咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 12 篇 信息与通信工程
    • 10 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 4 篇 光学工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 电气工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 网络空间安全
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 15 篇 理学
    • 10 篇 物理学
    • 7 篇 数学
    • 1 篇 化学
    • 1 篇 大气科学
  • 6 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 2 篇 quantum systems
  • 2 篇 quantum entangle...
  • 2 篇 boolean function...
  • 2 篇 iterative method...
  • 2 篇 quantum communic...
  • 1 篇 image enhancemen...
  • 1 篇 ciphertext
  • 1 篇 fifth
  • 1 篇 proxy
  • 1 篇 supporting
  • 1 篇 degrees of freed...
  • 1 篇 qubits
  • 1 篇 quantum noise
  • 1 篇 queuing strategy
  • 1 篇 quantum simulati...
  • 1 篇 ultracold gases
  • 1 篇 quantum informat...
  • 1 篇 braid group
  • 1 篇 topological effe...
  • 1 篇 encoding (symbol...

机构

  • 18 篇 state key labora...
  • 4 篇 department of el...
  • 4 篇 beijing universi...
  • 3 篇 centre for quant...
  • 3 篇 shanghai branch ...
  • 2 篇 pillar of inform...
  • 2 篇 indian institute...
  • 2 篇 department of ph...
  • 2 篇 centre for quant...
  • 2 篇 the state key la...
  • 2 篇 hefei national l...
  • 1 篇 department of co...
  • 1 篇 school of cybers...
  • 1 篇 5gic & 6gic univ...
  • 1 篇 program in quant...
  • 1 篇 singapore univer...
  • 1 篇 nanyang technolo...
  • 1 篇 2. state key lab...
  • 1 篇 department of el...
  • 1 篇 school of engine...

作者

  • 4 篇 zhang ping
  • 3 篇 tian hui
  • 3 篇 shen xuemin
  • 3 篇 quek tony q.s.
  • 3 篇 fei gao
  • 3 篇 qiaoyan wen
  • 3 篇 c. h. oh
  • 2 篇 niyato dusit
  • 2 篇 goyal sandeep k.
  • 2 篇 sandeep k. goyal
  • 2 篇 barry c. sanders
  • 2 篇 sanders barry c.
  • 2 篇 han zhu
  • 2 篇 sixia yu
  • 2 篇 zhang wei-wei
  • 2 篇 xiong zehui
  • 2 篇 mao shiwen
  • 2 篇 wei-wei zhang
  • 2 篇 ni wanli
  • 2 篇 ping zhang

