咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 797 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 567 篇 工学
    • 281 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 201 篇 软件工程
    • 124 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 57 篇 机械工程
    • 46 篇 电气工程
    • 42 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 296 篇 理学
    • 162 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 16 篇 quality of servi...
  • 16 篇 interference
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 institute of qua...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 31 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 15 篇 key lab of broad...
  • 14 篇 national laborat...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...
  • 13 篇 college of mathe...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 751 篇 英文
  • 35 篇 中文
  • 11 篇 其他
检索条件"机构=Broadband Wireless Communication and Sensor Network Technology Key Lab"
797 条 记 录,以下是231-240 订阅
排序:
Secrecy Outage Probability Analysis Based on Cognitive Decode-and-Forward Relaying
收藏 引用
Computers, Materials & Continua 2020年 第3期62卷 1387-1395页
作者: Ruoyu Su Xiaojun Sun Fei Ding Dengyin Zhang Hongbo Zhu M.I.M.Wahab Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Tele-CommunicationsNanjing210003China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China School of Information Science and Engineering Southeast UniversityNanjing210018China Department of Electrical and Computer Engineering Faculty of Engineering and Applied ScienceMemorial University of NewfoundlandSt.John’sA1B 3X5Canada Department of Mechanical and Industrial Engineering Ryerson UniversityToronto M5B 2K3Canada
wireless communications have to face to several different security issues in practice due to the nature of *** information theory is well known to provide efficient approaches to address security issues in wireless co... 详细信息
来源: 评论
Optimization on Cooperative communications Based on network Coding in Multi-hop wireless networks
Optimization on Cooperative Communications Based on Network ...
收藏 引用
International wireless communications and Mobile Computing Conference, IWCMC
作者: Xiande Bu Chuan Liu Qiang Yu Lei Yin Feng Tian State Grid Laboratory of Electric Power Communication Network Global Energy Interconnection Research Institute Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Universityof Posts and Telecommunications) Ministry of Education Nanjing China
Cooperative communications (CC) based on network coding (NC) can significantly increase the capacity of wireless networks. In this paper, we investigate how to apply NC in multi-hop wireless networks with multiple rel... 详细信息
来源: 评论
Fog node selection for low latency communication and anomaly detection in fog networks
Fog node selection for low latency communication and anomaly...
收藏 引用
2019 International Conference on communications, Information System, and Computer Engineering, CISCE 2019
作者: Li, Yuxiao Zhang, Yazhong Liu, Yuxiang Meng, Qingmin Tian, Feng Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education College of Telecommunications and Information Engineering Nanjing210003 China
The application of 5G in IOT (Internet of things) puts forward strict requirements for network latency. In view of the fog network scenario with large-scale IOT devices, this paper proposes a procedure of unsupervised... 详细信息
来源: 评论
Privacy amplification scheme based on composite coding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Privacy amplification is an indispensable step in the post-processing of quantum key distribution, which can be used to compress the redundancy of shared key and improve the security level of the key. The commonly use... 详细信息
来源: 评论
The optimal positive operator-valued measure for state discrimination
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Evaluating the amount of information obtained from non-orthogonal quantum states is an important topic in the field of quantum information. The commonly used evaluation method is Holevo bound, which only provides a lo... 详细信息
来源: 评论
Measurement-device-independent quantum secure direct communication
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2020年 第3期63卷 2-7页
作者: ZengRong Zhou Yu Bo Sheng PengHao Niu LiuGuo Yin GuiLu Long Lajos Hanzo State Key Laboratory of Low-dimensional Quantum Physics Beijing 100084China Department of Physics Tsinghua UniversityBeijing 100084China Collaborative Innovation Center of Quantum Matter Beijing 100084China Beijing Academy of Quantum Information Beijing 100084China Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China College of Telecommunications&Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China Beijing National Research Center for Information Science and Technology Beijing 100084China School of Information and Technology Tsinghua UniversityBeijing 100084China School of Electronics and Computer Science University of SouthamptonSouthampton SO171BJUK
Quantum secure direct communication(QSDC)is a unique technique,which supports the secure transmission of confidential information directly through a quantum channel without the need for a secret key and for *** this s... 详细信息
来源: 评论
A Survey of Trusted network Trust Evaluation Methods  2nd
A Survey of Trusted Network Trust Evaluation Methods
收藏 引用
2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019
作者: Yin, An-Sheng Zhang, Shun-Yi Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210023 China Department of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
The proposed trusted network is respond to the increasingly prominent internal network security threats. At present, research on trusted networks focuses on two aspects: pre-network access check and dynamic evaluation... 详细信息
来源: 评论
A general deep reinforcement learning framework for grant-free NOMA optimization in mURLLC
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Yan Deng, Yansha Zhou, Hui Elkashlan, Maged Nallanathan, Arumugam Key Laboratory of Ministry of Education in Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210003 China School of Electronic Engineering and Computer Science Queen Mary University of London London United Kingdom Department of Engineering King's College London London United Kingdom
Grant-free non-orthogonal multiple access (GF-NOMA) is a potential technique to support massive Ultra-Reliable and Low-Latency communication (mURLLC) service. However, the dynamic resource configuration in GF-NOMA sys... 详细信息
来源: 评论
Accurate and fast DV-hop localization algorithm in irregular networks  5th
Accurate and fast DV-hop localization algorithm in irregular...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Yan, Xiaoyong Feng, Xiang Sun, Zhixin Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China YuanTong Express Co. LTD. Shanghai201705 China
The DV-hop localization algorithm does not depend on any measurement hardware, which only uses hop-counts to describe the Euclidean distance between nodes, it will not generate any additional burden, and thus this lig... 详细信息
来源: 评论
Logic W-state concentration with parity check
Quantum Engineering
收藏 引用
Quantum Engineering 2021年 第2期3卷
作者: Zhou, Lan Liu, Jiu Liu, Ze-Kai Zhong, Wei Sheng, Yu-Bo School of Science Nanjing University of Posts and Telecommunications Nanjing China Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing China College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China
Logic W state, which replaces each physical qubit in a W state with a Greenberger–Horne–Zeilinger state is robust against photon transmission loss in long-distance quantum communication. In practical application, th... 详细信息
来源: 评论