咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是661-670 订阅
排序:
G²Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
收藏 引用
IEEE Transactions on information Forensics and security 2024年 19卷 8773-8785页
作者: Haoxin Yang Xuemiao Xu Cheng Xu Huaidong Zhang Jing Qin Yi Wang Pheng-Ann Heng Shengfeng He School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science Guangzhou China Centre for Smart Health The Hong Kong Polytechnic University Hong Kong China School of Future Technology South China University of Technology Guangzhou China School of Computer Science and Network Security Dongguan University of Technology Dongguan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong SAR China School of Computing and Information Systems Singapore Management University Victoria St Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Double JPEG Compression Detection Based on Markov Model  18th
Double JPEG Compression Detection Based on Markov Model
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yung-Qing Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images ... 详细信息
来源: 评论
Research on the damage class prediction method in typhoon disaster for power system  3
Research on the damage class prediction method in typhoon di...
收藏 引用
3rd IEEE International Conference on information Systems and Computer Aided Education, ICISCAE 2020
作者: Tang, Shiyang Xu, Xiyuan Yang, Yang Yu, Zhen Liu, Zhuguang Guan, Cheng State Grid Key Laboratory of Information Network Security Global Energy Interconnection Research Institute Co. Ltd Beijing China State Grid Zhejiang Electric Power Co. Ltd Hangzhou China State Grid Wenzhou Electric Power Company Wenzhou China
power system is one of the most fundamental infrastructure systems for human society. The stability of power system greatly affects the economy and security of the city. Therefore, recovering the power system in citie... 详细信息
来源: 评论
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm
LBBESA: An efficient software-defined networking load-balanc...
收藏 引用
作者: Li, Qiliang Cui, Jie Zhong, Hong Du, Yichao Luo, Yonglong Liu, Lu School of Computer Science and Technology Anhui University Hefei China Anhui Provincial Key Laboratory of Network and Information Security Wuhu China School of Electronics Computing and Mathematics University of Derby DerbyDE22 1GB United Kingdom
Elevator scheduling algorithms generally denote methods used to calculate how to use the elevator. These algorithms can distribute elevators to various floors of a building, thereby achieving efficient transportation.... 详细信息
来源: 评论
Research on 3D Scene Dynamic Scanning Modeling Technology of Substation Based on Depth Vision  1
收藏 引用
Annual International Conference on 3D Imaging Technology, IC3DIT 2019
作者: Hai, Yu Min, Xu Lin, Peng Wei, Liu Rong, Sun Jian, Shao Gang, Wang Global Energy Interconnection Research Institute Co. Ltd Nanjing Jiangsu210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China Electric Power Research Institute of State Grid Jiangsu Electric Power Company Nanjing Jiangsu210003 China
State Grid’s intelligent transportation inspection system has taken "self and environmental awareness" as one of its core functions. Among them, environmental modeling and intelligent reconfiguration are th... 详细信息
来源: 评论
A BCS-GDE Multi-objective Optimization Algorithm for Combined Cooling, Heating and power Model with Decision Strategies
arXiv
收藏 引用
arXiv 2022年
作者: Sun, Jiaze Deng, Jiahui Li, Yang Han, Nan School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi 'an Key Laboratory of Big Data and Intelligent Computing Xi’an710127 China School of Information Science and Technology Northwest University Xi’an710127 China School of Electrical Engineering Northeast Electric Power University Jilin132012 China
District energy systems can not only reduce energy consumption but also set energy supply dispatching schemes according to demand. In addition to economic cost, energy consumption and pollutant are more worthy of atte... 详细信息
来源: 评论
Computational strategy of dynamic nanorod networks for dielectric elastomer nanocomposites towards the balance of high permittivity, low modulus, and high breakdown strength
收藏 引用
Polymer 2025年
作者: Han Qin Yancong Feng Tao Liu Baofeng Gao Ying Guo Jingshan Pan Ming Tian Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250000 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan 250000 China Guangdong Provincial Key Laboratory of Optical Information Materials and Technology & Institute of Electronic Paper Displays South China Academy of Advanced Optoelectronics South China Normal University Guangzhou 510006 China State Key Laboratory of Organic-Inorganic Composites College of Materials Science and Engineering Beijing University of Chemical Technology Beijing 100029 China
Dielectric elastomers exhibit immense potential in emerging fields such as soft robotics, flexible sensors, wearable electronic devices, and energy harvesting, but their widespread application is limited by the intric...
来源: 评论
Focus on Local: Finding Reliable Discriminative Regions for Visual Place Recognition
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Changwei Chen, Shunpeng Song, Yukun Xu, Rongtao Zhang, Zherui Zhang, Jiguang Yang, Haoran Zhang, Yu Fu, Kexue Du, Shide Xu, Zhiwei Gao, Longxiang Guo, Li Xu, Shibiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China School of Artificial Intelligence Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China MAIS Institute of Automation Chinese Academy of Sciences China Tongji University China College of Computer and Data Science Fuzhou University China Shandong University China
Visual Place Recognition (VPR) is aimed at predicting the location of a query image by referencing a database of geotagged images. For VPR task, often fewer discriminative local regions in an image produce important e... 详细信息
来源: 评论
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain
Non-aligned double JPEG compression detection based on refin...
收藏 引用
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yun-Qing Jha, Sunil Kr. School of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu China Nanjing University of Information Science and Technology Nanjing China Shanxi Key Laboratory of Network and System Security Xidian University Shanxi China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China New Jersey Institute of Technology NewarkNJ United States
Due to the widespread use of the JPEG format, non-aligned double JPEG (NA-DJPEG) compression is very common in image tampering. Therefore, non-aligned double JPEG compression detection has attracted significant attent... 详细信息
来源: 评论
Univariate Forecasting of time series data Based on Seq2Seq Model  4
Univariate Forecasting of time series data Based on Seq2Seq ...
收藏 引用
4th International Conference on Electronic information Technology and Computer Engineering, EITCE 2020
作者: Guo, Yanwen Wu, Tao Liu, Yanbing Jiang, Yixin Department of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China Chongqing Engineering Laboratory of Internet and Information Sccurity Chongqing University of Posts and Telecommunications Chongqing China Electric Power Research Institute Csg Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
With the release of country's 2020 new infrastructure projects, the increasing demand for electricity in various projects has further promoted the intelligent upgrade of the power grid. The processing of grid data... 详细信息
来源: 评论