咨询与建议

限定检索结果

文献类型

  • 676 篇 会议
  • 189 篇 期刊文献

馆藏范围

  • 865 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 430 篇 工学
    • 325 篇 计算机科学与技术...
    • 265 篇 软件工程
    • 144 篇 电气工程
    • 94 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 33 篇 安全科学与工程
    • 28 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 13 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 11 篇 生物医学工程(可授...
    • 10 篇 动力工程及工程热...
  • 162 篇 理学
    • 102 篇 数学
    • 39 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 14 篇 化学
    • 11 篇 系统科学
  • 115 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 92 篇 accuracy
  • 87 篇 feature extracti...
  • 63 篇 federated learni...
  • 58 篇 computational mo...
  • 47 篇 semantics
  • 46 篇 training
  • 45 篇 data models
  • 32 篇 transformers
  • 29 篇 adaptation model...
  • 28 篇 neural networks
  • 28 篇 robustness
  • 25 篇 deep learning
  • 25 篇 privacy
  • 23 篇 visualization
  • 23 篇 attention mechan...
  • 22 篇 real-time system...
  • 21 篇 data mining
  • 21 篇 measurement
  • 20 篇 object detection
  • 19 篇 data privacy

机构

  • 265 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 39 篇 state grid key l...
  • 33 篇 shandong provinc...
  • 28 篇 state grid key l...
  • 27 篇 qilu university ...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 faculty of data ...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 qilu university ...
  • 13 篇 global energy in...

作者

  • 24 篇 xiaoming wu
  • 18 篇 xiangzhi liu
  • 15 篇 lin peng
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 wei zhang
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 12 篇 wang gang
  • 11 篇 huijuan hao
  • 11 篇 wang changwei
  • 11 篇 zhao dongmei

语言

  • 748 篇 英文
  • 112 篇 其他
  • 9 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
865 条 记 录,以下是641-650 订阅
排序:
Research on security Risk Analysis and Protective Measures of power Internet of Things  5
Research on Security Risk Analysis and Protective Measures o...
收藏 引用
5th IEEE information Technology, networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Zou, Zhenwan Li, Yang Yang, Huiting Shi, Congcong Yang, Ruxia Electric Power Research Institute of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Global Energy Interconnection Research Institute Co. Ltd. Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
With the advancement of the construction of the power Internet of Things, the transformation of network applications to interconnection and data applications to interactive sharing has brought new challenges to power ... 详细信息
来源: 评论
Intelligent decoding method for Ground-penetrating radar based on improved YOLOv5
Intelligent decoding method for Ground-penetrating radar bas...
收藏 引用
Computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: ZeYu Chen YongKang Wang HongLiang Liu Chuan Wang XinBo Jiang Ning Zhang Zhen Huang Lei Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) JiNan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China No.1 Engineering Development Co. Ltd. of China Railway 14Th Bureau Group RiZhao China
Ground-penetrating radar (GPR) is a non-invasive detection technique that effectively gathers information about subsurface materials. In tunneling projects, GPR can provide a fast and accurate forecast of the geologic... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
network security Situational Awareness Model Based on Threat Intelligence  14th
Network Security Situational Awareness Model Based on Threat...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Zhang, Hongbin Yin, Yan Zhao, Dongmei Liu, Bin Gao, Hongbin School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050018 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang05000 China
In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awarene... 详细信息
来源: 评论
Scene text image super-resolution with semantic-aware interaction
收藏 引用
Engineering Applications of Artificial Intelligence 2025年 158卷
作者: Mingle Zhou Wenlong Liu Jin Wan Delong Han Min Li Gang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. China
Scene text image super-resolution aims to enhance the resolution of images containing text in various scenes, which amplifies the prominence of the text and improves its recognizability. Existing methods struggle to a...
来源: 评论
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans
HTtext: A TextCNN-based pre-silicon detection for hardware T...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yi Xu Zhenyi Chen Binhong Huang Ximeng Liu Chen Dong College of Computer and Data Science Fuzhou University Fuzhou China University of South Floride Tampa USA Key Lab of Information Security of Network Systems (Fuzhou University) Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University)
With the advent of the intelligence era, the usage and investment for chips have risen year by year, causing the demand for chip security. Machine learning (ML) analysis has made progress as a pre-silicon hardware Tro... 详细信息
来源: 评论
Research on security Protection Technology of Intelligent Terminal of Electricity Internet of Things  5
Research on Security Protection Technology of Intelligent Te...
收藏 引用
5th IEEE information Technology, networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Zou, Zhenwan Li, Feng Hou, Yingsa Fei, Jiaxuan Yang, Ruxia Electric Power Research Institute of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Maintenance Company of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Global Energy Interconnection Research Institute Co. Ltd. Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
With the rapid development of the electricity Internet of Things, intelligent terminals in the power system are widely interconnected and ubiquitously connected. The intelligent terminals have become the main target a... 详细信息
来源: 评论
The Adaptive Fault-tolerant Routing Based on an Improved Local security information Model of the Exchanged Hypercube
The Adaptive Fault-tolerant Routing Based on an Improved Loc...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yazhi Zhang Chuanwen Luo Guijuan Wang Li Zhang Mengjie Lv Jiguo Yu School of Computer Science and Technology Qilu University of Technology Jinan China School of Information Science and Technology Beijing Forestry University Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China College of Computer Nanjing University of Posts and Telecommunications Nanjing China Big Data Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
With the increasing amount of computation in high-performance computing, the scale of interconnection networks is becoming larger and larger. It is inevitable that processors or links in the network become faulty. The...
来源: 评论
Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-Watermarking
Verifiable Privacy Preservation Scheme for Outsourcing Medi-...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Chuan Zhou Yi Zhou XingHan An Yan Liu Min Wang XiangZhi Liu Tianjin University Tianjin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Environmental Science and Engineering Beijing Forestry University Beijing China Inspur Software Co. Ltd. Jinan China The Party School of cpc Jinan Municipal Committee Jinan China
A novel verifiable privacy preservation scheme for outsourcing medical image to cloud through ROI based crypto-watermarking is proposed in the paper. In the proposed scheme, data owner firstly carries out substitution...
来源: 评论
Research on equipment identification technology of power monitoring system
Research on equipment identification technology of power mon...
收藏 引用
International Conference on Mechanical Engineering, Measurement Control, and Instrumentation 2021
作者: Zhang, Hongjie Wang, Qi Zheng, Tiejun He, Jianwei Yong, Shaohua State Grid Ningxia Electric Power Co. Ltd Yinchuan Ningxia750004 China Global Energy Interconnection Research Institute Co. Ltd Nanjing Jiangsu210003 China State Grid Key Laboratory of Information and Network Security Nanjing Jiangsu210003 China State Grid Zhongwei Electric Power Supply Company Zhongwei Ningxia755000 China
With the rapid development of network technology, a large number of diversified network equipment are applied to the power monitoring system, which not only greatly improves the production efficiency of the power syst... 详细信息
来源: 评论