咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是591-600 订阅
排序:
Path planning of UAV base station based on deep reinforcement learning  12
Path planning of UAV base station based on deep reinforcemen...
收藏 引用
12th International Conference on Identification, Information and Knowledge in the internet of Things, IIKI 2021
作者: Yang, Siming Shan, Zheng Cao, Jiang Gao, Yuan Guo, Yang Wang, Ping Wang, Xiaonan Wang, Jing Zhang, Tingting Guo, Jiayu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China Academy of Military Science of the PLA Beijing100091 China Network Technology Research Center of the PLA Beijing100090 China
UAV base station platform has become the current research hotspot of assisting ground base station for wireless *** present, the most important issue is how to make path planning to provide the stable communication gu... 详细信息
来源: 评论
Non-malleability under selective opening attacks: Implication and separation  13th
Non-malleability under selective opening attacks: Implicatio...
收藏 引用
13th International Conference on Applied Cryptography and Network Security, ACNS 2015
作者: Huang, Zhengan Liu, Shengli Mao, Xianping Chen, Kefei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China School of Science Hangzhou Normal University Hangzhou310036 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214000 China
We formalize the security notions of non-malleability under selective opening attacks (NM-SO security) in two approaches: the indistinguishability-based approach and the simulation-based approach. We explore the relat... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  6
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Wu, Zejun Lu, Li Jia, Qiong Chen, Zhihao State Key Laboratory of Mathematical Engineering and advanced Computing Zheng zhou China National Local Joint Engineering Laboratory of Network Space Security Technology Zheng zhou China Beijing Institute of Computer Technology and Application BeiJing China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
ODCP: Optimizing Data Caching and Placement in Distributed File System Using Erasure Coding  17th
ODCP: Optimizing Data Caching and Placement in Distributed F...
收藏 引用
17th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2020
作者: Wu, Shuhan Li, Yunchun Yang, Hailong Luan, Zerong Li, Wei School of Computer Science and Engineering Beihang University Beijing100191 China College of Life Sciences and Bioengineering Beijing University of Technology Beijing100083 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Many current distributed file systems use erasure-coding based data redundancy techniques to improve the reliability of data storage. Such techniques can significantly improve the effective storage utilization. Howeve... 详细信息
来源: 评论
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks  34
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
34th General Assembly and Scientific Symposium of the International Union of Radio Science, URSI GASS 2021
作者: Gao, Yuan Cao, Jiang Guo, Yang Wang, Ping Yang, Siming Wang, Jing Lu, Weidang Si, Peiyuan Zhao, Ming Wu, Xiao Academy of Military Science of the PLA 100091 China College of Information Engineering Zhejiang University of Technology Hangzhou China Tsinghua University Beijing100084 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
Preparation and Simulation of Quantum states of Matrices  6
Preparation and Simulation of Quantum States of Matrices
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Liu, Zhengyu Liu, Xiaonan Xie, Haoshan Zhao, Chenyan School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450000 China National Supercomputing Center in Zhengzhou Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450000 China
A basic problem of quantum computing is how to effectively express classical data in quantum systems. This problem is called state preparation problem, and the process of preparing quantum states is called coding. In ... 详细信息
来源: 评论
swRodinia: A Benchmark Suite for Exploiting Architecture Properties of Sunway Processor  3rd
swRodinia: A Benchmark Suite for Exploiting Architecture Pr...
收藏 引用
3rd BenchCouncil International Symposium on Benchmarking, Measuring, and Optimizing, Bench 2020
作者: Chen, Bangduo Li, Mingzhen Yang, Hailong Luan, Zhongzhi Gan, Lin Yang, Guangwen Qian, Depei School of Computer Science and Engineering Beihang University Beijing100191 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu214125 China Department of Computer Science and Technology Tsinghua University Beijing100084 China
The Sunway processor has been demonstrated with superior performance by various scientific applications, domain specific frameworks and numerical algorithms. However, the optimization techniques that can fully exploit... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  22
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer engineering
作者: Chenwei Li Zheming Li Bo Yang Hengwei Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论
Constructing PLC Binary Program Model for Detection Purposes
Constructing PLC Binary Program Model for Detection Purposes
收藏 引用
1st International Conference on advanced Algorithms and Control engineering, ICAACE 2018
作者: Chang, Tianyou Wei, Qiang Geng, Yangyang Zhang, Hongwei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China People's Bank of China Center Branch of Zhoukou City Zhoukou Henan466000 China
Programmable Logic Controller (PLC) programs are vulnerable to tampering attacks with addition of malware, which can substantially cause severe physical destructions. In order to solve the problems, We propose a stati... 详细信息
来源: 评论
Publicly Verifiable Private Set Intersection from Homomorphic Encryption  8th
Publicly Verifiable Private Set Intersection from Homomorph...
收藏 引用
8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022
作者: Jiang, Yuting Wei, Jianghong Pan, Jing Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Guangzhou Institute of Technology Xidian University Guanzhou510555 China
Private Set Intersection (PSI) enables two mistrusting parties to securely evaluate the intersection of their private inputs, without revealing any additional information. With its wide application in privacy protecti... 详细信息
来源: 评论