咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 192 篇 期刊文献

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 328 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 148 篇 电气工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 163 篇 理学
    • 103 篇 数学
    • 40 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 17 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo

语言

  • 758 篇 英文
  • 64 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
827 条 记 录,以下是761-770 订阅
排序:
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs  3
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and information Technology, DMCIT 2019
作者: Wang, Zhixiao Yan, Wenyao Wang, Wendong Gao, Ang Yu, Lei Yang, Shaobo Nie, GaoYang School of Computer Science and Engineering Xi'an University of Technology Xi'an710048 China Telematics Group University of Goettingen Goettingen37077 Germany Shaanxi Key Laboratory of Network Computing and Security Xi'an710048 China School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an710048 China College of Xi'an Innovation Yan'an University Xi'an710100 China Yan'an University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in... 详细信息
来源: 评论
Video rain/snow removal by transformed online multiscale convolutional sparse coding
arXiv
收藏 引用
arXiv 2019年
作者: Li, Minghan Cao, Xiangyong Zhao, Qian Zhang, Lei Gao, Chenqiang Meng, Deyu School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi China Department of Computing Hong Kong Polytechnic University Hung Hom Hong Kong Chongqing Key Laboratory of Signal and Information Processing Chongqing University of Posts and Telecommunications Chongqing400065 China
Video rain/snow removal from surveillance videos is an important task in the computer vision community since rain/snow existed in videos can severely degenerate the performance of many surveillance system. Various met... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and information Technology (DMCIT 2019)
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology Telematics Group the University of Goettingen Shaanxi Key Laboratory of Network Computing and Security School of Electronic and Information Engineering Xi'an Jiaotong University College of Xi'an Innovation Yan'an University Yan'an University National Satellite Meteorological Center China Meteorological Administration
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** ...
来源: 评论
Research on Electric Micro-Meteorological Monitoring and Early Warning System
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1449卷
作者: Zhang, Zehao Yu, Zhen Xu, Xiyuan Cheng, Guan Zhang, Song Global Energy Interconnection Research Institute co. Ltd Research Institute of Information Technology & Communication Beijing 102206 China. State Grid Key Laboratory of Information & Network Security State Grid FuJian Electric Power co. LTD
This paper studies and analyzes the influence of micro-meteorological disasters on power system, points out the main problems in the establishment of power micro-meteorological monitoring and early warning system, put...
来源: 评论
Efficient attribute-based encryption with blackbox traceability  12th
Efficient attribute-based encryption with blackbox traceabil...
收藏 引用
12th International Conference on Provable security, ProvSec 2018
作者: Xu, Shengmin Yang, Guomin Mu, Yi Liu, Ximeng Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia School of Information Systems Singapore Management University Singapore Singapore College of Mathematics and Computer Science Fuzhou University FuzhouFujian China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability w... 详细信息
来源: 评论
A rich ranking model based on the matthew effect optimization  7th
A rich ranking model based on the matthew effect optimizatio...
收藏 引用
7th International Conference on Computational Data and Social networks, CSoNet 2018
作者: Li, Jinzhong Liu, Guanjun Department of Computer Science and Technology College of Electronic and Information Engineering Jinggangshan University Ji’an343009 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610054 China Department of Computer Science and Technology College of Electronic and Information Engineering Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China
Most existing approaches of learning to rank treat the effectiveness of each query equally which results in a relatively lower ratio of queries with high effectiveness (i.e. rich queries) in the produced ranking model... 详细信息
来源: 评论
Mimic Defense Structured information System Threat Identification and Centralized Control
收藏 引用
Journal of Physics: Conference Series 2019年 第3期1187卷
作者: Bo Zhang Weichao Li Xin Sun Yufeng Zhao State Grid Key Laboratory of Information & Network Security Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Grid Zhejiang Electric Power Research Institute Hangzhou China
With the speeding up of the informatization process of our national economy and social development, the degree of informatization in our country is getting higher and higher. information system has become the key infr...
来源: 评论
A Cortex-M3-Based System-On-Chip Architecture for Wireless Communications in power Grid
A Cortex-M3-Based System-On-Chip Architecture for Wireless C...
收藏 引用
IEEE information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Yingying Chi Weilong Zhang Zhe Zheng Wenpeng Cui State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co. Ltd. State Grid Laboratory of Electric Power Communication Network Technology Beijing China
This paper presents a Cortex-M3-based system-on-chip (SoC) architecture designed for power-grid-dedicated wireless communication system based on IEEE 802.11ah protocol. The SoC is integrated with a 32-bit embedded mic... 详细信息
来源: 评论
Design and Implementation of Mobile Workflow Function Based on power Grid Inspection Scenario
Design and Implementation of Mobile Workflow Function Based ...
收藏 引用
2018 3rd International Conference on Automation,Mechanical Control and Computational Engineering(AMCCE 2018)
作者: Gang Wang Weimin Tang Haiping Shen Yu hai Xingchuan Bao Min Xu Zhansheng Hou Haiyun Han Lin Peng GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE Co. Ltd State Grid Key Laboratory of Information & Network Security State Grid Wuxi Power Supply Company
In power grid inspection operations, there is an urgent need for mobile workflows based on power scenarios for on-site process management. This paper studies the workflow engine technology for power grid inspection op... 详细信息
来源: 评论
A Design of Direct Memory Access Controller for Wireless Communication SoC in power Grid
A Design of Direct Memory Access Controller for Wireless Com...
收藏 引用
International Conference on Circuits, System and Simulation (ICCSS)
作者: Yingying Chi Zhe Zheng Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd. Beijing China State Grid Key Laboratory of Information & Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
This paper presents a complete Register Transfer Level (RTL) design of Direct Memory Access (DMA) controller which is compliable with the Advanced Highperformance Bus (AHB). The DMA is integrated in Cortex-M3-based sy... 详细信息
来源: 评论