咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 387 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 568 篇 工学
    • 281 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 201 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 46 篇 电气工程
    • 43 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 化学工程与技术
    • 12 篇 安全科学与工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 163 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 12 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 31 篇 wireless sensor ...
  • 31 篇 quantum cryptogr...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 deep learning
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 31 篇 institute of sig...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key lab of broad...
  • 16 篇 key laboratory o...
  • 14 篇 national laborat...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...
  • 13 篇 college of mathe...

作者

  • 39 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 19 篇 周澜
  • 18 篇 chun-hui zhang
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 赵生妹
  • 17 篇 盛宇波
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui

语言

  • 755 篇 英文
  • 35 篇 中文
  • 10 篇 其他
检索条件"机构=Broadband Wireless Communication and Sensor Network Technology Key Lab"
800 条 记 录,以下是711-720 订阅
排序:
Efficient two-step entanglement concentration for arbitrary W states
收藏 引用
Physical Review A 2012年 第4期85卷 042302-042302页
作者: Yu-Bo Sheng Lan Zhou Sheng-Mei Zhao Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China Beijing National Laboratory for Condensed Matter Physics Institute of Physics Chinese Academy of Sciences Beijing 100190 China
We present two two-step practical entanglement concentration protocols for concentrating an arbitrary three-particle less-entangled W state into a maximally entangled W state assisted with single photons. The first pr... 详细信息
来源: 评论
An Expressive, Lightweight and Secure Construction of key Policy Attribute-Based Cloud Data Sharing Access Control
收藏 引用
Journal of Physics: Conference Series 2017年 第1期910卷
作者: Guofen Lin Hanshu Hong Yunhao Xia Zhixin Sun The Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing China
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attri...
来源: 评论
Deep Reinforcement Learning-Based Grant-Free NOMA Optimization for mURLLC
Deep Reinforcement Learning-Based Grant-Free NOMA Optimizati...
收藏 引用
作者: Liu, Yan Deng, Yansha Zhou, Hui Elkashlan, Maged Nallanathan, Arumugam Key Laboratory of Ministry of Education in Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210003 China School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom College of Electronic and Information Engineering Tongji University Shanghai201804 China Department of Engineering King s College London LondonWC2R 2LS United Kingdom Huawei Technology Company Ltd. Shanghai200121 China
Grant-free non-orthogonal multiple access (GF-NOMA) is a potential technique to support massive Ultra-Reliable and Low-Latency communication (mURLLC) service. However, the dynamic resource configuration in GF-NOMA sys... 详细信息
来源: 评论
Efficient single-photon-assisted entanglement concentration for partially entangled photon pairs
收藏 引用
Physical Review A 2012年 第1期85卷 012307-012307页
作者: Yu-Bo Sheng Lan Zhou Sheng-Mei Zhao Bao-Yu Zheng Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China Beijing National Laboratory for Condensed Matter Physics Institute of Physics Chinese Academy of Sciences Beijing 100190 China
We present two realistic entanglement concentration protocols (ECPs) for pure partially entangled photons. A partially entangled photon pair can be concentrated to a maximally entangled pair with only an ancillary sin... 详细信息
来源: 评论
Age of Information Minimization in Intelligent Reflecting Surface-Aided Covert communications
Age of Information Minimization in Intelligent Reflecting Su...
收藏 引用
IEEE Globecom Workshops
作者: Chao Wang Zan Li Yue Zhao Derrick Wing Kwan Ng Naofal Al-Dhahir State Key Laboratory of Integrated Service Network Xidian University Xi’an China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China School of Electrical Engineering and Telecommunications University of New South Wales Sydney Australia Department of Electrical and Computer Engineering the University of Texas at Dallas Richardson TX USA
In this work, we investigate the covert information freshness in intelligent reflecting surface (IRS)-aided multi antenna communications, where a public full-duplex user (Alice) and a private full-duplex user (Bob) ex... 详细信息
来源: 评论
Twin-field quantum digital signatures
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Chun-Hui Fan, Yu-Teng Zhang, Chun-Mei Guo, Guang-Can Wang, Qin Institute of quantum information and technology Nanjing University of Posts and Telecommunications Nanjing210003 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education NUPT Nanjing210003 China Telecommunication and Networks National Engineering Research Center NUPT Nanjing210003 China Key Laboratory of Quantum Information CAS University of Science and Technology of China Hefei Anhui230026 China
Digital signature is a key technique in information security, especially for identity authentications. Compared with classical correspondence, quantum digital signatures (QDSs) provide a considerably higher level of s... 详细信息
来源: 评论
Green Multimedia communications over Internet of Things
Green Multimedia Communications over Internet of Things
收藏 引用
IEEE International Conference on communications
作者: Liang Zhou Min Chen Baoyu Zheng Jingwu Cui Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education School of Computer Science and Engineering Seoul National University
In this paper, we consider a power-aware multimedia communications over internet of things (IoT). Specifically, we consider a generic IoT scenario where a multimedia server provides heterogeneous applications without ... 详细信息
来源: 评论
Upper Bound of Collective Attacks on Quantum key Distribution
arXiv
收藏 引用
arXiv 2019年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Evaluating the theoretical limit of the amount of information Eve can steal from a quantum key distribution protocol under given conditions is one of the most important things that need to be done in security proof. I... 详细信息
来源: 评论
Multiple asymmetric couplings induced unconventional corner mode in topolectrical circuits
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Hengxuan Wang, Xiumei Chen, Jie Zhou, Xingping College of Integrated Circuit Science and Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China Institute of Quantum Information and Technology Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China
We investigate the emergence of unconventional corner mode in a two-dimensional topolectrical circuits induced by asymmetric couplings. The non-Hermitian skin effect of two kinked one-dimensional lattices with multipl... 详细信息
来源: 评论
Privacy amplification scheme based on composite coding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Privacy amplification is an indispensable step in the post-processing of quantum key distribution, which can be used to compress the redundancy of shared key and improve the security level of the key. The commonly use... 详细信息
来源: 评论