咨询与建议

限定检索结果

文献类型

  • 637 篇 会议
  • 197 篇 期刊文献

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 440 篇 工学
    • 335 篇 计算机科学与技术...
    • 272 篇 软件工程
    • 148 篇 电气工程
    • 99 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 30 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 162 篇 理学
    • 104 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 53 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 41 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 231 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 27 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 14 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 wang changwei
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xu rongtao
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang

语言

  • 760 篇 英文
  • 69 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
834 条 记 录,以下是331-340 订阅
排序:
Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment: Advancing Big Data Intelligence in Control Systems
收藏 引用
Computers, Materials and Continua 2025年 第3期83卷 4393-4409页
作者: Peiying Zhang Yihong Yu Jing Liu Chong Lv Lizhuang Tan Yulin Zhang Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Library of Shanghai Lixin University of Accounting and Finance Shanghai 201209 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan 250014 China Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance of MOE Minzu University of China Beijing 100081 China Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPU Taicang 215400 China Key Laboratory of Education Informatization for Nationalities (Yunnan Normal University) Ministry of Education Kunming 650092 China
As Internet of Things (IoT) technologies continue to evolve at an unprecedented pace, intelligent big data control and information systems have become critical enablers for organizational digital transformation, facil... 详细信息
来源: 评论
The Adaptive Fault-tolerant Routing Based on an Improved Local security information Model of the Exchanged Hypercube  21
The Adaptive Fault-tolerant Routing Based on an Improved Loc...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud computing, 16th IEEE International Conference on Social computing and networking and 13th International Conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhang, Yazhi Luo, Chuanwen Wang, Guijuan Zhang, Li Lv, Mengjie Yu, Jiguo Qilu University of Technology School of Computer Science and Technology Jinan China Beijing Forestry University School of Information Science and Technology Beijing China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Nanjing University of Posts and Telecommunications College of Computer Nanjing China Qilu University of Technology Shandong Academy of Sciences Big Data Research Institute Jinan China
With the increasing amount of computation in high-performance computing, the scale of interconnection networks is becoming larger and larger. It is inevitable that processors or links in the network become faulty. The... 详细信息
来源: 评论
Research on the Application of Digital Signature in University Electronic Government System
Research on the Application of Digital Signature in Universi...
收藏 引用
International Conference on Computer network, Electronic and Automation (ICCNEA)
作者: Tianma Wang Dongmei Zhao Jianjun Qi International Education Institute North China Electric Power University Beijing China College of Computer and Cyber Security Hebei Normal University Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
This article analyzes the principles and processes of digital signature technology, as well as its application methods in the university e-government system. On the one hand, it meets the business management needs of ...
来源: 评论
Multi-Feature Fusion Identity Generation Method for Fixed Location 5G Terminal Devices  5
Multi-Feature Fusion Identity Generation Method for Fixed Lo...
收藏 引用
5th International Conference on information Technologies and Electrical Engineering, ICITEE 2022
作者: Shao, Zhipeng Wang, Chen Guo, Yaqiong Xu, Junbo Liu, Ruolin State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information & Network Security Jiangsu Nanjing China State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch Zhejiang Hangzhou China
While 5G is developing rapidly, it also faces greater security threats, and achieving reliable terminal identification is a prerequisite for ensuring 5G network security. For the identity reliability problems of the a... 详细信息
来源: 评论
DFMC:Feature-Driven Data-Free Knowledge Distillation
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Zhang, Zherui Xu, Rongtao Wang, Changwei Xu, Wenhao Chen, Shunpeng Xu, Shibiao Xu, Guangyuan Guo, Li Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Data-Free Knowledge Distillation (DFKD) enables knowledge transfer from teacher networks without access to the real dataset. However, generator-based DFKD methods often suffer from insufficient diversity or low-confid... 详细信息
来源: 评论
A Brief Survey on Privacy-Preserving Methods for Graph-Structured Data
A Brief Survey on Privacy-Preserving Methods for Graph-Struc...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
作者: Zhang, Yunan Wu, Tao Xian, Xingping Xu, Yuqing Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
As one of the main manifestations of big data, graph-structured data widely exists in various fields such as social networks, smart cities, medical health, and finance, and is characterized by high dimension, nonlinea... 详细信息
来源: 评论
Design and development of smart terminal self-sensing module  5
Design and development of smart terminal self-sensing module
收藏 引用
5th IEEE International Electrical and Energy Conference, CIEEC 2022
作者: Qigui, Yao Xiangqun, Wang Xiaojian, Zhang Zhuo, Lv Mingyan, Li Zheng, Zhang Interconnection Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Global Energy Nanjing branch Jiangsu Province China State Grid Henan Electric Power Research Institute State Grid Henan Electric Power Company Henan Province China
In recent years, with the rapid development of the Internet of Things, the scalability and efficiency of the Internet are not enough to process the big data of the Internet of Things. The edge agent platform tilts the... 详细信息
来源: 评论
Focus on Local: Finding Reliable Discriminative Regions for Visual Place Recognition  39
Focus on Local: Finding Reliable Discriminative Regions for ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Changwei Chen, Shunpeng Song, Yukun Xu, Rongtao Zhang, Zherui Zhang, Jiguang Yang, Haoran Zhang, Yu Fu, Kexue Du, Shide Xu, Zhiwei Gao, Longxiang Guo, Li Xu, Shibiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) China School of Artificial Intelligence Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China MAIS Institute of Automation Chinese Academy of Sciences China Tongji University China College of Computer and Data Science Fuzhou University China Shandong University China
Visual Place Recognition (VPR) is aimed at predicting the location of a query image by referencing a database of geotagged images. For VPR task, often fewer discriminative local regions in an image produce important e...
来源: 评论
Lightweight network Intrusion Detection Method Based on Improved Federated Learning
Lightweight Network Intrusion Detection Method Based on Impr...
收藏 引用
2022 International Conference on Computer, Artificial Intelligence, and Control Engineering, CAICE 2022
作者: He, Yang Jia, Yongliang Tao, Peng State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co.Ltd Nanjing Branch Nanjing210003 China State Grid Hebei Electric Power Company Marketing Center Hebei Shijiazhuang050000 China
Computer network has been widely used in all walks of life, network security has also received unprecedented attention, network intrusion detection technology is one of the key technologies to maintain network securit... 详细信息
来源: 评论
SFTA: Spiking Neural networks Vulnerable to Spiking Feature Transferable Attack
SFTA: Spiking Neural Networks Vulnerable to Spiking Feature ...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Xuanwei Lin Chen Dong Ximeng Liu College of Computer and Data Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University) Key Lab of Information Security of Network Systems (Fuzhou University)
Many recent works have shown that spiking neural networks (SNNs) are vulnerable to well-crafted adversarial attacks in the white-box setting, which may lead to misclassification of the trained model. However, the info... 详细信息
来源: 评论