咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是331-340 订阅
排序:
Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Shuang Zhang, Tao Liu, Jiqiang Wang, Jiacheng Wu, Xuangou Zhu, Xiaoqiang Zhang, Ruichen Zhang, Weiting Yuan, Zhenhui Mao, Shiwen Kim, Dong In School of Software Engineering Beijing Jiaotong University Beijing100044 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Computer Science and Technology An hui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui University of Technology Anhui243002 China College of Computing and Data Science Nanyang Technological University Singapore School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China School of Engineering University of Warwick CoventryCV4 7AL United Kingdom Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States Department of Electrical and Computer Engineering College of Information and Communication Engineering Sungkyunkwan University Suwon16419 Korea Republic of
—With the rapid development of technology and the acceleration of digitalisation, the frequency and complexity of cyber security threats are increasing. Traditional cybersecurity approaches, often based on static rul... 详细信息
来源: 评论
Automatic Summarization Generation Technology of Network Document Based on Knowledge Graph  1
收藏 引用
2nd EAI International Conference on Advanced Hybrid Information processing, ADHIP 2018
作者: Wu, Yuezhong Chen, Rongrong Li, Changyun Chen, Shuhong Zou, Wenjun College of Artificial Intelligence Hunan University of Technology Zhuzhou412007 China Intelligent Information Perception and Processing Technology Hunan Province Key Laboratory Zhuzhou412007 China College of Business Hunan University of Technology Zhuzhou412007 China School of Computer Science and Educational Software Guangzhou University Guangzhou510006 China School of Computer and Communication Hunan Institute of Engineering Xiangtan411104 China
The Internet has become one of the important channels for users to access to information and knowledge. It is crucial that how to acquire key content accurately and effectively in the events from huge amount of networ... 详细信息
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qianqian Chang Lin Xu Lei Zhang Shanghai Key Laboratory of Trustworthy Computing East China Normal University China Science and Technology on Communication Security Laboratory Chengdu China Ministry of Education Engineering Research Center of Software/Hardware Co-Design Technology and Application China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony...
来源: 评论
Super-Broadband Rectifier With Wide-band Resistance Compression Network and Harmonic Cycling for RF-Harvesting
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Liu, Xin Zhang, Dawei Li, Yingsong Huang, Zhixiang College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei230601 China Anhui Province Key Laboratory of Target Recognition and Feature Extraction Lu'An230088 China
In this paper, a super-broadband (SBB) rectifier using a wideband resistance compression network (WRCN) and harmonic cycling is proposed, simulated, fabricated, measured and analyzed in detail for the harvesting of am... 详细信息
来源: 评论
The self-adaption strategy for parameter ε in ε-MOEA
The self-adaption strategy for parameter ε in ε-MOEA
收藏 引用
Congress on Evolutionary Computation
作者: Min Zhang Wenjian Luo Xingxin Pei Xufa Wang Nature Inspired Computing and Application Laboratory Department of Computer Science and Technology University of Science and Technology China Anhui Key Laboratory of software in Computing Communication University of Science and Technology China University of Science and Technology of China Hefei Anhui CN Nature Inspired Computing and Application Laboratory Department of Computer Science and Technology of China University of Science and Technology China
A novel self-adaption strategy for the parameter epsiv in epsiv-MOEA is proposed in this paper based on the analyses of the relationship between the value of epsiv and the maximum number of non-dominated solutions. Th... 详细信息
来源: 评论
A Privacy Policy of P3P Based on Relational Database
A Privacy Policy of P3P Based on Relational Database
收藏 引用
International Multi-Symposiums on Computer and Computational Sciences (IMSCCS)
作者: Bin Jiang Da-fung Zhang Chao Yang Guangxue Yue Fei Yu Software School Hunan University Changsha Hunan China College of Computer and Communication Hunan University Changsha Hunan China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Jiangsu Province China
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great depe... 详细信息
来源: 评论
Verification of Population Ring Protocols in PAT
Verification of Population Ring Protocols in PAT
收藏 引用
Third International Symposium on Theoretical Aspects of software Engineering TASE 2009(第三届软件工程理论国际研讨会)
作者: Jun Sun Yang Liu Jun Pang Jianhua Zhao National University of Singapore School of Computing Université du Luxembourg Faculté des Sciences de la Technologie et de la Communication Nanjing University State Key Laboratory of Novel Software Technology
The population protocol model has emerged as an ele gant paradigm for describing mobile ad hoc networks, con sisting of a number of nodes that interact with each other to carry out a computation. One essential propert... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Energy-AOI-Aware UAV-Assisted Data Collection: A Multi-Agent Deep Reinforcement Learning-Based Trajectory Optimization
Energy-AOI-Aware UAV-Assisted Data Collection: A Multi-Agent...
收藏 引用
International Conference on communication Technology (ICCT)
作者: Liangtian Wan Kun Zhang Lu Sun Gang Xu Xianpeng Wang Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian China State Key Laboratory of Millimeter Waves School of Information Science and Engineering Southeast University Nanjing China State Key Laboratory of Marine Resource Utilization in South China Sea School of Information and Communication Engineering Hainan University Haikou China
With the development of Internet of Things (IoT) technology, sensor networks are widely used for data collection in various IoT scenarios. Traditional sensors use multi-hop communication to transmit data back to the d...
来源: 评论
Design methods for polymorphic combinational logic circuits based on the Bi-Decomposition approach
arXiv
收藏 引用
arXiv 2017年
作者: Li, Zhifang Luo, Wenjian Yue, Lihua Wang, Xufa School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
Polymorphic circuits are a special kind of digital logic components, which possess multiple build-in functions. In different environments, a polymorphic circuit would perform different functions. Evolutionary Algorith... 详细信息
来源: 评论