咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是681-690 订阅
排序:
Adaptive Fine-grained Access Control Method in Social Internet of Things
收藏 引用
International Journal of network security 2021年 第1期23卷 42-48页
作者: Zhang, Hongbin Ma, Pengcheng Liu, Bin School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal China School of Economics and Management Hebei University of Science China Technology Research Center of Big Data and Social Computing Hebei University of Science China
Social Internet of Things (SloT), as a new carrier of integration of social and Internet of Things, applies the research results of social networks from different aspects of the Internet of Things. Different types of ... 详细信息
来源: 评论
Research on Monitoring Technology of 5G MEC Virtualization Environment
Research on Monitoring Technology of 5G MEC Virtualization E...
收藏 引用
Sustainable power and Energy Conference (iSPEC)
作者: Xiangqun Wang Jiaxuan Fei Wei Huang Wei Liu Global Energy Interconnection Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China State Grid Jiangsu Electric Power CO. LTD. Research Institute Nanjing China
In view of the security risks in 5G network virtualization environment, this paper describes the security monitoring components of 5G MEC network virtual machine and container environment. By monitoring the host machi... 详细信息
来源: 评论
A cooperative hybrid breeding swarm intelligence algorithm for feature selection
收藏 引用
Pattern Recognition 2026年 169卷
作者: Mengqing Mei Songsong Zhang Zhiwei Ye Mingwei Wang Wen Zhou Jia Yang Jixin Zhang Lingyu Yan Jun Shen School of Computer Science Hubei University of Technology Wuhan 430000 Hubei China Hubei Provincial Key Laboratory of Green Intelligent Computing Power Network Wuhan 430000 Hubei China School of Computing and Information Technology University of Wollongong Wollongong 2500 New South Wales Australia
Feature selection (FS) is critical for reducing dimensionality and enhancing model accuracy but remains challenging in high-dimensional datasets. Metaheuristic algorithms, especially swarm intelligence, are often appl...
来源: 评论
Univariate Forecasting of time series data Based on Seq2Seq Model  20
Univariate Forecasting of time series data Based on Seq2Seq ...
收藏 引用
Proceedings of the 2020 4th International Conference on Electronic information Technology and Computer Engineering
作者: Yanwen Guo Tao Wu Yanbing Liu Yixin Jiang Department of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China Chongqing Engineering Laboratory of Internet and Information Sccurity Chongqing University of Posts and Telecommunications Chongqing China Electric Power Research Institute CSG Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
With the release of country's 2020 new infrastructure projects, the increasing demand for electricity in various projects has further promoted the intelligent upgrade of the power grid. The processing of grid data... 详细信息
来源: 评论
Enhanced Competitive Swarm Optimizer for Multi-task Optimization  2020
Enhanced Competitive Swarm Optimizer for Multi-task Optimiza...
收藏 引用
Proceedings of the 2020 9th International Conference on computing and Pattern Recognition
作者: Wei Li Junqing Yuan Haonan Luo Zhou Lei Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
In the real world, many problems possess the high degree of similarity. Inspired by multifactorial inheritance model, evolutionary multi-task optimization paradigm is proposed to simultaneously solve multiple optimiza... 详细信息
来源: 评论
Performance Analysis for Cooperative Backscatter Communication Systems under Commensal Mode
Performance Analysis for Cooperative Backscatter Communicati...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Yingting Liu Yinghui Ye Jiaxiu Ma Tankun Wu Yongli Zhao State Grid Gansu Electric Power Research Institute Lanzhou China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi'an China School of Information Renmin University of China Beijing China College of Physics and Electronic Engineering Northwest Normal University Lanzhou China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing China
In this letter, a cooperative backscatter communication system is considered, which consists of one primary transmitter, one primary receiver (PR), one backscatter device (BD) and one backscatter receiver. The conside... 详细信息
来源: 评论
Fuzzified Federated Multi-task Unlearning for Efficient and Privacy-Preserving Swarm Consumer Electronics Systems
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Qu, Y. Neil Kong, Xiangjie Shen, Shigen Zhang, Aiqing Gao, Huynh Thi Thanh Binh Longxiang Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250031 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250031 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310023 China Huzhou University School of Information Engineering Huzhou313000 China Anhui Normal University School of Physics and Electronic Information Wuhu China
The proliferation of consumer electronics systems in swarm environments has heightened the need for robust privacy-preserving techniques in federated learning (FL) frameworks. Traditional FL methods, while effective i... 详细信息
来源: 评论
IEdroid:Detecting Malicious Android network Behavior Using Incremental Ensemble of Ensembles
IEdroid:Detecting Malicious Android Network Behavior Using I...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Cong Liu Anli Yan Zhenxiang Chen Haibo Zhang Qiben Yan Lizhi Peng Chuan Zhao Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan China School of Information Science and Engineering University of Jinan China School of Cyberspace Security (School of Cryptology) Hainan University China University of Otago Dunedin New Zealand Michigan State University USA
Malware detection has attracted widespread attention due to the growing malware sophistication. Machine learning based methods have been proposed to find traces of malware by analyzing network traffic. However, networ... 详细信息
来源: 评论
Research and Implementation of User Behavior Simulation Technology Based on power Industry Cyber Range
Research and Implementation of User Behavior Simulation Tech...
收藏 引用
information Technology,Big Data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Huiting Yang Tao Chen Yunxiao Bai Feng Li Mingxuan Li Ruxia Yang State Grid Xinjiang Electric Power Research Institute Urumqi China State Grid Xinjiang Electric Power Co. Ltd Urumqi China State Grid Key Laboratory of Information & Network Security Nanjing China Global Energy Interconnection Research Institute Co. Ltd Nanjing Jiangsu China
The current cyber range of the electric power industry has background traffic simulation problems, prospect behavior generation problems, and target simulation diversity problems in large-scale network environments. I... 详细信息
来源: 评论
Research on Automated Penetration Testing Framework for power Web System Integrating Property information and Expert Experience
Research on Automated Penetration Testing Framework for Powe...
收藏 引用
作者: Zesheng Xi Jie Cui Bo Zhang Institute of Information and Communication Global Energy Interconnection Research Institute State Grid Key Laboratory of Information & Network Security State Grid Tianjin Electric Power Research Institute
Faced with the heterogeneous,intelligent and interconnected massive power web system environment,it is difficult to meet the needs of existing and incremental services in efficiency by mining and verifying vulnerabili... 详细信息
来源: 评论