咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是621-630 订阅
排序:
A new method for solving the linear recurrence relation with nonhomogeneous constant coefficients in some cases
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2113卷
作者: Ben-Chao Yang Xue-Feng Han State Key Laboratory of Mathematical Engineering and advanced computing Zhengzhou Henan China School of mathematics and Information Science Henan Polytechnic University Jiaozuo Henan China
Recursive relation mainly describes the unique law satisfied by a sequence, so it plays an important role in almost all branches of mathematics. It is also one of the main algorithms commonly used in computer programm...
来源: 评论
Fine-grained analysis method for Android volatile memory
收藏 引用
IOP Conference Series: Materials Science and engineering 2020年 第1期715卷
作者: Peijun Feng Qingbao Li Zhifeng Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Android dominates the mobile operating system market. Volatile memory analysis of Android devices has been the focus of research on mobile forensics technology. However, due to the semantic gap between the kernel and ...
来源: 评论
Interference-assisted kaleidoscopic meta-plexer for arbitrary spin-wavefront manipulation
收藏 引用
Light(Science & Applications) 2019年 第1期8卷 1141-1150页
作者: He-Xiu Xu Guangwei Hu Ying Li Lei Han Jianlin Zhao Yunming Sun Fang Yuan Guang-Ming Wang Zhi Hao Jiang Xiaohui Ling Tie Jun Cui Cheng-Wei Qiu Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore Air and Missile Defense College Air force Engineering University710051 Xi’anChina Hunan Provincial Key Laboratory of Intelligent Information Processing and Applications College of Physics and Electronics EngineeringHengyang Normal University421008 HengyangChina School of Natural and Applied Sciences Northwestern Polytechnical University710072 Xi’anChina Advanced Technique Department Key Lab of Aeronautics Computing Technique710075 Xi’anChina State Key Laboratory of Millimeter Waves Southeast University210096 NanjingChina
Achieving simultaneous polarization and wavefront control,especially circular polarization with the auxiliary degree of freedom of light and spin angular momentum,is of fundamental importance in many optical *** are t... 详细信息
来源: 评论
Simulation detection based on single photon quantum key distribution protocol
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1812卷
作者: X N Liu C C Hu M J Yin L Jin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China School of Information Engineering Zhengzhou University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour...
来源: 评论
Network representation learning: From preprocessing, feature extraction to node embedding
arXiv
收藏 引用
arXiv 2021年
作者: Zhou, Jingya Liu, Ling Wei, Wenqi Fan, Jianxi Soochow University 1 Shizi street Jiangsu Suzhou215006 China Georgia Institute of Technology during May 2019 - June 2020 AtlantaGA United States State Key Laboratory of Mathematical Engineering and Advanced Computing Jiangsu Wuxi214125 China Georgia Institute of Technology 801 Atlantic Drive AtlantaGA30332 United States Soochow University 1 Shizi street Jiangsu Suzhou215006 China
Network representation learning (NRL) advances the conventional graph mining of social networks, knowledge graphs, and complex biomedical and physics information networks. Over dozens of network representation learnin... 详细信息
来源: 评论
Non-binary entanglement-assisted quantum stabilizer codes
收藏 引用
Science China(Information Sciences) 2017年 第4期60卷 210-223页
作者: Lan LUO Zhi MA Zhengchao WEI Riguang LENG State Key Laboratory of Mathematical Engineering and Advanced Computing
In this paper, we present the pm-ary entanglement-assisted(EA) stabilizer formalism, where p is a prime and m is a positive integer. Given an arbitrary non-abelian "stabilizer", the problem of code construct... 详细信息
来源: 评论
Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division
收藏 引用
Computers, Materials & Continua 2018年 第4期55卷 71-93页
作者: Wenyan Liu Xiangyang Luo Yimin Liu Jianqiang Liu Minghao Liu Yun Q.Shi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China School of Electronics and Communication Engineering Zhengzhou University of AeronauticsZhengzhou 450001China New Jersey Institute of Technology NJUSA
Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security ***,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight... 详细信息
来源: 评论
A Handover Decision Algorithm Based on Evolutionary Game Theory for Space-ground Integrated Network
A Handover Decision Algorithm Based on Evolutionary Game The...
收藏 引用
2019 International Conference on Wireless Communication, Network and Multimedia engineering(WCNME 2019)
作者: Zhuo Yi Delong Jiang Lifeng Cao Xuehui Du State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and Technology Troop 78123 PLA
When handovers occur to user in space-ground integrated network, handover decisions should be made to select the optimal access point. However, existing decision indexes are not suitable to handover scenarios in space... 详细信息
来源: 评论
A Hierarchically Collaborative Ant Colony Based Assembly Algorithm for Security Protocol
A Hierarchically Collaborative Ant Colony Based Assembly Alg...
收藏 引用
2019 International Conference on Wireless Communication, Network and Multimedia engineering(WCNME 2019)
作者: Zhuo Yi Muming Sun Lifeng Cao Xuehui Du State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and Technology Troop 78123 PLA
Assembly of reconfigurable security protocol remains a major challenge for deploying higher security-level but more complicated security strategies in access points with limited resources and computing abilities. To h... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1584卷
作者: Jinzhu Wang Ruijie Cai Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ...
来源: 评论