咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是621-630 订阅
排序:
CRNet:3D Face Reconstruction with Contour Map Regression Network
CRNet:3D Face Reconstruction with Contour Map Regression Net...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Tongxin Wei Qingbao Li Jinjin Liu School of Software Zhengzhou University Zhengzhou State Key Laboratory of Mathematical Engineering and Advanced Computing
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D... 详细信息
来源: 评论
Semi-Markov Network Traffic Model Based on Pareto Distribution
Semi-Markov Network Traffic Model Based on Pareto Distributi...
收藏 引用
2016 3rd International Conference on engineering Technology and Application(ICETA 2016)
作者: Jinlong Fei Tianpeng Wang Xinzheng He Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Science and Technology on Communication Security Laboratory
The establishment of the network traffic model has an important significance on the research of *** the basis of existing researches,this paper proposes the improved Semi-Markov network traffic model,and re-divides th... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
2021国际计算机前沿大会
作者: Wenning Zhang Qinglei Zhou Chongyang Jiao Ting Xu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhongyuan University of Technology Zhengzhou University
To solve the emerging complex optimization problems,multi objective optimization algorithms are *** introducing the surrogate model for approximate fitness calculation,the multi objective firefly algorithm with surrog...
来源: 评论
A secure spectrum auction scheme without the trusted party based on the smart contract
收藏 引用
Digital Communications and Networks 2021年 第2期7卷 223-234页
作者: Jiaqi Wang Ning Lu Qingfeng Cheng Lu Zhou Wenbo Shi School of Computer Science and Engineerings Northeastern University Shenyang 110004China School of Computer Science and Technology Xidian UniversityXi'anChina Strategic Support Force Information Engineering University Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Division of Computer Science University ofAizuAizu-WakamatsuJapan School of Computer and Communication Engineering Nordieastem UniversityQinhuangdao066004China
With the development of communication 5G networks and technologies,spectrum resources are increasingly *** scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum a... 详细信息
来源: 评论
Research on undergraduate thesis' s tutor allocation based on Dynamic Game Model of Incomplete Information
Research on undergraduate thesis' s tutor allocation based o...
收藏 引用
2016 3rd International Conference on Education,Management and computing Technology(ICEMCT 2016)
作者: Hengwei Zhang Zhengzhou Institute of Information Science and Technology State Key Laboratory of Mathematical Engineering and Advanced Computing
Fairness is the prerequisite to the undergraduate thesis' s tutor allocation, which means students have the priority for choosing tutors. Because of rich experience and authoritative discourse power, the senior tu... 详细信息
来源: 评论
A Format Protection Method of Greybox Fuzzing  19
A Format Protection Method of Greybox Fuzzing
收藏 引用
19th IEEE International Conference on Communication Technology, ICCT 2019
作者: Zhao, Shibin Zhou, Tianyang Duan, Xiaoli Lin, Hongyang Ying, Xinlei Shi, Qibo Peng, Jianshan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China China United Network Communications Group Co. Ltd Shanxi Yuncheng Branch Yuncheng044000 China Ant-financial Light-Year Security Lab hangzhou310000 China
Greybox fuzzing, which can fuzz without knowledge of the format, is one of the most advanced fuzzing techniques. However, the lack of format knowledge makes the test cases' format messy as the fuzzing proceeds and... 详细信息
来源: 评论
Improving CoatNet for Spatial and JPEG Domain Steganalysis
Improving CoatNet for Spatial and JPEG Domain Steganalysis
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Hao Li Xiangyang Luo Yi Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Advanced Computing and Key Laboratory of Cyberspace Situation Awareness of Henan Provinc Zhengzhou China
The covert communication technology represented by image steganography can realize the safe and reliable information transmission over an open network. Steganalysis is an important way to measure the security of stega...
来源: 评论
BA-Audit: Blockchain-Based Public Auditing for Aggregated Data Sharing in Edge-Assisted IoT  1
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Liu, Mingxi Lu, Ning Yin, Jingli Cheng, Qingfeng Shi, Wenbo School of Computer Science and Engineering Northeastern University Shenyang China School of Computer Science and Technology Xidian University Xi’an China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou China
With the massive placement of sensors leading to a surge in IoT data, it is wise for system administrators to use data aggregation strategies to collect and share data in edge-assisted IoT scenarios because traditiona... 详细信息
来源: 评论
A Novel Timing-based Network Covert Channel Detection Method
A Novel Timing-based Network Covert Channel Detection Method
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Lu, Shoupu Chen, Zhifeng Fu, Guangxin Li, Qingbao State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Province Zhengzhou450001 China Henan University of Economics and Law Henan Province Zhengzhou450000 China P.O.Box 5111 Beijing China
Network stealth events are endless, and covert timing channel is one of the most difficult means to prevent. In order to further improve the detection rate of covert timing channel, several typical network covert timi... 详细信息
来源: 评论
A flexible capacitive photoreceptor for the biomimetic retina
收藏 引用
Light(Science & Applications) 2022年 第1期11卷 38-49页
作者: Mani Teja Vijjapu Mohammed E.Fouda Agamyrat Agambayev Chun Hong Kang Chun-Ho Lin Boon S.Ooi Jr-Hau He Ahmed M.Eltawil Khaled N.Salama Sensors lab Advanced Membranes and Porous Materials CenterComputerElectrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Communication and Computing Systems Lab ComputerElectrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Department of Electrical Engineering and Computer Science University of California-IrvineIrvineCA 92612USA Department of Electrical Computer and Energy EngineeringArizona State UniversityTempeAZUSA Computer Electrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Department of Materials Science and Engineering City University of Hong KongHong Kong SARChina
Neuromorphic vision sensors have been extremely beneficial in developing energy-efficient intelligent systems for robotics and privacy-preserving security *** is a dire need for devices to mimic the retina's photo... 详细信息
来源: 评论