咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是701-710 订阅
排序:
Joint optimization via deep reinforcement learning for secure-driven NOMA-UAV networks
收藏 引用
Chinese Journal of Aeronautics 2025年
作者: Danhao DENG Chaowei WANG Lexi XU Fan JIANG Department of Electronic and Communication Engineering North China Electric Power University Baoding 071003 China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing 100876 China Research Institute China United Network Communications Corporation Beijing 100048 China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an 710121 China
Non-Orthogonal Multiple Access (NOMA) assisted Unmanned Aerial Vehicle (UAV) communication is becoming a promising technique for future B5G/6G networks. However, the security of the NOMA-UAV networks remains critical ... 详细信息
来源: 评论
Design of power Grid Cyber security Framework Based on Whole Life Cycle Management
Design of Power Grid Cyber Security Framework Based on Whole...
收藏 引用
作者: Jindong He Dan Wu Zhichao Zhao Qian Guo State Grid Fujian Electric Power Research Institute Global Energy Interconnection Research Institute co.Ltd.State Grid Key Laboratory of Information & Network Security
The whole process security of power information system is the key to make power grid operation safe and stable. Firstly, the concept and characteristics of whole life cycle management(WLCM) are summarized by this pape... 详细信息
来源: 评论
Motion compensation and object detection for neuromorphic camera
Motion compensation and object detection for neuromorphic ca...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yuxin Wan Rong Fei Yu Tang Xueru Bai Guo Xie Aimin Li School of Computer science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Guangzhou Institute Xidian University Guangzhou China School of Automation and Information Engineering Xi’an University of Technology Xi’an China
Compared to conventional cameras, the new type of vision camera-neuromorphic cameras, which can avoid motion blur and have the advantages of high spatiotemporal resolution, high dynamic range, low latency, etc. In thi... 详细信息
来源: 评论
A security scheme for intelligent substation communications considering real-time performance
收藏 引用
Journal of Modern power Systems and Clean Energy 2019年 第4期7卷 948-961页
作者: Jie ZHANG Jun’e LI Xiong CHEN Ming NI Ting WANG Jianbo LUO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China NARI Group Corporation(State Grid Electric Power Research Institute) Nanjing 211106China NARI Technology Co.Ltd. Nanjing 211106China State Key Laboratory of Smart Grid Protection and Control Nanjing 211106China
Tampering,forgery and theft of the measurement and control messages in a smart grid could cause one breakdown in the power ***,no security measures are employed for communications in intelligent *** services in an int... 详细信息
来源: 评论
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with Partial CSI in Smart Factory
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with...
收藏 引用
IEEE Globecom Workshops
作者: Tingnan Bao Haiming Wang Hong-Chuan Yang Wen-Jing Wang Mazen O. Hasna Lenovo Research + Institute Of Computing Technology Chinese Academy of Sciences Beijing China Lenovo Reseach Lenovo Group Limited Bejiing China Department of Electrical and Computer Engineering University of Victoria Victoria Canada Shaanxi Key Laboratory of Information Communication Network and Security XUPT Xi'an China Department of Electrical Engineering Qatar University Doha Qatar
Factory automation applications impose stringent quality of service (QoS) over ultra-reliable and low-latency communication (URLLC) system. However, the existing wireless systems cannot meet the requirement for these ... 详细信息
来源: 评论
A security Reinforcement Model for Edge computing Facilities in 5G power network
A Security Reinforcement Model for Edge Computing Facilities...
收藏 引用
第五届无线通信与应用国际会议
作者: Nige Li Peng Zhou Zhipeng Shao Xiaoxiao Chen Power Grid Digitizing Technology Department State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information and Network Security State Grid Zhejiang Electric Power Corporation Information and Telecommunication Branch
5G network has attracted much attention from the vertical industry since its commercial use. Compared with previous generations of mobile communication technologies, 5G bandwidth, delay and other communication KPI ind... 详细信息
来源: 评论
Research on network security Risk and security Countermeasures of 5G Technology in power System Application
Research on Network Security Risk and Security Countermeasur...
收藏 引用
IEEE Advanced information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Zhenwan Zou Tao Chen Jia Chen Yingsa Hou Ruxia Yang Electric Power Research Institute of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Maintenance company of State Grid Xinjiang Electric Power Co. Ltd. Urumqi China Global Energy Interconnection Research Institute Co. Ltd. Nanjing China State Grid Key Laboratory of Information & Network Security Nanjing China
As a key area of new infrastructure, 5G development strategy is constantly clear, and various industries have developed around 5G. However, 5G new services, new architecture, new technologies, and openness of the netw... 详细信息
来源: 评论
FedMLC: White-box Model Watermarking for Copyright Protection in Federated Learning for IoT Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Chen, Weitong Zhang, Wei Wu, Di Keskinarkaus, Anja Seppanen, Tapio Zhang, Jiale Gao, Longxiang Luan, Tom H. Yangzhou University School of Information Engineering Yangzhou225009 China ToowoombaQLD4350 Australia University of Oulu Physiological Signal Analysis Team Center for Machine Vision and Signal Analysis Oulu90014 Finland University of Southern Queensland SoMPC ToowoombaQLD4350 Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China Xi'an Jiaotong University School of Cyber Science and Engineering Xi'an710049 China
With the widespread application of the Internet of Things (IoT), data processing has gradually migrated to edge devices that are closer to the data source. This shift has significantly improved the ability of real-tim... 详细信息
来源: 评论
Research on Multi-dimensional Sensitivity Economic Evaluation Method of Digital Technology in power Grid Enterprises
Research on Multi-dimensional Sensitivity Economic Evaluatio...
收藏 引用
第五届无线通信与应用国际会议
作者: Liang Zhu Aidi Dong Jianhong Pan Global Energy Interconnection Research Institute Co.Ltd. State Grid Key Laboratory of Information and Network Security State Grid Jilin Electric Power Co. Ltd.
The participation of power grid enterprises is essential to meet the requirements of new energy reform for carbon neutralization. Aiming at the multidimensional sensitivity of power grid enterprises, this paper propos... 详细信息
来源: 评论
security Risk Analysis of On-Site Terminal of Marketing Specialty in power Industry under the Environment of Internet of Things
Security Risk Analysis of On-Site Terminal of Marketing Spec...
收藏 引用
International Conference on Measuring Technology and Mechatronics Automation, ICMTMA
作者: Ruxia Yang Peng Gao Xianzhou Gao Zhou Fang Global Energy Interconnection Research Institute State Grid Key Laboratory of Information & Network Security Nanjing China State Grid Zhejiang Electric Power co. Ltd Zhejiang China
Due to the weak protection of the field terminal equipment and the uncontrollable environment, once it is illegally used, it will directly affect the overall security protection system of the State Grid Corporation. T...
来源: 评论