咨询与建议

限定检索结果

文献类型

  • 181 篇 期刊文献
  • 143 篇 会议

馆藏范围

  • 324 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 218 篇 工学
    • 85 篇 信息与通信工程
    • 85 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 26 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 25 篇 电气工程
    • 18 篇 机械工程
    • 17 篇 生物工程
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 13 篇 化学工程与技术
    • 8 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
  • 132 篇 理学
    • 74 篇 物理学
    • 43 篇 数学
    • 22 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 15 篇 化学
    • 12 篇 系统科学
  • 31 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 12 篇 医学
    • 11 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 8 篇 法学
    • 6 篇 社会学
  • 2 篇 经济学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 quantum cryptogr...
  • 8 篇 wireless communi...
  • 7 篇 image enhancemen...
  • 7 篇 machine learning
  • 7 篇 channel estimati...
  • 6 篇 resource managem...
  • 6 篇 security
  • 6 篇 network-on-chip
  • 5 篇 simulation
  • 5 篇 three-dimensiona...
  • 5 篇 computer archite...
  • 5 篇 peak to average ...
  • 5 篇 wireless sensor ...
  • 5 篇 ofdm
  • 5 篇 satellites
  • 4 篇 deep neural netw...
  • 4 篇 knowledge graph
  • 4 篇 atoms
  • 4 篇 topology
  • 4 篇 protocols

机构

  • 17 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 school of comput...
  • 14 篇 services computi...
  • 14 篇 school of inform...
  • 13 篇 institute of qua...
  • 13 篇 purple mountain ...
  • 13 篇 cluster and grid...
  • 12 篇 key lab of broad...
  • 10 篇 school of softwa...
  • 9 篇 key lab of optic...
  • 8 篇 national mobile ...
  • 7 篇 university of sc...
  • 7 篇 national mobile ...
  • 7 篇 cas key laborato...
  • 6 篇 china academy of...
  • 6 篇 hefei university...
  • 6 篇 science and tech...

作者

  • 12 篇 timofte radu
  • 12 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 10 篇 zhou heng
  • 9 篇 jin hai
  • 8 篇 qiu kun
  • 8 篇 zhou ziqi
  • 8 篇 guy gogniat
  • 8 篇 li minghui
  • 7 篇 guang-can guo
  • 7 篇 guo guang-can
  • 7 篇 wan wei
  • 7 篇 marius strum
  • 6 篇 ricardo pires
  • 6 篇 zhang zhao
  • 6 篇 huang jie
  • 6 篇 qin wang
  • 6 篇 lei lei
  • 6 篇 wang cheng-xiang
  • 6 篇 geng yong

语言

  • 311 篇 英文
  • 10 篇 其他
  • 3 篇 中文
检索条件"机构=Information and Communication Science and Technology Laboratory Lab-STICC"
324 条 记 录,以下是191-200 订阅
排序:
A Novel Channel Estimation Scheme for Frequency-Selective mmWave Massive MIMO Systems
A Novel Channel Estimation Scheme for Frequency-Selective mm...
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Zhigang Song Jian Sun Wensheng Zhang Cheng-Xiang Wang Minggao Zhang Shandong Provincial Key Lab of Wireless Communication Technologies School of Information Science and Engineering Shandong University Qingdao China The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China National Mobile Communications Research Laboratory School of Information Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories Nanjing China
In this paper, a two-stage channel estimation scheme is presented for frequency-selective millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems with hybrid precoding. Specifically, at the firs...
来源: 评论
NTIRE 2023 Challenge on Light Field Image Super-Resolution: Dataset, Methods and Results
NTIRE 2023 Challenge on Light Field Image Super-Resolution: ...
收藏 引用
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Wang, Yingqian Wang, Longguang Liang, Zhengyu Yang, Jungang Timofte, Radu Guo, Yulan Jin, Kai Wei, Zeqiang Yang, Angulia Guo, Sha Gao, Mingzhi Zhou, Xiuzhuang Van Duong, Vinh Huu, Thuc Nguyen Yim, Jonghoon Jeon, Byeungwoo Liu, Yutong Cheng, Zhen Xiao, Zeyu Xu, Ruikang Xiong, Zhiwei Liu, Gaosheng Jin, Manchang Yue, Huanjing Yang, Jingyu Gao, Chen Zhang, Shuo Chang, Song Lin, Youfang Chao, Wentao Wang, Xuechun Wang, Guanghui Duan, Fuqing Xia, Wang Wang, Yan Xia, Peiqi Wang, Shunzhou Lu, Yao Cong, Ruixuan Sheng, Hao Yang, Da Chen, Rongshan Wang, Sizhe Cui, Zhenglong Chen, Yilei Lu, Yongjie Cai, Dongjun An, Ping Salem, Ahmed Ibrahem, Hatem Yagoub, Bilel Kang, Hyun-Soo Zeng, Zekai Wu, Heng National University of Defense Technology China Aviation University of Air Force China University of Würzburg Germany Eth Zürich Switzerland Sun Yat-sen University The Shenzhen Campus of Sun Yat-sen University China Bigo Technology Pte. Ltd. Singapore Smart Medical Innovation Lab Beijing University of Posts and Telecommunications China Global Explorer Ltd. Suzhou China National Engineering Research Center of Visual Technology School of Computer Science Peking University China School of Artificial Intelligence Beijing University of Posts and Telecommunications China Department of Electrical and Computer Engineering Sungkyunkwan University Korea Republic of University of Science and Technology of China China School of Electrical and Information Engineering Tianjin University China Beijing Key Lab of Traffic Data Analysis and Mining School of Computer and Information Technology Beijing Jiaotong University China Beijing Normal University China Toronto Metropolitan University Canada Beijing Institute of Technology China Shenzhen MSU-BIT University China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University China Beihang Hangzhou Innovation Institute Yuhang China Faculty of Applied Sciences Macao Polytechnic University China School of Communication and Information Engineering Shanghai University China School of Information and Communication Engineering Chungbuk National University Korea Republic of Guangdong University of Technology China
In this report, we summarize the first NTIRE challenge on light field (LF) image super-resolution (SR), which aims at super-resolving LF images under the standard bicubic degradation with a magnification factor of 4. ... 详细信息
来源: 评论
Characterizing Kerr Optical Frequency Combs Using Quantum Interference
Characterizing Kerr Optical Frequency Combs Using Quantum In...
收藏 引用
Asia communications and Photonics Conference and Exhibition (ACP)
作者: Jin Guo Yun-Ru Fan Yong Geng Guang-Wei Deng Hai-Zhi Song You Wang Li-Xing You Zhen Wang Heng Zhou Kun Qiu Guang-Can Guo Qiang Zhou Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu China Key Lab of Optical Fiber Sensing and Communication Networks University of Electronic Science and Technology of China Chengdu China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Southwest Institute of Technical Physics Chengdu China Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei China
For the first time, we characterize the properties of Kerr optical frequency combs using quantum optics. The temporal FWHM of single soliton state is obtained as $\boldsymbol{109.8\pm 6.5}$ fs within the Fourier tra...
来源: 评论
Measuring the Orbital-Angular-Momentum Complex Spectrum of Light with the Fast Fourier Transform
收藏 引用
Physical Review Applied 2023年 第1期20卷 014010-014010页
作者: Jialong Zhu Yihua Wu Le Wang Hailong Zhou Shengmei Zhao Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications (NUPT) Nanjing 210003 China School of Information Engineering Suqian University Suqian 223800 China Wuhan National Laboratory for Optoelectronics School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan 430074 China Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Nanjing China National Laboratory of Solid State Microstructures Nanjing University Nanjing 210093 China
Measuring the orbital-angular-momentum (OAM) complex spectrum of light is very important in OAM-based applications. In this paper, we propose and experimentally demonstrate a simple scheme to measure the OAM complex s... 详细信息
来源: 评论
A Method of Shadowsocks(R) Traffic Identification Based on Protocol Analysis
A Method of Shadowsocks(R) Traffic Identification Based on P...
收藏 引用
International Conference on communication technology (ICCT)
作者: Jie Luo Liang Bao Lvlin Ni Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu Sichuan China Key Lab of Information Network Security of Ministry of Public Security The Third Research Institute of Ministry of Public Security Shanghai China
Shadowsocks (R) is a proxy software based on Socks5, which is the collective name of Shadowsocks and Shadowsocks (R). In order to improves the shortcomings of other softwares breaking internet censorship, Shadowsocks ... 详细信息
来源: 评论
Deep high-order supervised hashing
收藏 引用
Optik 2019年 180卷 847-857页
作者: Jing Dong Cheng Qiu Le Sun Jian Xin Zhang Christian Desrosiers Bin Liu Jian Lu Qiang Zhang Key Lab of Advanced Design and Intelligent Computing (Ministry of Education) Dalian University Dalian 116622 China School of Information and Communication Engineering Dalian University of Technology Dalian 116024 China Laboratory for Imagery Vision and Artificial Intelligence (LIVAI) École de technologie supérieure (ETS) Montreal H3C1K3 Canada International School of Information Science and Engineering (DUT-RUISE) Dalian University of Technology Dalian 116622 China School of Computer Science and Technology Dalian University of Technology Dalian 116024 China
Recently, deep hashing has achieved excellent performance in large-scale image retrieval by simultaneously learning deep features and hash function. However, state-of-the-art methods for this task have so far failed t... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit Networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
Defense technology of Wormhole Attacks Based on Node Connectivity
Defense Technology of Wormhole Attacks Based on Node Connect...
收藏 引用
IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)
作者: Jiu-hu Zheng Huan-yan Qian Lei Wang School of Information Technology Jiangsu Institute of Commerce Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China National Mobile Communications esearch Laboratory Southeast University Nanjing Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing Jiangsu China
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, r... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论