load forecasting, traffic flows analysis, climate tren... 详细信息
来源: 评论
The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modification Algorithm  2nd
The Database Fine-Grained Access SQL Statement Control Model...
收藏 引用
2nd International Conference on Big Data and security, ICBDS 2020
作者: Wei, Ya Cai, Rongyan Zhang, Lan Guo, Qian Zhengzhou450000 China State Grid Fujian Electric Power Company Limited Fuzhou350000 China Global Energy Interconnection Research Institute Co. Ltd. Nanjing210000 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
The SQL query technology which is the standard computer language for the processing of databases, the existing technology cannot guarantee the integrity of all SQL queries. While the fine-grained access control (FGAC)... 详细信息
来源: 评论
An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption  7th
An Authentication Mechanism for IoT Devices Based on Tra...
收藏 引用
7th International Conference on Artificial Intelligence and security, ICAIS 2021
作者: Xia, Fei Mao, Jiaming Shao, Zhipeng Xu, Liangjie Zhao, Ran Yang, Yunzhi State Grid Jiangsu Electric Power Co Ltd. Information and Telecommunication Branch Nanjing210024 China Institute of Information and Communication State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Nanjing Jiangsu210003 China Anhui Jiyuan Software Co. Ltd SGITG Hefei Anhui230088 China
To solve low computing efficiency and high computational energy consumption in the traditional Public-key Infrastructure cryptosystem in the authentication of IoT devices, an authentication scheme for IoT devices base... 详细信息
来源: 评论
Effcient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
Security and Safety
收藏 引用
security and Safety 2022年 第1期1卷 145-165页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua UniversityShanghai 201620China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer ScienceTongji UniversityShanghai 201804China Shanghai Network Financial Security Collaborative Innovation Center Tongji UniversityShanghai 201804China
Nowadays,large numbers of smart sensors(e.g.,road-side cameras)which com-municate with nearby base stations could launch distributed denial of services(DDoS)attack storms in intelligent transportation *** attacks disa... 详细信息
来源: 评论