咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是571-580 订阅
排序:
Research on Dynamic Analysis Technology of Economic Evaluation of power Grid Digital Technology  3
Research on Dynamic Analysis Technology of Economic Evaluati...
收藏 引用
3rd International Conference on Applied Machine Learning, ICAML 2021
作者: Wang, Gang Dong, Aidi Pan, Jianhong Global Energy Interconnection Research Institute Co. Ltd Jiangsu Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China State Grid Jilin Electric Power Co. Ltd Changchun130021 China
Digitalization plays a more and more important role in the development of power grid. Traditional technical and economic evaluation methods are difficult to meet the needs of Digital Construction Evaluation under the ... 详细信息
来源: 评论
An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature information Supplementation
An Algorithm for Detecting Surface Defects in Industrial Str...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qingyu Xu Jiguo Yu Anming Dong Zihao Shang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Data Intelligence Information Technology Co. Ltd. Jinan China
In the context of Industry 4.0 and the rise of intelligent manufacturing, the quality of industrial products is becoming more and more important. Strip steel surface defect detection, as a key link in industrial produ... 详细信息
来源: 评论
A New Method to Enhance Container with vTPM
A New Method to Enhance Container with vTPM
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Zhang Xiao Jian Zhou Peng Wang Qi Gao Peng Wang Yi Liang State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch Hangzhou China
This paper proposes a new container security enhancement system and method for containers running on 5G edge computing nodes. The system consists of vTPM module, physical TPM, container manager, vTPM manager, MEC cont... 详细信息
来源: 评论
Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge computing  3
Multi-keyword Cipher-text Retrieval Method for Smart Grid Ed...
收藏 引用
2020 3rd International Symposium on power Electronics and Control Engineering, ISPECE 2020
作者: Zhu, Jing Wu, Tao Li, Jintao Liu, Yanbin Jiang, Qixin School of Communication and Information Engineering Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China Electric Power Institute CSG Guangzhou China
With the continuous deepening of China's power grid intelligent upgrading and the rise of edge computing technology, power grid terminals can carry out data storage and intelligent calculation at the edge of the p... 详细信息
来源: 评论
Sequence-to-Sequence Knowledge Graph Completion Based On Gated Attention Unit
Sequence-to-Sequence Knowledge Graph Completion Based On Gat...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Fengge Yi Xiumei Wei Xiaojing Liu Xuesong Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of...
来源: 评论
A JPEG compression-resistant data watermark embedding and detection algorithm  21
A JPEG compression-resistant data watermark embedding and de...
收藏 引用
5th International Conference on Electronic information Technology and Computer Engineering, EITCE 2021
作者: Yu, Pengfei Huang, Xiuli Hu, Bo Zhou, Xiaoming State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Co. Ltd. Nanjing Jiangsu Province China State Grid Liaoning Electric Power Supply Co. Ltd. Shenyang Liaoning Province China
When the image is processed by JPEG compression, the data watermark originally hidden in the image will not be extracted effectively according to resampling and noise addition. This would greatly limit the application... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Haorun Ding Xuesong Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob...
来源: 评论
Rapid Maize Seedling Detection Based on Receptive-Field and Cross-Dimensional information Interaction
Rapid Maize Seedling Detection Based on Receptive-Field and ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Fengqi Hao Shulei Zhu Dexin Ma Xiangjun Dong Hoiio Kong Xia Liu Chunhua Mu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China National Engineering Laboratory of Wheat and Maize/Key Laboratory of Biology and Genetic Improvement of Maize in Northern Yellow-huai River Plain Ministry of Agriculture Maize Research Institute Shandong Academy of Agricultural Sciences Jinan China
The seedling stage is important in the growth and development of maize, and it is also a critical period that affects maize yield and quality. Accurately recognizing this stage of maize is challenging, as current maiz... 详细信息
来源: 评论
Sensitive Data Recognition and Filtering Model of Webpage Content Based on Decision Tree Algorithm  2nd
Sensitive Data Recognition and Filtering Model of Webpage Co...
收藏 引用
2nd International Conference on Big Data and security, ICBDS 2020
作者: Ye, Sheng Cheng, Yong Yang, Yonggang Guo, Qian State Grid ZheJiang Electric Power Company Ltd Hangzhou310000 China State Grid ShanXi Electric Power Company Xi’an710000 China Global Energy Interconnection Research Institute Co. Ltd Nanjing210000 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China
In recent years, privacy-protecting data mining has attracted widespread concern because it is necessary to provide protection for the privacy level of sensitive and confidential data from unauthorized attacks. The pu... 详细信息
来源: 评论
Research and Implementation of User Behavior Simulation Technology Based on power Industry Cyber Range  2
Research and Implementation of User Behavior Simulation Tech...
收藏 引用
2nd IEEE International Conference on information Technology, Big Data and Artificial Intelligence, ICIBA 2021
作者: Yang, Huiting Chen, Tao Bai, Yunxiao Li, Feng Li, Mingxuan Yang, Ruxia State Grid Xinjiang Electric Power Research Institute Urumqi China State Grid Xinjiang Electric Power Co. Ltd Urumqi China State Grid Key Laboratory of Information Network Security Nanjing China Global Energy Interconnection Research Institute Co. Ltd. Jiangsu Nanjing China
The current cyber range of the electric power industry has background traffic simulation problems, prospect behavior generation problems, and target simulation diversity problems in large-scale network environments. I... 详细信息
来源: 评论