咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 85 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 12 篇 船舶与海洋工程
    • 10 篇 网络空间安全
    • 9 篇 机械工程
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 59 篇 理学
    • 32 篇 数学
    • 30 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 33 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 9 篇 法学
    • 5 篇 社会学
    • 4 篇 法学
  • 3 篇 文学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 7 篇 data privacy
  • 7 篇 costs
  • 7 篇 blockchain
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 48 篇 college of under...
  • 23 篇 acoustic science...
  • 19 篇 the state key la...
  • 19 篇 key laboratory o...
  • 18 篇 national key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 institute of blo...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 liu songzuo
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 yang ziqi
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 shang zhigang
  • 3 篇 zhang haigang
  • 3 篇 qin zhan

语言

  • 183 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
193 条 记 录,以下是51-60 订阅
排序:
An improved least mean square/fourth direct adaptive equalizer for under-water acoustic communications in the Arctic
收藏 引用
Acta Oceanologica Sinica 2020年 第9期39卷 133-139页
作者: Yanan Tian Xiao Han Jingwei Yin Hongxia Chen Qingyu Liu Acoustic Science and Technology Laboratory Harbin Engineering UniversityHarbin 150001China Key Laboratory of Marine Information Acquisition and Security(Harbin Engineering University) Ministry of Industry and Information TechnologyHarbin 150001China College of Underwater Acoustic Engineering Harbin Engineering UniversityHarbin 150001China First Institute of Oceanography Ministry of Natural ResourcesQingdao 266061China Naval Research Academy Beijing 100161China
An improved least mean square/fourth direct adaptive equalizer(LMS/F-DAE)is proposed in this paper for underwater acoustic communication in the *** is able to process complex-valued baseband signals and has better equ... 详细信息
来源: 评论
The Gradient-type Least-squares Deconvolution Multipath Underwater Acoustic Channel Estimation
The Gradient-type Least-squares Deconvolution Multipath Unde...
收藏 引用
2021 OES China Ocean Acoustics, COA 2021
作者: Huang, Tianfeng Peng, Qiuying Lv, Yunfei Mei, Jidan Harbin Engineering University Acoustic Science and Technology Laboratory Harbin150001 China Harbin Engineering University Key Laboratory of Marine Information Acquisition and Security Ministry of Industry and Information Technology Harbin150001 China
An algorithm for multipath time-delay estimation using the Gradient-type procedure to achieve the least-squares (LS) deconvolution is given to obtain a better resolution and estimation accuracy. It uses circular convo... 详细信息
来源: 评论
A Secure Comparison Protocol in the Malicious Model  15
A Secure Comparison Protocol in the Malicious Model
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Tao, Junhong Wu, Yongtang Chen, Yuling Guizhou University State Key Laboratory of Public Big Data College of Computer Science and and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables WeiFang China Weifang Key Laboratory of Blockchain on Agricultural Vegetables WeiFang China
Secure comparison is an important problem in the field of secure computing. A classic example is the Millionaires' problem, which is securely compares the wealth of two millionaires without revealing their wealth.... 详细信息
来源: 评论
Underwater Weak Target Detection Algorithm Based on Space-time Distribution Processing  4
Underwater Weak Target Detection Algorithm Based on Space-ti...
