咨询与建议

限定检索结果

文献类型

  • 152 篇 会议
  • 121 篇 期刊文献

馆藏范围

  • 273 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 183 篇 工学
    • 123 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 32 篇 信息与通信工程
    • 26 篇 生物工程
    • 20 篇 控制科学与工程
    • 16 篇 土木工程
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 10 篇 光学工程
    • 10 篇 建筑学
    • 10 篇 化学工程与技术
    • 9 篇 电子科学与技术(可...
    • 9 篇 航空宇航科学与技...
    • 8 篇 电气工程
    • 7 篇 力学(可授工学、理...
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
  • 103 篇 理学
    • 51 篇 数学
    • 28 篇 生物学
    • 25 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 10 篇 地球物理学
    • 8 篇 系统科学
    • 6 篇 化学
  • 46 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 10 篇 教育学
    • 10 篇 教育学
  • 10 篇 军事学
    • 7 篇 军事装备学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 法学
  • 4 篇 医学
  • 2 篇 农学

主题

  • 11 篇 software testing
  • 9 篇 software quality
  • 7 篇 simulation
  • 7 篇 neural networks
  • 6 篇 reinforcement le...
  • 6 篇 security
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 programmable log...
  • 5 篇 cosmology
  • 5 篇 feature extracti...
  • 4 篇 object detection
  • 4 篇 task analysis
  • 4 篇 generative adver...
  • 4 篇 software algorit...
  • 4 篇 static analysis
  • 4 篇 predictive model...
  • 4 篇 software reliabi...
  • 4 篇 semantics
  • 4 篇 clustering algor...

机构

  • 41 篇 college of comma...
  • 40 篇 command and cont...
  • 18 篇 command & contro...
  • 12 篇 department of as...
  • 11 篇 institute of com...
  • 11 篇 institute for as...
  • 11 篇 school of comman...
  • 11 篇 college of comma...
  • 9 篇 institute for fr...
  • 7 篇 army engineering...
  • 7 篇 institute of com...
  • 6 篇 college of comma...
  • 6 篇 academy of milit...
  • 6 篇 college of commu...
  • 5 篇 army engineering...
  • 5 篇 command&control ...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 college of comma...
  • 4 篇 the army artille...

作者

  • 23 篇 huang song
  • 19 篇 zhang tingting
  • 16 篇 song huang
  • 12 篇 zhang tong-jie
  • 11 篇 pan zhisong
  • 9 篇 li yang
  • 9 篇 wang jiabao
  • 9 篇 miao zhuang
  • 7 篇 he ming
  • 6 篇 zheng qibin
  • 6 篇 zhanwei hui
  • 6 篇 yang li
  • 6 篇 cao tieyong
  • 5 篇 yang sen
  • 5 篇 hui zhanwei
  • 5 篇 pan yu
  • 5 篇 hao wenning
  • 5 篇 jiabao wang
  • 5 篇 wang yu-chen
  • 5 篇 zhuang miao

语言

  • 260 篇 英文
  • 7 篇 其他
  • 6 篇 中文
检索条件"机构=Institute of Command and Control Engineering Army Engineering University of PLA"
273 条 记 录,以下是221-230 订阅
排序:
Formal analysis of QUIC handshake protocol using ProVerif
Formal analysis of QUIC handshake protocol using ProVerif
收藏 引用
IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)
作者: Jingjing Zhang Lin Yang Xianming Gao Qiang Wang College of Command and Control Engineering Army Engineering University of PLA Nanjing China National Key Laboratory of Science and Technology on Information System Security Chinese Academy of Military Science Beijing China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
This paper presents a formal analysis of the QUIC protocol. This newly proposed protocol is currently under the process of standardization, and it is still unknown whether the proposed protocol provides the claimed se... 详细信息
来源: 评论
A new analytical approximation of luminosity distance by optimal HPM-Padé technique
arXiv
收藏 引用
arXiv 2021年
作者: Yu, Bo Zhang, Jian-Chen Zhang, Tong-Jie Zhang, Tingting School of Mathematics and Big Data Dezhou University Dezhou253023 China Institute for Astronomical Science Dezhou University Dezhou253023 China Shandong Provincial Key Laboratory of Biophysics Institute of Biophysics Dezhou University Dezhou253023 China School of Computer and Information Dezhou University Dezhou253023 China Department of Astronomy Beijing Normal University Beijing100875 China School of Command and Control Engineering Army Engineering University Nanjing210017 China
By the use of homotopy perturbation method-Padé (HPM-Padé) technique, a new analytical approximation of luminosity distance in the flat universe is proposed, which has the advantage of significant improvemen... 详细信息
来源: 评论
Object-oriented Battlefield Environment Simulation Process Object Model Based on Task-driven
收藏 引用
Journal of Geodesy and Geoinformation Science 2019年 第3期2卷 31-43页
作者: Jie ZHU Xiong YOU Qing XIA Hongjun ZHANG College of Command and Control Engineering The Army Engineering University of PLA Nanjing 210002 China Institute of Geospatial Information Information Engineering University Zhengzhou 450001 China 73021 Troops Hangzhou 315023 China
Battlefield environment simulation process is an important part of battlefield environment information support, which needs to be built around the task process. At present, the interoperability between battlefield env... 详细信息
来源: 评论
A two-stage feature weighting method for naive bayes and its application in software defect prediction
收藏 引用
International Journal of Performability engineering 2018年 第7期14卷 1468-1480页
作者: Ji, Haijin Huang, Song Lv, Xuewei Wu, Yaning Hui, Zhanwei Command and Control Engineering College Army Engineering University of PLA Nanjing210007 China School of Computer Science and Technology Huaiyin Normal University Huai'an223300 China
Software defect prediction (SDP) models facilitate software practitioners to find out defect-prone software modules in software. Software practitioners can then test these defect-prone software modules with limited te... 详细信息
来源: 评论
XML privacy preserving model based on dynamic context
收藏 引用
International Journal of Performability engineering 2018年 第12期14卷 3206-3219页
作者: Wang, Meijuan Huang, Song Zheng, Changyou Li, Hui College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing210016 China Command and Control Engineering College Army Engineering University of PLA Nanjing210007 China
The development of cloud computing has brought about rapid changes in the data application environment. The contradiction between the availability of data fusion and privacy protection is increasing. Traditional infor... 详细信息
来源: 评论
Inverted XML Access control Model Based on Ontology Semantic Dependency
收藏 引用
Computers, Materials & Continua 2018年 第6期55卷 465-482页
作者: Meijuan Wang Jian Wang Lihong Guo Lein Harn College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing210016China Command&Control Engineering College Army Engineering University of PLANanjing 210007China Department of Communications Engineering Nanjing Institute of TechnologyNanjing 211167China University of Missouri Kansas CityAmerican
In the era of big data,the conflict between data mining and data privacy protection is increasing day by *** information security focuses on protecting the security of attribute values without semantic *** data privac... 详细信息
来源: 评论
A fast and robust real-time surveillance video stitching method
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1651卷
作者: Tao Yang Fenlin Jin Jianxin Luo Command & Control Engineering College Army Engineering University of PLA Nanjing Jiangsu 210007 China
Real-time video stitching can build a wider field of view for surveillance, which faces a compromise between stitching speed and visual quality. A fast and robust real-time surveillance video stitching method is propo...
来源: 评论
An Automatic Exploit Generation Method Based on Symbolic Execution
An Automatic Exploit Generation Method Based on Symbolic Exe...
收藏 引用
International Conference on Instrumentation, Measurement, Computer, Communication and control (IMCCC)
作者: Hao Fang Wenbo Fen Menglin Fu Institute of Command and Control engineering Army Engineering University Of PLA Army Engineering University of PLA Nanjing China
Return-to-dl-resolve [3] is a general exploit technology that can break through complex protection mechanisms. However, it's hard to be employed for security researchers must understand the principle of ELF dynami... 详细信息
来源: 评论
Secure transmission in wireless powered cooperative communication network with finite energy storage
Secure transmission in wireless powered cooperative communic...
收藏 引用
IET 8th International Conference on Wireless, Mobile &Multimedia Networks
作者: Yong Wang Tao Zhang Weiwei Yang Yu Yu College of Communication Engineering Army Engineering University of PLA Nanjing China The Sixty-third Research Institute National University of Defense Technology Nanjing China 31131 Troops Eastern Theater Command of PLA Nanjing China
This paper investigates secure transmission in a wireless powered cooperative communication network (WPCCN), where multiple intermediate energy harvesting (EH) nodes are deployed to assist the secure transmission betw... 详细信息
来源: 评论
Output Kernel Learning for Multi-Output Regression
Output Kernel Learning for Multi-Output Regression
收藏 引用
International Conference on Instrumentation, Measurement, Computer, Communication and control (IMCCC)
作者: Yanqin Tang Zhisong Pan Yanyan Zhang Institute of Command Control Engineering Army Engineering University of PLA Nanjing
Multi-output regression is the extension of single output learning, which requires one input sample to predict multiple real-valued output variables simultaneously. Previous studies have shown that multi-output learni...
来源: 评论