咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是671-680 订阅
排序:
power Grid Disaster Loss information Fusion Analysis and Prediction Technology
Power Grid Disaster Loss Information Fusion Analysis and Pre...
收藏 引用
International Conference on Data Science and Business Analytics (ICDSBA)
作者: Min Xu Jianhua Yang Jian Yang Lin Peng Shiyang Tang Nige Li Zhansheng Hou Zhimin He Gang Wang He Wang Xingchuan Bao Hai Yu Liang Zhu Zehao Zhang Jing Li Tianxiong Gu Yang Yang Dailiang Ye Global Energy Interconnection Research Institute Nanjing Jiangsu China State Grid Key Laboratory Of Information & Network Security Nanjing China State Grid ZheJiang Electric Power Co. LTD Zhejiang Hangzhou China
After the natural disaster attacks the power grid, a large number of alarm information will flow into the control center, especially when the power grid has complex faults or the automatic device acts abnormally. Beca... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Graph Convolutional networks  2
Time Series Anomaly Detection Based on Graph Convolutional N...
收藏 引用
2nd International Conference on Applied Machine Learning, ICAML 2020
作者: Hu, Zhiwei Wu, Tao Zhang, Yunan Li, Jintao Jiang, Longsheng Sch. of Commun. and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China Electric Power Research Institute China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China
With the popularization of my country's electric vehicles and the continuous deepening of smart grid upgrades, the electricity consumption data of domestic power grid companies has increased significantly. Due to ... 详细信息
来源: 评论
Final-XGBoost: a Bayesian-tuned machine learning model for quantum key distribution optimization
收藏 引用
Physica Scripta 2025年 第7期100卷 076004-076004页
作者: Qihao Xu Cheng Wu Fuqiang Wang Peng Zhang Xinchao Ruan Jinjing Shi Wei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 People’s Republic of China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan 250014 People’s Republic of China College of Physics and Electronic Information Engineering Zhejiang Normal University Jinhua 321004 People’s Republic of China The School of Electronic Information Central South University Changsha 410083 People’s Republic of China
As the number of users in quantum key distribution (QKD) networks continues to grow, parameter selection (e.g., probability of X-bases, signal state strength, and decoy state levels) has become increasingly complex. T...
来源: 评论
Building A Zero-trust security Protection System in The Environment of The power Internet of Things
Building A Zero-trust Security Protection System in The Envi...
收藏 引用
Artificial Intelligence, networking and information Technology (AINIT), International Seminar on
作者: Rong Zeng Nige Li Xiaoming Zhou Yuanyuan Ma Global Energy Internet Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China State Grid Liaoning electric power supply co. Ltd Shenyang China
With the construction of power information network, the power grid has built a security protection system based on boundary protection. However, with the continuous advancement of the construction of the power Interne... 详细信息
来源: 评论
A Secure Beamforming Design: When Fluid Antenna Meets NOMA
arXiv
收藏 引用
arXiv 2024年
作者: Mai, Lifeng Yao, Junteng Tang, Jie Wu, Tuo Wong, Kai-Kit Shin, Hyundong Adachi, Fumiyuki The Electric Power Research Institute China Southern Power Grid Guangzhou510663 China The Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China The Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo315211 China The School of Electronic and Information Engineering South China University of Technology Guangzhou510006 China The School of Electrical and Electronic Engineering Nanyang Technological University 639798 Singapore The Department of Electronic and Electrical Engineering University College London Torrington Place WC1E 7JE United Kingdom The Department of Electronic Engineering Kyung Hee University Gyeonggi-do Yongin-si17104 Korea Republic of Tohoku University Sendai Japan
This letter proposes a secure beamforming design for downlink non-orthogonal multiple access (NOMA) systems utilizing fluid antenna systems (FAS). We consider a setup where a base station (BS) with M fluid antennas (F... 详细信息
来源: 评论
Research on security hardening technology of container image File configuration for power intelligent IoT Terminal
Research on security hardening technology of container image...
收藏 引用
Sustainable power and Energy Conference (iSPEC)
作者: Guo Zhimin Lv Zhuo Fei Jiaxuan Wang Xiangqun Yaoqi Gui Li Nuannuan Chen Cen state grid henan electric power research institute state grid henan electric power company Henan province China State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute co. Ltd. Nanjing China
With the development of cloud computing, Docker container technology has rapidly gained wide market applications with its advantages of light weight and high performance. Docker has the characteristics of a shared ker... 详细信息
来源: 评论
G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haoxin Xu, Xuemiao Xu, Cheng Zhang, Huaidong Qin, Jing Wang, Yi Heng, Pheng-Ann He, Shengfeng The School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The School of Future Technology South China University of Technology Guangzhou China The School of Computer Science and Network Security Dongguan University of Technology Dongguan China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong The School of Computing and Information Systems Singapore Management University Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Research on Multi-Source Correlation Technology and Economic Analysis Technology Based on New Digital Technology
Research on Multi-Source Correlation Technology and Economic...
收藏 引用
International Conference on Data Science and Business Analytics (ICDSBA)
作者: Gang Wang Aidi Dong Jianhong Pan Global Energy Interconnection Research Institute Co. Ltd Nanjing Jiangsu China State Grid Key Laboratory of Information & Network Security Nanjing China State Grid Jilin Electric Power Co. Ltd Changchun China
Under the dual carbon goal, the power grid company actively promotes the implementation of the "digital transformation" strategy, and improves the power grid resource allocation, intelligent interaction and ... 详细信息
来源: 评论
FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Fangwei Huo, Jiashuai Wang, Wei Zhang, Xi Liu, Yan Tan, Zhiyuan Wang, Changguang Hebei Normal University Key Laboratory of Network and Information Security of Hebei Province College of Computer and Cyber Security Shijiazhuang China Xidian University Hangzhou Institute of Technology Hangzhou China Edinburgh Napier University School of Computing Engineering and the Built Environment EdinburghEH10 5DT United Kingdom
Smart Internet of Things (IoT) devices generate vast, distributed data, and their limited computational and storage capacities complicate data protection. Federated Learning (FL) enables collaborative model training a... 详细信息
来源: 评论
Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation
arXiv
收藏 引用
arXiv 2025年
作者: Lu, Ziang Guo, Lei Yu, Xu Cheng, Zhiyong Han, Xiaohui Zhu, Lei Shandong Normal University Shandong Jinan250358 China Shandong Qingdao266580 China Hefei University of Technology Anhui Hefei230009 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Shandong Jinan250014 China Tongji University Shanghai Jinan200092 China
In the evolving landscape of recommender systems, the challenge of effectively conducting privacy-preserving Cross-Domain Recommendation (CDR), especially under strict non-overlapping constraints, has emerged as a key... 详细信息
来源: 评论