咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 798 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 567 篇 工学
    • 281 篇 计算机科学与技术...
    • 262 篇 信息与通信工程
    • 201 篇 软件工程
    • 124 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 57 篇 机械工程
    • 46 篇 电气工程
    • 42 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 296 篇 理学
    • 162 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 31 篇 wireless sensor ...
  • 31 篇 quantum cryptogr...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 institute of qua...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 31 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 15 篇 key lab of broad...
  • 14 篇 national laborat...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...
  • 13 篇 college of mathe...

作者

  • 37 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 19 篇 周澜
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 赵生妹
  • 17 篇 盛宇波
  • 17 篇 chun-hui zhang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui

语言

  • 753 篇 英文
  • 35 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab Broadband Wireless Communication and Sensor Network Technology"
798 条 记 录,以下是711-720 订阅
排序:
Efficient single-photon-assisted entanglement concentration for partially entangled photon pairs
收藏 引用
Physical Review A 2012年 第1期85卷 012307-012307页
作者: Yu-Bo Sheng Lan Zhou Sheng-Mei Zhao Bao-Yu Zheng Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China Beijing National Laboratory for Condensed Matter Physics Institute of Physics Chinese Academy of Sciences Beijing 100190 China
We present two realistic entanglement concentration protocols (ECPs) for pure partially entangled photons. A partially entangled photon pair can be concentrated to a maximally entangled pair with only an ancillary sin... 详细信息
来源: 评论
Age of Information Minimization in Intelligent Reflecting Surface-Aided Covert communications
Age of Information Minimization in Intelligent Reflecting Su...
收藏 引用
IEEE Globecom Workshops
作者: Chao Wang Zan Li Yue Zhao Derrick Wing Kwan Ng Naofal Al-Dhahir State Key Laboratory of Integrated Service Network Xidian University Xi’an China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China School of Electrical Engineering and Telecommunications University of New South Wales Sydney Australia Department of Electrical and Computer Engineering the University of Texas at Dallas Richardson TX USA
In this work, we investigate the covert information freshness in intelligent reflecting surface (IRS)-aided multi antenna communications, where a public full-duplex user (Alice) and a private full-duplex user (Bob) ex... 详细信息
来源: 评论
Twin-field quantum digital signatures
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Chun-Hui Fan, Yu-Teng Zhang, Chun-Mei Guo, Guang-Can Wang, Qin Institute of quantum information and technology Nanjing University of Posts and Telecommunications Nanjing210003 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education NUPT Nanjing210003 China Telecommunication and Networks National Engineering Research Center NUPT Nanjing210003 China Key Laboratory of Quantum Information CAS University of Science and Technology of China Hefei Anhui230026 China
Digital signature is a key technique in information security, especially for identity authentications. Compared with classical correspondence, quantum digital signatures (QDSs) provide a considerably higher level of s... 详细信息
来源: 评论
Requirement-oriented privacy protection analysis architecture in cloud computing
收藏 引用
Journal of communications 2015年 第1期10卷 55-63页
作者: Ke, Changbo Wang, Ruchuan Xiao, Fu Huang, Zhiqiu School of Computer Sci. and Tech./School of Software Nanjing Univ. of Posts and Telecom Nanjing210023 China Jiangsu High Tech Research Key Laboratory for Wireless Sensor Networks NanjingJiangsu210003 China College of computer Sci. and Tech Nanjing Univ. of Aeronautics and Astronautics NanjingJiangsu210016 China Key Lab of Broadband Wireless Communication and Sensor Network Tech Nanjing University of Posts and Telecom Ministry of Education Jiangsu Province NanjingJiangsu210003 China
As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-... 详细信息
来源: 评论
Green Multimedia communications over Internet of Things
Green Multimedia Communications over Internet of Things
收藏 引用
IEEE International Conference on communications
作者: Liang Zhou Min Chen Baoyu Zheng Jingwu Cui Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education School of Computer Science and Engineering Seoul National University
In this paper, we consider a power-aware multimedia communications over internet of things (IoT). Specifically, we consider a generic IoT scenario where a multimedia server provides heterogeneous applications without ... 详细信息
来源: 评论
Upper Bound of Collective Attacks on Quantum key Distribution
arXiv
收藏 引用
arXiv 2019年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Evaluating the theoretical limit of the amount of information Eve can steal from a quantum key distribution protocol under given conditions is one of the most important things that need to be done in security proof. I... 详细信息
来源: 评论
Multiple asymmetric couplings induced unconventional corner mode in topolectrical circuits
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Hengxuan Wang, Xiumei Chen, Jie Zhou, Xingping College of Integrated Circuit Science and Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China Institute of Quantum Information and Technology Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China
We investigate the emergence of unconventional corner mode in a two-dimensional topolectrical circuits induced by asymmetric couplings. The non-Hermitian skin effect of two kinked one-dimensional lattices with multipl... 详细信息
来源: 评论
Privacy amplification scheme based on composite coding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Privacy amplification is an indispensable step in the post-processing of quantum key distribution, which can be used to compress the redundancy of shared key and improve the security level of the key. The commonly use... 详细信息
来源: 评论
Wave-particle duality in single-photon entanglement
arXiv
收藏 引用
arXiv 2019年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
The simplest single-photon entanglement is the entanglement of the vacuum state and the single-photon state between two path modes. The verification of the existence of single-photon entanglement has attracted extensi... 详细信息
来源: 评论
The optimal positive operator-valued measure for state discrimination
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Evaluating the amount of information obtained from non-orthogonal quantum states is an important topic in the field of quantum information. The commonly used evaluation method is Holevo bound, which only provides a lo... 详细信息
来源: 评论