咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是731-740 订阅
排序:
Research on data center topological structure analysis technology based on graph database  3rd
Research on data center topological structure analysis techn...
收藏 引用
3rd International Conference on Intelligent, Interactive Systems and Applications, IISA2018
作者: Zhu, Liang Yang, Mingjie Wang, He Global Energy Interconnection Research Institute Co. Ltd. NanjingJiangsu China State Grid Key Laboratory of Information and Network Security Jiangsu China State Grid Gansu Electric Power Co. Ltd. Gansu China
The data center is the main object of operation and maintenance management. The accurate grasp of all the life cycle of all hardware and software resources and the accurate analysis of the relationship between the ope... 详细信息
来源: 评论
Velocity-Driven Particle Swarm Optimization  19
Velocity-Driven Particle Swarm Optimization
收藏 引用
Proceedings of the 2019 8th International Conference on computing and Pattern Recognition
作者: Wei Li Yaochi Fan Qiaoyong Jiang Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
In-situ data scheduling optimization based on rainbow DQN for IIoT
收藏 引用
Future Generation Computer Systems 2026年 174卷
作者: Peiying Zhang Siyi Li Lizhuang Tan Neeraj Kumar Jian Wang Kai Liu Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala 147004 India Department of Computer Science University of Economics and Human Sciences Warszawa 01-043 Poland Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam 31441 Saudi Arabia College of Science China University of Petroleum (East China) Qingdao 266580 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Space Network and Communications Tsinghua University Beijing 100084 China
In industrial systems, in-situ computing refers to a mode of local or proximate data processing within the cloud–edge-terminal architecture. In the Industrial Internet of Things (IIoT) environment, servers are typica...
来源: 评论
A lithium-ion battery health state assessment and remaining useful life prediction method based on multi slope features
收藏 引用
Journal of Energy Storage 2025年 130卷
作者: Gaige Chen Siqi Zhong Yahong Yang Xiaoshen Zhang Wei Deng Jinsong Liu School of Communications and Information Engineering & School of Artificial Intelligence Xi'an University of Posts and Telecommunications Xi'an Shaanxi 710121 China Shaanxi Union Research Center of University and Enterprise for 5G+ Industrial Internet Communication Terminal Technology Xi'an University of Posts and Telecommunications Xi'an Shaanxi 710121 China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi'an Shaanxi 710121 China State Key Laboratory of Space Power Sources Shanghai Institute of Space Power-sources Shanghai 200245 China Xi'an Aviation Brake Technology Co. Ltd Xi'an Shaanxi 710065 China Contemporary Amperex Technology Co. Ltd. Ningde Fujian 352107 China
In the field of battery management, accurately predicting the remaining useful life (RUL) of lithium-ion batteries is critical to safeguard the safety of batteries and devices. However, current prediction methods are ...
来源: 评论
Online condition monitoring and state of health estimation method for lithium-ion batteries based on time-ratio features
收藏 引用
Sustainable Energy Technologies and Assessments 2025年 79卷
作者: Chen, Gaige Wang, Chenglong Yang, Yahong Zhang, Xiaoshen Deng, Wei Liu, Jinsong School of Communications and Information Engineering & School of Artificial Intelligence Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Union Research Center of University and Enterprise for 5G+ Industrial Internet Communication Terminal Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Shaanxi Xi'an710121 China State Key Laboratory of Space Power Sources Shanghai Institute of Space Power-sources Shanghai200245 China Xi'an Aviation Brake Technology Co. Ltd. Shaanxi Xi'an710065 China Contemporary Amperex Technology Co. Ltd. Fujian Ningde352107 China
Condition monitoring and state of health estimation are crucial for ensuring the secure operation of lithium-ion batteries. To address the difficulty in thoroughly capturing the changes in the state of the partial cha... 详细信息
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
DLEDNet: A deep learning-based image encryption and decryption network for internet of medical things
arXiv
收藏 引用
arXiv 2020年
作者: Ding, Yi Wu, Guozheng Chen, Dajiang Zhang, Ning Gong, Linpeng Cao, Mingsheng Qin, Zhiguang Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu Sichuan610054 China Institute of Electronic and Information Engineering of UESTC in Guangdong Dongwan Guangdong China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu Sichuan610054 China National Natural Science Foundation of China Beijing China Department of Computing Science Texas A&M University-Corpus Christi Corpus ChristiTX78412 United States
With the rapid development of Internet of Medical Things (IoMT) technology, many medical imaging equipments are connected to the medical information network to facilitate the process of diagnosing and treating for doc... 详细信息
来源: 评论
NoViSec: Novel Virtual network Mapping Framework for Secure Software-Defined networking
NoViSec: Novel Virtual Network Mapping Framework for Secure ...
收藏 引用
IEEE Wireless Communications and networking Conference Workshops (WCNCW)
作者: Haotong Cao Yue Hu Shengchen Wu Jianbo Du Feng Tian Gagangeet Singh Aujla Longxiang Yang College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Department of Key Accounts China Mobile Group Jiangsu Co. Ltd. Nanjing China Shanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Computing Newcastle University Newcastle upon Tyne U.K
network softwarization technologies, such as software defined networking (SDN), network virtualization (NV), and network function virtualization (NFV), emerge and have been greatly promoted by their supporters. This s...
来源: 评论
Velocity-driven particle swarm optimization  8
Velocity-driven particle swarm optimization
收藏 引用
8th International Conference on computing and Pattern Recognition, ICCPR 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
Implementation Method Of Remote Assistance Instruction Based On Hardware Secure Encryption
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2136卷
作者: Birong Huang Zhansheng Hou Peng Lin Fei Zhou Zhangjiagang Power Supply Branch of State Grid Jiangsu Electric Power Co. LTD JiangsuChina Global Energy Interconnection Research Institute nanjing Jiangsu China State Grid Key Laboratory Of Information & Network Security Nanjing China
As a public service enterprise related to energy security and national economy and people's livelihood, the safe work is related to all walks of life and thousands of households. In power scenarios, the remote coo...
来源: 评论