咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是631-640 订阅
排序:
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial network
收藏 引用
Computer Systems Science & Engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论
Wireless powered Backscatter Communications with Spatially Random Tags
Wireless Powered Backscatter Communications with Spatially R...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Yingting Liu Yinghui Ye Xingwang Li Zhongyu Ma Zhiyang Zhou School of Electronic and Information Engineering Lanzhou Jiaotong University Lanzhou China State Grid Gansu Electric Power Research Institute Lanzhou China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an China School of Physics and Electronic Information Engineering Henan Polytechnic University Jiaozuo China College of Computer Science and Engineering Northwest Normal University Lanzhou China
In this paper, a wireless powered backscatter communication (BackCom) system is considered, which consists of one dedicated radio-frequency source node (S), one destination node and multiple tags randomly located in t...
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
LoCoCa: Location-Context-Capacity Aware Cost Economizing in Edge-Cloud Systems
LoCoCa: Location-Context-Capacity Aware Cost Economizing in ...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yuanze Li Chao Qiu Xiaofei Wang Cheng Zhang Wenyu Wang Shizhan Lan Jing Jiang College of Intelligence and Computing Tianjin University Tianjin China Guangdong Laboratory of Artificial Intelligence and Digital Economy Shenzhen China Institute of Technology Tianjin University of Finance and Economics Tianjin China Shanghai Zhuichu Networking Technologies Co. Ltd. China China Mobile Guangxi institute Co Ltd Guangxi China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China
Nowadays, real-time interactive content services have been the most dazzling sector of next-generation Internet. The high-quality perceptions of virtual scenes have given rise to the strict requirements of high bandwi...
来源: 评论
security risk analysis of on-site terminal of marketing specialty in power industry under the environment of internet of things  12
Security risk analysis of on-site terminal of marketing spec...
收藏 引用
12th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2020
作者: Yang, Ruxia Gao, Peng Gao, Xianzhou Fang, Zhou Global Energy Interconnection Research Institute State Grid Key Laboratory of Information and Network Security Nanjing China State Grid Zhejiang Electric Power Co. Ltd. Zhejiang China
Due to the weak protection of the field terminal equipment and the uncontrollable environment, once it is illegally used, it will directly affect the overall security protection system of the State Grid Corporation. T... 详细信息
来源: 评论
Trust and Risk Based on Access Control Model in Social Internet of Things
收藏 引用
International Journal of network security 2023年 第5期25卷 736-744页
作者: Zhang, Hongbin Liu, Jian Zhao, Dongmei Liu, Bin Wang, Yanmei Fan, Fan School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Scienc and Technology Shijiazhuang050000 China Hebei Geological Worker’s University Shijiazhuang050000 China
Integrating social networks and the Internet of Things has formed an emerging field of Social Internet of Things (IoT). Aiming to address the shortcomings of traditional TBAC (Trust based on Access Control) and ABAC (... 详细信息
来源: 评论
Dimensionality Reduction of Massive I/O Log Data Flow in power System
Dimensionality Reduction of Massive I/O Log Data Flow in Pow...
收藏 引用
2020 International Conference on Communications, information System and Computer Engineering, CISCE 2020
作者: Zhang, Bo Xi, Zesheng Zhang, Tao Ma, Yuanyuan Shao, Zhipeng Li, Hongfa Global Energy Interconnection Research Institute Institute of Information and Communication Nanjing China State Grid Key Laboratory of Information and Network Security Nanjing Jiangsu China State Grid Fujian Electric Power Co. Ltd Information Telecommunication Branch China
Every day, the power system receives massive I/O logs. The amount of data in these logs is so large that it takes huge computational resources to analyze. Therefore, it is necessary to reduce the size of the massive I... 详细信息
来源: 评论
Internet of Things Terminal Access security Based on Zero Trust
Internet of Things Terminal Access Security Based on Zero Tr...
收藏 引用
International Symposium on Computer Science and Intelligent Controls (ISCSIC)
作者: RiXuan Qiu JunFeng Zhang Lu Chen Wei Li Nan Lin State Grid Jiangxi Electric Power Co. Ltd. Information & Telcommunication Branch Nanjing China Grid Digitizing Technology Department State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Ltd Nanjing China State Grid Jiangxi Electric Power Co. Ltd Nanjing China
At present, production and daily life increasingly rely on the Internet of Things, and the network security problem of the Internet of Things is becoming increasingly prominent. Therefore, it is extremely important to... 详细信息
来源: 评论
The Privacy Data Protection Model Based on Random Projection Technology  2nd
The Privacy Data Protection Model Based on Random Projection...
收藏 引用
2nd International Conference on Big Data and security, ICBDS 2020
作者: Shen, Wen Guo, Qian Zhu, Hui Tang, Kejian Zhan, Shaohui Hao, Zhiguo Global Energy Interconnection Research Institute Co. Ltd. Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China State Grid Financial Technology Group Xiongan071000 China State Grid Jiangxi Electric Power Co. Ltd. Nanchang330000 China Xingtai Huancheng Power Supply Branch of State Grid Hebei Electric Power Co. Ltd. Xingtai054000 China
In general, as the technology developed, big data analysis provides opportunities to reduce the implementation time and budget. Compared with traditional methods, big data analysis has a greater advantage. It seeks to... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论