咨询与建议

限定检索结果

文献类型

  • 182 篇 期刊文献
  • 144 篇 会议

馆藏范围

  • 326 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 213 篇 工学
    • 85 篇 信息与通信工程
    • 85 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 40 篇 光学工程
    • 26 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 24 篇 电气工程
    • 18 篇 机械工程
    • 17 篇 生物工程
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 13 篇 化学工程与技术
    • 8 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
  • 132 篇 理学
    • 74 篇 物理学
    • 43 篇 数学
    • 22 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 15 篇 化学
    • 12 篇 系统科学
  • 31 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 13 篇 医学
    • 11 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 8 篇 法学
    • 6 篇 社会学
  • 2 篇 经济学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 10 篇 quantum cryptogr...
  • 8 篇 wireless communi...
  • 7 篇 image enhancemen...
  • 7 篇 machine learning
  • 7 篇 channel estimati...
  • 6 篇 resource managem...
  • 6 篇 security
  • 6 篇 network-on-chip
  • 5 篇 simulation
  • 5 篇 three-dimensiona...
  • 5 篇 computer archite...
  • 5 篇 peak to average ...
  • 5 篇 wireless sensor ...
  • 5 篇 ofdm
  • 5 篇 satellites
  • 4 篇 deep neural netw...
  • 4 篇 knowledge graph
  • 4 篇 atoms
  • 4 篇 topology
  • 4 篇 protocols

机构

  • 17 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 school of comput...
  • 14 篇 services computi...
  • 14 篇 school of inform...
  • 13 篇 institute of qua...
  • 13 篇 purple mountain ...
  • 13 篇 cluster and grid...
  • 12 篇 key lab of broad...
  • 10 篇 school of softwa...
  • 9 篇 key lab of optic...
  • 8 篇 national mobile ...
  • 7 篇 university of sc...
  • 7 篇 national mobile ...
  • 7 篇 cas key laborato...
  • 6 篇 china academy of...
  • 6 篇 hefei university...
  • 6 篇 science and tech...

作者

  • 12 篇 timofte radu
  • 12 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 10 篇 zhou heng
  • 9 篇 jin hai
  • 8 篇 qiu kun
  • 8 篇 zhou ziqi
  • 8 篇 guy gogniat
  • 8 篇 li minghui
  • 7 篇 guang-can guo
  • 7 篇 guo guang-can
  • 7 篇 wan wei
  • 7 篇 marius strum
  • 6 篇 ricardo pires
  • 6 篇 zhang zhao
  • 6 篇 huang jie
  • 6 篇 qin wang
  • 6 篇 lei lei
  • 6 篇 geng yong
  • 5 篇 xu ruikang

语言

  • 312 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"机构=Information and Communication Science and Technology Laboratory Lab-STICC"
326 条 记 录,以下是161-170 订阅
排序:
Min-max Path Planning of Multiple UAVs for Autonomous Inspection
Min-max Path Planning of Multiple UAVs for Autonomous Inspec...
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Jiayue Liu Yan Zhang Xijun Wang Chao Xu Xiao Ma State Key Lab of Integrated Service Networks Information Science Institute Xidian University Xi'an China Science and Technology on Communication Network Laboratory Shijiazhuang China School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Shaanxi Normal University Xi'an P. R. China
In this paper, we study the path planning for autonomous inspection with multiple UAVs in a certain area to minimize the maximum flight distance of the UAV. Particularly, the UAVs are dispatched from the same depot to... 详细信息
来源: 评论
Terahertz Frequency Reconfigurable Slot Antenna Based on Graphene
Terahertz Frequency Reconfigurable Slot Antenna Based on Gra...
收藏 引用
Electronics, Circuits and information Engineering (ECIE), International Conference on
作者: Qinglin Wu Weiping Cao Qingyong Wang Yumei Luo School of Information and Communications Guilin University of Electronic Science and Technology Gui Lin China Guangxi Key Lab of Wireless Wideband Communication and Signal Processing School of Information and Communications Guilin University of Electronic Science and Technology Gui Lin China Guangxi Key Laboratory of Precision Navigation Technology and Application Guilin University of Electronic Technology Gui Lin China
Toaddress the demands of high data rate transmission, multifunctionality, and miniaturization in modern communication devices, a novel design for a frequency-reconfigurable terahertz patch antenna is proposed using gr... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Signal Tensor Model and Eigenvalue Distributions for THz Uplink UM-MIMO communications
Signal Tensor Model and Eigenvalue Distributions for THz Upl...
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Bin Qi Wensheng Zhang Qiang Li Jian Sun Zhi Liu Chen Wang Cheng-Xiang Wang Shandong Provincial Key Lab of Wireless Communication Technologies School of Information Science and Engineering Shandong University Qingdao China School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China National Mobile Communications Research Laboratory School of Information Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories Nanjing China
Tensor theory has been widely used in the research field of wireless communications. Tensor eigenvalues are usually considered key parameters of tensors. However, the exact physical or practical meanings of tensor eig...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
An improved M-ary MC-CDMA for mobile communication systems
An improved M-ary MC-CDMA for mobile communication systems
收藏 引用
Asia-Pacific Radio science Conference
作者: Yanjun Hu Jinkang Zhu Dept. of Electronics Engineering & Information Science Anhui University. Hefei Anhui P.R.China Personal Communication Network & Spread Spectrum Laboratory University of Science and Technology Anhui China Personal Communication Network & Spread Spectrum Lab. University of Science and Technology of China. Hefei Anhui P. R. China
The multi-carrier (MC) CDMA technique can reduce the interference and improve the performance of the system in fading channels. In this paper, to transmit high rate data, an improved novel M-ary MC-CDMA technique is p... 详细信息
来源: 评论
Generative Adversarial Network-based Channel Modeling for Free-Space Optical communication
Generative Adversarial Network-based Channel Modeling for Fr...
收藏 引用
OptoElectronics and communications Conference, OECC
作者: Wenbin Chen Danshi Wang Dongdong Wang Yuchen Song Jin Li Min Zhang State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Science and Technology on Communication Networks Laboratory Shijiazhuang China The 54th Research Institute of China Electronics Technology Group Corporation Shijiazhuang China Purple Mountain Lab Nanjing China
Two deep learning-based differentiable models based on GAN and BiLSTM are proposed for FSO channel modeling. Through contrastive analysis, it shows that GAN is more suitable for learning FSO channel distribution with ... 详细信息
来源: 评论
The reliability-enhanced wireless networks through BATS codes
The reliability-enhanced wireless networks through BATS code...
收藏 引用
IEEE International Symposium on Consumer Electronics (ISCE)
作者: Xiaoping Dong Yu Zhang Jian Song Hang Zhang Department of Electronic Engineering National Engineering Lab. for DTV Beijing P. R. China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang P.R. China
Network coding (NC) is a promising method used to achieve the channel capacity and enhance the reliability of multicast networks. However, the general wireless multicast networks based on NC are facing big problems su... 详细信息
来源: 评论
Device-independent quantum secure direct communication against collective attacks
收藏 引用
science Bulletin 2020年 第1期65卷 12-20,M0003页
作者: Lan Zhou Yu-Bo Sheng Gui-Lu Long School of Science Nanjing University of Posts and TelecommunicationsNanjing 210003China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China State Key Laboratory of Low-dimensional Quantum Physics Beijing 100084China Department of Physics Tsinghua UniversityBeijing 100084China
"Device-independent"not only represents a relaxation of the security assumptions about the internal working of the quantum devices,but also can enhance the security of the quantum *** the paper,we put forwar... 详细信息
来源: 评论