Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 95 matches
- 2020
- Zhijie Han, Yinyun Fu, Xiaoyu Du:
Review of the embedding of hypercube and its variants. CIAT 2020: 330-334 - Zhijie Han, Panpan Meng, Xiaoyu Du:
DSnow: A Durer pentagon Snow structure for data center network. CIAT 2020: 576-581 - Yinyin Cai, Zhaoquan Gu, Le Wang, Shudong Li, Weihong Han:
An APT Group Knowledge Model based on MDATA. CIAT 2020: 374-378 - Shicong Chen, Shuhua Huang, Deyu Yuan, Xiaofan Zhao:
A Survey of Algorithms and Applications Related with Graph Embedding. CIAT 2020: 181-185 - Haowen Chen, Jinyu Xu, Chao Wu:
Multi-UAV task assignment based on improved Wolf Pack Algorithm. CIAT 2020: 109-115 - Jinyin Chen, Longyuan Zhang, Haibin Zheng, Qi Xuan:
SPA: Stealthy Poisoning Attack. CIAT 2020: 303-309 - Xinda Cheng, Ning Hu, Chi Zhang, Yan Zhao:
Fading with the Time: A Traceless Access Scheme for Anonymous Communication Network. CIAT 2020: 271-276 - Xiaoyu Du, Zhiyu Zhao, Zhijie Han, Bo Wang:
Data center network acquisition symptom algorithm based on Hamiltonian Cycle. CIAT 2020: 65-69 - Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:
A Novel Malware Detection Framework Based on Weighted Heterograph. CIAT 2020: 39-43 - Fuyang Fang, Daojuan Zhang, Chonghua Wang, De Zhang, Yuanfei Zhang, Chao Li, Xi Luo, Ye Fu:
Identification of important nodes on large-scale Internet based on unsupervised learning. CIAT 2020: 121-129 - Yuhao Han, Zhiting Xiong:
Fly-Manager: Enabling Efficient and Reliable Management of High-performance Network Chip. CIAT 2020: 317-323 - Daojun Han, Hongzhen Xiang, Haolin Chen, Yi Xie:
Research on Penetration Strategy of UAV. CIAT 2020: 95-102 - Shen He, Jun Fu, Wen Jiang, Yexia Cheng, Jiake Chen, Zhihui Guo:
BloTISRT: Blockchain-based Threat Intelligence Sharing and Rating Technology. CIAT 2020: 524-534 - Ruihui Hou, Hanhao Li, Honghai Feng, Yunpeng Li, Jun Li, Yatian Shen:
An entity relation extraction algorithm based on BERT(wwm-ext)-BiGRU-Attention. CIAT 2020: 130-135 - Dongqiu Huang, Zhihong Tian, Shen Su, Yu Jiang:
A defense scheme of voice control system against DolphinAttack. CIAT 2020: 136-142 - Suyu Huang, Bo Zhang:
Research and improvement of k-means parallel multi-association clustering algorithm. CIAT 2020: 164-168 - Su Jiang, Yunxin Huang, Fuhan Zhang:
Deep Learning Reconstruction Method of Meteorological Radar Echo Data based on Satellite Data. CIAT 2020: 70-74 - Haoren Ke, Hao Wu, Dongmei Yang:
Towards Evolving Security Requirements of Industrial Internet: A Layered Security Architecture Solution based on Data transfer Techniques. CIAT 2020: 504-511 - Dehua Kong, Hongyan Dong, Huyuan Li, Zhuowei Wang, Jiang Li:
Research on Situation Analysis Technology of Network Security Incidents. CIAT 2020: 213-218 - Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:
Resume Extraction and Validation from Public Information. CIAT 2020: 355-359 - Yanru Kong, Jiawu Yue:
Game Studies on Accounting Entity Behavior Based on Blockchain Technology. CIAT 2020: 512-518 - Jie Li, Shuai Ding, Xiaoyu Du, Zhijie Han:
The Analysis of Hamiltonian based on HCN network topology. CIAT 2020: 176-180 - Yinyin Li, Xiaoyu Du, Sufang Zhou:
A lightweight identity authentication scheme for UAV and road base stations. CIAT 2020: 54-58 - Ziyuan Li, Wangshu Guo, Quan Xu, Yingjie Xu, Huimei Wang, Ming Xian:
Research on Blockchain Smart Contracts Vulnerability and A Code Audit Tool based on Matching Rules. CIAT 2020: 484-489 - Zheng Li, Zhikang Shi, Xueyuan Huang, Di Jin, Chun Liu:
An Approach for Constructing Service Developers Oriented Heterogeneous Information Network. CIAT 2020: 236-243 - Qinan Li, Zhihao Xue:
A Privacy-Protecting Authorization System Based on Blockchain and zk-SNARK. CIAT 2020: 439-444 - Jingwei Li, Chong Zhang, Xiangzhan Yu:
Webpage visual feature extraction and similarity algorithm. CIAT 2020: 80-85 - Tao Liu:
Informatization construction of human resource management in retail industry based on SaaS platform. CIAT 2020: 290-294 - Tao Liu, Xiaohong Cao, HeFang Jiang, Jinwen Xi, Shaocheng Wu, Yueming Lu:
Research and Application of Blockchain Technology in Smart Grid. CIAT 2020: 535-542 - Tao Liu, Xiaohong Cao, Jin Li, Shaocheng Wu, Xiaowei Chen, Yueming Lu:
Blockchain-based privacy protection scheme for electric energy metering data. CIAT 2020: 477-483
skipping 65 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-14 20:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint