咨询与建议

限定检索结果

文献类型

  • 637 篇 会议
  • 197 篇 期刊文献

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 440 篇 工学
    • 335 篇 计算机科学与技术...
    • 272 篇 软件工程
    • 148 篇 电气工程
    • 99 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 30 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 162 篇 理学
    • 104 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 53 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 41 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 231 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 27 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 14 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 wang changwei
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xu rongtao
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang

语言

  • 760 篇 英文
  • 69 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
834 条 记 录,以下是201-210 订阅
排序:
A generalized reliability analysis of 3-ary n-cubes
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Zefang Bai Guijuan Wang Meijie Ma School of Mathematics and Statistics Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Research on power grid topology data management technology for multi-Temporality  7
Research on power grid topology data management technology f...
收藏 引用
7th International Conference on Mechatronics and Intelligent Robotics, ICMIR 2023
作者: Pan, Sen Zhou, Aihua Jiang, Jing Qiu, Hongbin Qiao, Junfeng Huang, Xingde State Grid Smart Grid Research Institute Co. LTD Nanjing Jiangsu210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China State Grid Shanghai Municipal Electric Power Company Shanghai200025 China
Aiming at the typical characteristics of constant changes in the power grid topology caused by multiple factors such as large-scale access of distributed power supply and diversified loads, this paper analyzes the sho... 详细信息
来源: 评论
Research on Mass Image Data Storage Method for Data Center  4th
收藏 引用
4th International Conference on 3D Imaging Technologies- Multidimensional Signal Processing and Deep Learning, 3D IT-MSP and DL 2022
作者: Pan, Sen Jiang, Jing Qiu, Hongbin Qiao, Junfeng Xu, Menghan State Grid Smart Grid Research Institute Co. Ltd. Nanjing Jiangsu210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China State Grid Jiangsu Electric Power Co. Ltd. Information and Telecommunication Branch Nanjing China
With the advancement of technology and the development of the electric power business, power enterprises have generated a large amount of image data, which contains rich potential information, and it is urgent to stor... 详细信息
来源: 评论
CGNet: Classification-Guided Multi-Task Interactive network for Hyperspectral and Multispectral Image Fusion
CGNet: Classification-Guided Multi-Task Interactive Network ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Yanlong Xu Yongbiao Gao Guixin Zhao Guotao Wang Xiangcheng Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China Shandong Key Laboratory of Ubiquitous Intelligent Computing China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
The goal of fusing hyperspectral images (HSI) and multispectral images (MSI) is to generate high-resolution hyperspectral images for downstream tasks. However, most existing methods overlook the specific requirements ... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of power Systems Based on Complex networks  9
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Xin Qu, Zhaoyang Yu, Tong Xie, Ming Yu, Fu Ding, Wei Northeast Electric Power University School of Electrical Engineering Jilin132012 China People's Bank of China Qinghai Provincial Branch Xining810000 China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning530023 China China Guizhou Power Grid Co. Ltd. Bijie Power Supply Bureau Bijie551700 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
TSF-Net:Abnormal Video Behavior Detection Framework Based on Two-Stream Appearance Motion Semantic Fusion  23
TSF-Net:Abnormal Video Behavior Detection Framework Based on...
收藏 引用
Proceedings of the 2023 International Conference on information Education and Artificial Intelligence
作者: Bonan Li Rui Cao Xingang Wang Hong Zhang Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China
Video anomalous behavior detection aims to detect rare and random anomalous events, which usually deviate from expectations. Existing detection methods do not consider the appearance semantics and motion semantics of ...
来源: 评论
Lightweight fuzzy testing method based on stake points of power control system
Lightweight fuzzy testing method based on stake points of po...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yiwei Yang Binyuan Yan Chao Hong Lipeng Wei Zhihong Liang Yun Fu Lin Chen Jiaye Tao China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute Guangzhou China Information Centre of Guizhou Power Grid Co. Guiyang China
Cyber threats are extremely frequent, and fuzz testing is an effective method to discover vulnerabilities. Regarding the optimization of fuzz testing cost, firstly, the cost distribution of each module during the fuzz... 详细信息
来源: 评论
Switched Event-Triggering Secondary Frequency Control of power Systems Considering Wind and Solar Stochastics Under Denial of Service Attack
Switched Event-Triggering Secondary Frequency Control of Pow...
收藏 引用
IEEE PES Asia-Pacific power and Energy Engineering Conference (APPEEC)
作者: Chao Hong Yun Fu Lin Chen Jiaye Tao Zhihong Liang Lipeng Wei Yiwei Yang Qiucheng Ban Shutan Wu China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute Guangdong China Information Centre of Guizhou Power Grid Co. Guizhou China
This paper addresses the stochastic nature of wind and photovoltaic power generation, along with the increasing threat of denial of service (DoS) attacks on power systems. To counteract the growing incidence of DoS at... 详细信息
来源: 评论
Enhancing power System Stability Against DoS Attacks Through Hardware-in-the-Loop Simulation
Enhancing Power System Stability Against DoS Attacks Through...
收藏 引用
IEEE PES Asia-Pacific power and Energy Engineering Conference (APPEEC)
作者: Jiaye Tao Zhihong Liang Lipeng Wei Chao Hong Yun Fu Yiwei Yang Zeyuan Zhou Lin Chen Information Centre of Guizhou Power Grid Co. Guizhou China Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute China Southern Power Grid Guangzhou China
This study explores the stability and security of power systems in the face of Denial of Service (DoS) attacks through Hardware-in-the-Loop (HiL) simulation technology. As the application of Distributed Energy Resourc... 详细信息
来源: 评论