Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241100111-6.doi: 10.11896/jsjkx.241100111
• Interdiscipline & Application • Previous Articles Next Articles
ZHOU Zheng1, CHEN Chen1, WANG Song1, SONG Xiaofan1,2
CLC Number:
| [1]YAO Z Q,CHANG N C,DOU R,et al.Optimization of Data Stream Between Substation and Dispatching Adapting to Centralized Control[J].Power System Technology,2022,46(10):4113-4121. [2]ZHANG X,XIAO P,GUO L J,et al.The Design and Applica-tion of the High Available Network of Supervisor Information System[J].Computer Applications and Software,2022,39(10):35-41,70. [3]SONG B,PENG W J,CHEN S.Design and Implementation of Intelligent Maintenance Management and Monitoring System Based on BIM[J].Computer Applications and Software,2024,41(4):28-33. [4]LI X S,CHANG G H,SU S,et al.Review and prospect on cyberthreat indicators of substation monitoring system[J].Journal of Electric Power Science and Technology,2024,39(4):1-10. [5]FENG C J,ZHU J,ZHU Y,et al.Unified Management Architecture and Practice of Power Monitoring Network Security Equipment[J].Journal of Information Security Research,2024,10(5):481-488. [6]DU Q W,XU H Q,ZHENG X,et al.Defense Strategy Design for Electric Power Monitoring System Under Malicious Network Attacks[J].Control Engineering of China,2024,31(1):185-192. [7]CAO X M,ZHANG H B,YE S S,et al.Security Access Protocolof Power Monitoring Network Based on ECC Algorithm[J].Journal of Shenyang University of Technology,2024,46(1):60-65. [8]WANG B,HAN J F,LI Y,et al.Research on Power Grid Security Early Warning Technology Based on Intelligent Monitoring Platform[J].Power System and Clean Energy,2023,39(6):33-38. [9]SEOL Y,HYEON D,MIN J H,et al.Timely survey of time sensitive networking:past and future directions[J]IEEE Access,2021,9:142506-142527. [10]BING Y A,WANG W T,SUN S Z,et al.Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy Comprehensive Evaluation Method[J].Computer Science,2023,50(S1):784-790. [11]WANG Z N,ZHANG J,HUANG T.Determining delay bounds for a chain of virtual network functions using network calculus[J].IEEE Communications Letters,2021,25(8):2550-2553. [12]HE R W,LONG L,ZHANG B R,et al.Cyber System Physica-lizing Modeling and Analysis Method in Cyber-physical Power Systems[C]//Proceedings of the CSEE.2024:72-85. [13]HUSSAIN S M S,FAROOQ S M,USTUN T S.A method forachieving confidentiality and integrity in IEC 61850 GOOSE messages[J].IEEE Transactions on Power Delivery,2020,35(5):2565-2567. |
| [1] | FANG Quan, ZHANG Jinlong, WANG Bingqian, HU Jun. Research on Domain Knowledge Question Answering via Large Language Models withCompositional Context Prompting [J]. Computer Science, 2025, 52(11): 13-21. |
| [2] | PI Qiankun, LU Jicang, ZHU Taojie, PENG Yueling. Zero-shot Knowledge Extraction Method Based on Large Language Model Enhanced [J]. Computer Science, 2025, 52(11): 22-29. |
| [3] | ZHANG Haoran, HAO Wenning, JIN Dawei, CHENG Kai, ZHAI Ying. DF-RAG:A Retrieval-augmented Generation Method Based on Query Rewriting and Knowledge Selection [J]. Computer Science, 2025, 52(11): 30-39. |
| [4] | WANG Zhengquan, PENG Zhiyong. Truster:Efficient Query-oriented Clustered Storage Solution for Autonomous Vehicle TrajectoryData [J]. Computer Science, 2025, 52(11): 62-70. |
| [5] | HU Jintao, XIAN Guangming. Self-attention-based Graph Contrastive Learning for Recommendation [J]. Computer Science, 2025, 52(11): 82-89. |
| [6] | WANG Wenpeng, GE Hongwei, LI Ting. Adversarial Generative Multi-sensitive Attribute Data Biasing Method [J]. Computer Science, 2025, 52(11): 90-97. |
| [7] | CHEN Kang, LIN Jianhan, LIU Yuanjie. Survey on Image Deblurring Algorithms [J]. Computer Science, 2025, 52(11): 98-112. |
| [8] | QIN Yi, ZHAN Pengxiang, XIAN Feng, LIU Chenlong, WANG Minghui. FE-DARFormer:Image Desnowing Model Based on Frequency Enhancement and Degradation- aware Routing Transformer [J]. Computer Science, 2025, 52(11): 113-122. |
| [9] | YAN Zhilin, NIE Rencan. Infrared and Visible Image Fusion Cross-modality Contrastive Representation Network Based on Rolling MLP Feature Extraction [J]. Computer Science, 2025, 52(11): 123-130. |
| [10] | CHEN Chongyang, PENG Li, YANG Jielong. UAV Small Object Detection Algorithm Based on Feature Enhancement and Context Fusion [J]. Computer Science, 2025, 52(11): 131-140. |
| [11] | DING Yuanbo, BAI Lin, LI Taoshen. Human-Object Interaction Detection Based on Fine-grained Attention Mechanism [J]. Computer Science, 2025, 52(11): 141-149. |
| [12] | LI Xiaoyu, QIAN Yi, WEN Yimin, MIU Yuqing. Multi-level Feature Fusion Image Emotion Recognition Based on Color Enhancement [J]. Computer Science, 2025, 52(11): 157-165. |
| [13] | WANG Yang, WANG Guodong, ZHAO Junli, SHENG Xiaomeng. Neural Radiance Field for Human Reconstruction Based on Multi-scale Hierarchical Network [J]. Computer Science, 2025, 52(11): 175-183. |
| [14] | WANG Xiaofeng, HUANG Junjun, TAN Wenya, SHEN Zixuan. Object Detection Based on Deep Feature Enhancement and Path Aggregation Optimization [J]. Computer Science, 2025, 52(11): 184-195. |
| [15] | GU Chengjie, MENG Yi, ZHU Dongjun, ZHANG Junjun. Medical Image Target Detection Method Based on Multi-branch Attention and Deep Down- sampling [J]. Computer Science, 2025, 52(11): 196-205. |
|
||