语言

  • 32 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=2. State Key Laboratory of Networking and Switching Technology"
34 条 记 录,以下是1-10 订阅
排序:
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2.2.), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
User-Centric Multi-Static Sensing for Joint User and Target Tracking in Mobile Wireless Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Hu, Boyang Tian, Hui Ni, Wei Fan, Shaoshuai Hossain, Ekram Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China University of Technology Faculty of Engineering and Information Technology SydneyNSW2007 Australia University of Manitoba Department of Electrical and Computer Engineering WinnipegMBR3T 2N2 Canada
This paper presents a novel user-centric sensing framework, where a user equipment (UE) acts as the receiver of a multi-static radar sensing system and utilizes the communication signals emitted by base stations (BSs)... 详细信息
来源: 评论
Plugging and Breathing on the Air: A Practical Defense System for Deep Learning-based Wireless Semantic Communications
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Qiu, Chenyang Nan, Guoshun Liang, Ruiwen Deng, Wendi Zhang, Yufan Gao, Yuchong Wang, Di Qu, Meng Duan, Zhuoran Sun, Qianlong Cui, Qimei Xu, Xiaodong Tao, Xiaofeng Quek, Tony Q.S. National Engineering Research Center for Mobile Network Technologies China Quebec Ai Institute Mila QCH2S 3H1 Canada Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing102206 China Singapore University of Technology and Design 487372 Singapore Kyung Hee University Department of Electronic Engineering Yongin17104 Korea Republic of
Deep learning-based semantic communications (DLSC) leverage deep neural networks in transmitters and receivers, pushing the boundaries beyond Shannon limit. However, DLSC is extremely vulnerable to malicious physical-... 详细信息
来源: 评论
STAR-RIS Enabled ISAC Systems With RSMA: Joint Rate Splitting and Beamforming Optimization
收藏 引用
IEEE Transactions on Cognitive Communications and networking 2025年
作者: Liu, Yuan Zhang, Ruichen Jiang, Ruihong Zhu, Yongdong Hu, Huimin Ni, Qiang Fei, Zesong Niyato, Dusit Zhejiang Laboratory Research Center for Space Computing System Hangzhou311100 China Nanyang Technological University College of Computing and Data Science Singapore 639798 Singapore Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Cambridge Mechatronics Ltd CambridgeCB1 2PH United Kingdom Xi’an University of Posts and Telecommunications School of Communications and Information Engineering School of Artificial Intelligence Xi’an710121 China Lancaster University School of Computing and Communications LancasterLA1 4WA United Kingdom Beijing Institute of Technology School of Information and Electronics Beijing100081 China
This paper delves into an integrated sensing and communication (ISAC) system bolstered by a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). Within this system, a base station ... 详细信息
来源: 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2.1 College of Computer Science and technology,Beijing University of technology,Beijing 10012.,China 2.{2. key laboratory of networking and switching technology,Beijing University of Posts and Tele-communications,Beijing 100876,China 3 {2. key laboratory of Integrated Services Network,Xidian University,Xi’an 710071,China 4 {2. key laboratory of Information Security(Graduate University of Chinese Academy of Sciences) ,Beijing 100049,China 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China 2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 评论
Practical conditions of signal space alignment for generalized MIMO Y channel
收藏 引用
Science China(Information Sciences) 2012年 第10期55卷 2171-2182页
作者: SHE JiaJu 1,2.CHEN ShanZhi 1,2.HU Bo 1,WANG YingMin 2.& SU Xin 2.1 state key {2. of networking and switching technology,Beijing University of Posts and Telecommunications,Beijing 100876,China 2.state key {2. of Wireless Mobile Communications,China Academy of Telecommunications technology,Beijing 100191,China 1. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. State Key Laboratory of Wireless Mobile Communications China Academy of Telecommunications Technology Beijing 100191 China
This paper proposes a generalization for applications of signal space alignment(SSA) in a generalized multiple input multiple output(MIMO) Y channel with K(K 2. nodes and an intermediate *** on that generalization,a m... 详细信息
来源: 评论
Controlled cyclic remote preparation
收藏 引用
Communications in Theoretical Physics 2023年 第10期75卷 60-70页
作者: Li Gong Songya Ma Junli Jiang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Beijing 100876China 2 School of Mathematics and StatisticsHenan UniversityKaifeng 475004China Institute of Mathematics Henan Academy of SciencesZhengzhou 450046China
Multi-party quantum communication has gradually attracted widespread *** realize the perfect transmission of quantum states among multiple participants,a novel multi-party controlled cyclic remote preparation protocol... 详细信息
来源: 评论
Editorial for the Special Issue on 6G Requirements,Vision,and Enabling Technologies
收藏 引用
Engineering 2022年 第1期8卷 1-2页
作者: Ping Zhang Xuemin(Sherman)Shen Jianhua Zhang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Electrical and Computer Engineering University of WaterlooWaterlooON N2L 3G1Canada
As the commercialization process of the fifth-generation(5G)communication systems accelerates,research on the sixth genera-tion(6G)is being placed on the agenda in academic and industrial communities all over the worl... 详细信息
来源: 评论
Conjugate adjoining problem in braid groups and new design of braid-based signatures
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 524-536页
作者: WANG LiCheng1,2. WANG LiHua2. CAO ZhenFu3, YANG YiXian1 & NIU XinXin1 Information Security Center, state key {2. of networking and switching technology, Beijing University of Posts and Telecommunications, Beijing 100876, China 2.ational Institute of Information and Communications technology, Tokyo 184-8795, Japan 3Trusted Digital technology {2., Shanghai Jiao Tong University, Shanghai 2.02.0, China 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. National Institute of Information and Communications Technology Tokyo 184-8795 Japan3. Trusted Digital Technology Laboratory Shanghai Jiao Tong University Shanghai 200240 China
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting... 详细信息
来源: 评论
On the construction of multi-output Boolean functions with optimal algebraic immunity
收藏 引用
Science China(Information Sciences) 2012年 第7期55卷 1617-1623页
作者: ZHANG Jie 1,2.,SONG ShouChao 1 ,DU Jiao 2.3 & WEN QiaoYan 2.1 School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,China 2.state key {2. of networking and switching technology,Beijing University of Posts and Telecommunications,Beijing 100876,China 3 Department of Mathematics,Xinxiang University,Xinxiang 453003,China 1. School of Science Beijing University of Posts and Telecommunications Beijing 100876 China2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China3. Department of Mathematics Xinxiang University Xinxiang 453003 China
In this paper,we show a construction of multi-output Boolean functions with optimal algebraic ***,the relationship between the algebraic immunity of a multi-output Boolean function and those of its component functions... 详细信息
来源: 评论