咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是711-720 订阅
排序:
Dimensionality Reduction of Massive I/O Log Data Flow in power System
Dimensionality Reduction of Massive I/O Log Data Flow in Pow...
收藏 引用
International Conference on Communications, information System and Computer Engineering (CISCE)
作者: Bo Zhang Zesheng Xi Tao Zhang Yuanyuan Ma Zhipeng Shao Hongfa Li Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing China State Grid Key Laboratory of Information & Network Security Nanjing China Information & Telecommunication Branch State Grid Fujian Electric Power Co. Ltd
Every day, the power system receives massive I/O logs. The amount of data in these logs is so large that it takes huge computational resources to analyze. Therefore, it is necessary to reduce the size of the massive I... 详细信息
来源: 评论
Intelligent scenario computing workflow fusion design technology for power mobile operations  3rd
Intelligent scenario computing workflow fusion design techno...
收藏 引用
3rd International Conference on Intelligent, Interactive Systems and Applications, IISA2018
作者: Wu, Haoran Xu, Min Wang, Xiao-Ling Zhu, Jun Huang, Xueling Peng, Lin Bao, Xingchuan State Grid Wuxi Power Supply Company Sheng China Global Energy Interconnection Research Institute Beijing China State Grid Key Laboratory of Information and Network Security Beijing China
The purpose of electric power enterprise management is to improve the efficiency and competitiveness of enterprises. For this purpose, advanced information management systems are needed to assist enterprise management... 详细信息
来源: 评论
Credible Identity Authentication Mechanism of Electric Internet of Things Based on Blockchain
Credible Identity Authentication Mechanism of Electric Inter...
收藏 引用
作者: Liming Wang Xiuli Huang Lei Chen Jie Fan Ming Zhang State Grid Jiangsu Electric Power Co. Ltd. State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co. Ltd.
In order to solve the problems of low authentication efficiency and easy tampering of authentication data in the electric IoT system, this paper proposes the electric IoT based on blockchain. First, the authentication... 详细信息
来源: 评论
Trusted Identity Cross-Domain Dynamic Authorization Mechanism Based on Master-Slave Chain
Trusted Identity Cross-Domain Dynamic Authorization Mechanis...
收藏 引用
作者: Xiuli Huang Qian Guo Qigui Yao Xuesong Huo State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co. Ltd. State Grid Jiangsu Electric Power Co. Ltd.
In order to solve the security problems existing when power users access power services in different domains, this paper proposes a dynamic authorization model for power users based on master-slave chain. In this mode... 详细信息
来源: 评论
A Light-weight Kernel-level Mandatory Access Control Framework for Android
A Light-weight Kernel-level Mandatory Access Control Framewo...
收藏 引用
2019 IEEE International Conference on power, Intelligent computing and Systems, ICPICS 2019
作者: Wu, Fei Luo, Fucai Chen, Kuosong Lin, Wei Lu, Ziang State Grid Fujian Electric Power Company Fuzhou Fujian China Fujian Yirong Information Technology Co. Ltd Fuzhou Fujian China State Grid Key Laboratory of Information Network Security Nanjing Jiangsu China
With the rapid development of mobile communication technology and mobile Internet technology, mobile terminals are becoming more and more irreplaceable in people's life and work. In the present power industry, And... 详细信息
来源: 评论
Research on Electric power Business Terminal Classification Technology based on Unsupervised Algorithms
Research on Electric Power Business Terminal Classification ...
收藏 引用
International Conference on Smart Grid and Electrical Automation (ICSGEA)
作者: Xianzhou Gao Ruxia Yang Peng Gao Lei Chen Zhou Fang State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Nanjing Jiangsu 21000 China State Grid Zhejiang Electirc Power co. Ltd Zhejiang China
Electric power Business terminal has many characteristics, such as openness, heterogeneity and diversity. It has become an important entry point for network attacks. In order to effectively realize the security contro... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Graph Convolutional networks
Time Series Anomaly Detection Based on Graph Convolutional N...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Zhiwei Hu Tao Wu Yunan Zhang Jintao Li Longsheng Jiang School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute China Southern Power Grid Guangzhou China
With the popularization of my country's electric vehicles and the continuous deepening of smart grid upgrades, the electricity consumption data of domestic power grid companies has increased significantly. Due to ... 详细信息
来源: 评论
security Vulnerability Assessment of power IoT based on Business security
Security Vulnerability Assessment of Power IoT based on Busi...
收藏 引用
作者: Jiaxuan Fei Kai Chen Qigui Yao Qian Guo Xiangqun Wang State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co.Ltd. State Grid Hebei Information &Telecommunication Branch State Grid Hebei Electric Power Co.Ltd.
power Internet of Things is the application of IoT in smart power *** attacked,it will cause huge ***,it is necessary to conduct a security assessment to take defensive ***,the traditional vulnerability assessment met... 详细信息
来源: 评论
Research on Mimic Defence Technology for Smart Unit Application Environment of power Grid  3
Research on Mimic Defence Technology for Smart Unit Applicat...
收藏 引用
2019 3rd International Conference on Electrical, Mechanical and Computer Engineering, ICEMCE 2019
作者: Xi, Zesheng Zhang, Bo Sun, Xin Guan, Xiaojuan Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing Jiangsu China State Grid Key Laboratory of Information and Network Security Nanjing Jiangsu China State Grid Zhejiang Electric Power Research Institute Hangzhou Zhejiang China
Aiming at the problem that the new network attack cannot be effectively defended at present, this paper proposes a framework of application-level mimic defense technology for smart grid units to solve the active attac... 详细信息
来源: 评论
Research on Indoor and Outdoor Comprehensive Positioning Technology Based on Multi-Source information Assistance
收藏 引用
Procedia Computer Science 2020年 166卷 361-365页
作者: Zhi Min He Lin Peng Hai Yun Han Hao Lu Zhi Feng Wang Peng Zhao Global Energy Interconnection Research Institute Co. Ltd Nanri Road 8 Nanjing 210003 China State Grid Key Laboratory of Information & Network Security Beiqijia Beijing 100000 China State Grid Shaanxi Electric Power Company Information and Communication Corporation Xi’an 710048 China
:After investigation and analysis, this study involves a multi-source information-assisted indoor and outdoor integrated positioning system and method based on point cloud identification and power equipment identifica... 详细信息
来源: 评论