咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是621-630 订阅
排序:
Interference-assisted kaleidoscopic meta-plexer for arbitrary spin-wavefront manipulation
收藏 引用
Light(Science & Applications) 2019年 第1期8卷 1141-1150页
作者: He-Xiu Xu Guangwei Hu Ying Li Lei Han Jianlin Zhao Yunming Sun Fang Yuan Guang-Ming Wang Zhi Hao Jiang Xiaohui Ling Tie Jun Cui Cheng-Wei Qiu Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore Air and Missile Defense College Air force Engineering University710051 Xi’anChina Hunan Provincial Key Laboratory of Intelligent Information Processing and Applications College of Physics and Electronics EngineeringHengyang Normal University421008 HengyangChina School of Natural and Applied Sciences Northwestern Polytechnical University710072 Xi’anChina Advanced Technique Department Key Lab of Aeronautics Computing Technique710075 Xi’anChina State Key Laboratory of Millimeter Waves Southeast University210096 NanjingChina
Achieving simultaneous polarization and wavefront control,especially circular polarization with the auxiliary degree of freedom of light and spin angular momentum,is of fundamental importance in many optical *** are t... 详细信息
来源: 评论
Simulation detection based on single photon quantum key distribution protocol
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1812卷
作者: X N Liu C C Hu M J Yin L Jin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China School of Information Engineering Zhengzhou University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour...
来源: 评论
Network representation learning: From preprocessing, feature extraction to node embedding
arXiv
收藏 引用
arXiv 2021年
作者: Zhou, Jingya Liu, Ling Wei, Wenqi Fan, Jianxi Soochow University 1 Shizi street Jiangsu Suzhou215006 China Georgia Institute of Technology during May 2019 - June 2020 AtlantaGA United States State Key Laboratory of Mathematical Engineering and Advanced Computing Jiangsu Wuxi214125 China Georgia Institute of Technology 801 Atlantic Drive AtlantaGA30332 United States Soochow University 1 Shizi street Jiangsu Suzhou215006 China
Network representation learning (NRL) advances the conventional graph mining of social networks, knowledge graphs, and complex biomedical and physics information networks. Over dozens of network representation learnin... 详细信息
来源: 评论
Non-binary entanglement-assisted quantum stabilizer codes
收藏 引用
Science China(Information Sciences) 2017年 第4期60卷 210-223页
作者: Lan LUO Zhi MA Zhengchao WEI Riguang LENG State Key Laboratory of Mathematical Engineering and Advanced Computing
In this paper, we present the pm-ary entanglement-assisted(EA) stabilizer formalism, where p is a prime and m is a positive integer. Given an arbitrary non-abelian "stabilizer", the problem of code construct... 详细信息
来源: 评论
Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division
收藏 引用
Computers, Materials & Continua 2018年 第4期55卷 71-93页
作者: Wenyan Liu Xiangyang Luo Yimin Liu Jianqiang Liu Minghao Liu Yun Q.Shi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China School of Electronics and Communication Engineering Zhengzhou University of AeronauticsZhengzhou 450001China New Jersey Institute of Technology NJUSA
Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security ***,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight... 详细信息
来源: 评论
A Handover Decision Algorithm Based on Evolutionary Game Theory for Space-ground Integrated Network
A Handover Decision Algorithm Based on Evolutionary Game The...
收藏 引用
2019 International Conference on Wireless Communication, Network and Multimedia engineering(WCNME 2019)
作者: Zhuo Yi Delong Jiang Lifeng Cao Xuehui Du State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and Technology Troop 78123 PLA
When handovers occur to user in space-ground integrated network, handover decisions should be made to select the optimal access point. However, existing decision indexes are not suitable to handover scenarios in space... 详细信息
来源: 评论
A Hierarchically Collaborative Ant Colony Based Assembly Algorithm for Security Protocol
A Hierarchically Collaborative Ant Colony Based Assembly Alg...
收藏 引用
2019 International Conference on Wireless Communication, Network and Multimedia engineering(WCNME 2019)
作者: Zhuo Yi Muming Sun Lifeng Cao Xuehui Du State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and Technology Troop 78123 PLA
Assembly of reconfigurable security protocol remains a major challenge for deploying higher security-level but more complicated security strategies in access points with limited resources and computing abilities. To h... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1584卷
作者: Jinzhu Wang Ruijie Cai Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ...
来源: 评论
Upper security bounds for coherent-one-way quantum key distribution
arXiv
收藏 引用
arXiv 2020年
作者: González-Payo, Javier Trényi, Róbert Wang, Weilong Curty, Marcos Escuela de Ingeniería de Telecomunicación Department of Signal Theory and Communications University of Vigo VigoE-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology ZhengzhouHenan450001 China
The performance of quantum key distribution (QKD) is severely limited by multi-photon pulses emitted by laser sources due to the photon-number splitting attack. Coherent-one-way (COW) QKD has been introduced as a prom... 详细信息
来源: 评论
Demonstration of broadband topological slow light
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Fujia Xue, Haoran Pan, Yuang Wang, Maoren Hu, Yuanhang Zhang, Li Chen, Qiaolu Han, Song Liu, Gui-Geng Gao, Zhen Zhou, Peiheng Yin, Wenyan Chen, Hongsheng Zhang, Baile Yang, Yihao Interdisciplinary Center for Quantum Information State Key Lab. of Modern Optical Instrumentation College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Science and Technology Innovation Center Key Lab. of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang ZJU-UIUC Institute Zhejiang University Hangzhou310027 China Jinhua Institute of Zhejiang University Zhejiang University Jinhua321099 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link Singapore637371 Singapore Centre for Disruptive Photonic Technologies The Photonics Institute Nanyang Technological University 50 Nanyang Avenue Singapore639798 Singapore National Engineering Research Center of Electromagnetic Radiation Control Materials State Key Laboratory of Electronic Thin Film and Integrated Devices University of Electronic Science and Technology of China Chengdu610054 China Department of Electrical and Electronic Engineering Southern University of Science and Technology Shenzhen518055 China
Slow-light devices are able to significantly enhance light-matter interaction due to the reduced group velocity of light, but a very low group velocity is usually achieved in a narrow bandwidth, accompanied by extreme... 详细信息
来源: 评论