咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是391-400 订阅
排序:
Street-Level Landmarks Acquisition Based on SVM Classifiers
收藏 引用
Computers, Materials & Continua 2019年 第5期59卷 591-606页
作者: Ruixiang Li Yingying Liu Yaqiong Qiao Te Ma Bo Wang Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Zhengzhou Science and Technology Institute Zhengzhou450001China Henan Institute of Animal Husbandry Economics Zhengzhou450044China State University of New York at Buffalo New York14260-1660United States
High-density street-level reliable landmarks are one of the important foundations for street-level ***,the existing methods cannot obtain enough street-level landmarks in a short period of *** this paper,a street-leve... 详细信息
来源: 评论
Identifying topologies and system parameters of uncertaintime-varying delayed complex networks
收藏 引用
Science China(Technological Sciences) 2019年 第1期62卷 94-105页
作者: WANG Xiong GU HaiBo WANG QianYao Lü JinHu LSC Academy of Mathematics and Systems Science Chinese Academy of Sciences School of Mathematical Sciences University of Chinese Academy of Sciences School of Automation Science and Electrical Engineering State Key Laboratory of Software Development Environment and Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University
Node dynamics and network topologies play vital roles in determining the network features and network dynamical *** it is of great theoretical significance and practical value to recover the topology structures and sy... 详细信息
来源: 评论
A Security Sensitive Function Mining Approach Based on Precondition Pattern Analysis
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 1013-1029页
作者: Zhongxu Yin Yiran Song Huiqin Chen Yan Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Henan University of Animal Husbandry&Economy Zhengzhou450046China University of Michigan Transportation Research Institute Michigan48109-2150USA Zhengzhou University Zhengzhou450001China
Security-sensitive functions are the basis for building a taint-style vulnerability *** approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pattern analy... 详细信息
来源: 评论
Resolving Anonymous Nodes Based on "Watermelon Patterns" Towards Constructing Router-Level Topology in Mesh Network  29th
Resolving Anonymous Nodes Based on "Watermelon Patterns" Tow...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Li, Ruixiang Feng, Xinzhu Liu, Chong Yuan, Fuxiang Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China Sichuan University Chengdu China
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr... 详细信息
来源: 评论
Round-optimal password-based group key exchange protocols in the standard model  13th
Round-optimal password-based group key exchange protocols in...
收藏 引用
13th International Conference on Applied Cryptography and Network Security, ACNS 2015
作者: Xu, Jing Hu, Xue-Xian Zhang, Zhen-Feng Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450002 China
Password-based group key exchange protocols allow group users who share only a short, low entropy password to agree on a cryptographically strong session key. One fundamental complexity measure of such protocols is it... 详细信息
来源: 评论
Higher-Order Quantum Genetic Algorithm and Its Application on Non-Linear Equations  6
Higher-Order Quantum Genetic Algorithm and Its Application o...
收藏 引用
2021 6th International Conference on Electronic Technology and Information Science, ICETIS 2021
作者: Jin, Lei Shan, Zheng Hu, Chunchao Xu, Le School of Information Engineering Zhengzhou University Zhengzhou Henan450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou Henan450000 China
The high efficiency of quantum algorithms is caused by the quantum parallelism of the superposition principle and the quantum entangled, but traditional quantum genetic algorithms only use the quantum superposition pr... 详细信息
来源: 评论
Research on Quantum Programming Framework Based on NISQ Function  6
Research on Quantum Programming Framework Based on NISQ Func...
收藏 引用
2021 6th International Conference on Electronic Technology and Information Science, ICETIS 2021
作者: Liu, Xiaonan Xu, Le Hu, Chunchao Jin, Lei School of Information Engineering Zhengzhou University Zhengzhou Henan450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou Henan450000 China
In the past two decades, the field of quantum computing has developed rapidly, is gradually able to solve some difficult classical problems. With the development of the facilities for Noisy Intermediate-Scale Quantum(... 详细信息
来源: 评论
Variational Quantum Algorithm and Its Application on Non-Linear Equations  2
Variational Quantum Algorithm and Its Application on Non-Lin...
收藏 引用
2021 2nd International Conference on Computer Information and Big Data Applications, CIBDA 2021
作者: Yang, Yihang Shan, Zheng Zhao, Bo Xu, Le School of Information Engineering Zhengzhou University Zhengzhou Henan450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou Henan450000 China
Quantum algorithms of factoring problem have been paid more and more attention since Shor's algorithm was proposed. Combining the current quantum computer hardware level and integer factorization quantum algorithm... 详细信息
来源: 评论
An Opposition-Based Learning Adaptive Chaotic Particle Swarm Optimization Algorithm
收藏 引用
Journal of Bionic engineering 2024年 第6期21卷 3076-3097页
作者: Chongyang Jiao Kunjie Yu Qinglei Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China Henan Information Engineering School Zhengzhou Vocational College of Industrial SafetyZhengzhou450000China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou450001China School of Computer and Artificial Intelligence Zhengzhou UniversityZhengzhou450001China
To solve the shortcomings of Particle Swarm Optimization(PSO)algorithm,local optimization and slow convergence,an Opposition-based Learning Adaptive Chaotic PSO(LCPSO)algorithm was *** chaotic elite opposition-based l... 详细信息
来源: 评论
LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks  19
LEFV: A Lightweight and Efficient System for Face Verificati...
收藏 引用
Proceedings of the 3rd International Conference on Video and Image Processing
作者: Ming Liu Ping Zhang Qingbao Li Jinjin Liu Zhifeng Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The emergence of deep learning has made great progress in face recognition. With the popularization of embedded devices, deploying the deep model on embedded devices has become a trend. Most high-precision models requ... 详细信息
来源: 评论