收藏 引用
4th International Conference on information Communication and Signal Processing, ICICSP 2021
作者: Sun, Chang Sheng, Xueli Wang, Jiaqi Mu, Mengfei Cao, Ran College of Underwater Acoustic Engineering Harbin Engineering University Ministry of Industry and Information Technology Acoustic Science and Technology Laboratory Key Laboratory of Marine Information Acquisition and Security Harbin Engineering University Harbin150001 China
Based on the space-time distribution map obtained from long-term observation of fixed sonar, multi-frame data correlation is realized according to the time and space continuity of the target. Use a linear function fit... 详细信息
来源: 评论
A Rational Delegating Computation Protocol Based on Smart Contract  14th
A Rational Delegating Computation Protocol Based on Smart Co...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Ma, Juan Chen, Yuling Liu, Guoxu Zhu, Hongliang Peng, Changgen State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Shouguang China Engineering Lab for Cloud Security and Information Security Center of BUPT Beijing China
The delegating computation has become an irreversible trend, together comes the pressing need for fairness and efficiency issues. To solve this problem, we leverage game theory to propose a smart c... 详细信息
来源: 评论
Joint-Motion Mutual Learning for Pose Estimation in Video  24
Joint-Motion Mutual Learning for Pose Estimation in Video
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Sifan Chen, Haipeng Yin, Yifang Hu, Sihao Feng, Runyang Jiao, Yingying Yang, Ziqi Liu, Zhenguang College of Computer Science and Technology Jilin University Changchun China A STAR Singapore Singapore Georgia Institute of Technology AtlantaGA United States School of Artificial Intelligence Jilin University Changchun China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Institute of Blockchain and Data Security Hangzhou China
Human pose estimation in videos has long been a compelling yet challenging task within the realm of computer vision. Nevertheless, this task remains difficult because of the complex video scenes, such as video defocus... 详细信息
来源: 评论
Graph-Based Terminal Ranking for Sparsification of Interference Coordination Parameters in Ultra-Dense Networks  10th
Graph-Based Terminal Ranking for Sparsification of Interfere...
收藏 引用
10th EAI International Conference on Mobile Networks and Management, MONAMI 2020
作者: Gou, Junxiang Wang, Lusheng Lin, Hai Peng, Min Ministry of Education School of Computer Science and Information Engineering Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei230601 China Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Wuhan430072 China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei230601 China
In the future mobile communication system, inter-cell interference becomes a serious problem due to the intensive deployment of cells and terminals. Traditional interference coordination schemes take long time for opt... 详细信息
来源: 评论
Mixer-transformer: Adaptive anomaly detection with multivariate time series
收藏 引用
Journal of Network and Computer Applications 2025年 241卷
作者: Xing Fang Yuanfang Chen Zakirul Alam Bhuiyan Xiajun He Guangxu Bian Noel Crespi Xiaoyuan Jing Hangzhou Dianzi University 310018 Hangzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University 310027 Hangzhou China Department of Computer and Information Sciences Fordham University 10469 Bronx NY USA Telecom SudParis Institut Polytechnique de Paris 91120 Palaiseau France Wuhan University 430072 Wuhan China Guangdong University of Petrochemical Technology 528000 Maoming China
Anomaly detection is crucial for maintaining the stability and security of systems. However, anomaly detection systems often generate numerous false positives or irrelevant alerts, which obscure genuine security threa...
来源: 评论
Secure medical data collection via local differential privacy  4
Secure medical data collection via local differential privac...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Wang, Zhiqiang Ma, Pingchuan Wang, Ruming Zhang, Jianyi Chi, Yaping Ma, Yanzhe Yang, Tao Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei China Beijing Electronic Science and Technology Institute Beijing China Hainan University Haikou China Ministry of Public Security Key Lab of Information Network Security Shanghai China
As the volume of medical data mining increases, so do the need to preserve patient privacy. And the exposure of medical data may degrade the level of health care service and reduce the trust of patients. Local Differe... 详细信息
来源: 评论
Experimental Verification of Vertical Line Array Shape Estimation Based on Single Normal Mode Extraction
Experimental Verification of Vertical Line Array Shape Estim...
收藏 引用
2021 OES China Ocean Acoustics, COA 2021
作者: Tan, Peng Lu, Licheng Ren, Qunyan Yang, Desen Acoustic Science and Technology Laboratory Key Laboratory of Marine Information Acquisition and Security Harbin Engineering University Ministry of Industry and Information Technology College of Underwater Acoustic Engineering Harbin China Chinese Academy of Sciences Key Laboratory of Underwater Acoustic Environment Institute of Acoustics Beijing China
The shape of the long line array is required to correct signal processing data and locate underwater targets precisely. In this paper, the warping transform form with waveguide invariant (β) is adopted to extract the... 详细信息
来源: 评论