咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 85 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 12 篇 船舶与海洋工程
    • 10 篇 网络空间安全
    • 9 篇 机械工程
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 59 篇 理学
    • 32 篇 数学
    • 30 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 33 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 9 篇 法学
    • 5 篇 社会学
    • 4 篇 法学
  • 3 篇 文学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 7 篇 data privacy
  • 7 篇 costs
  • 7 篇 blockchain
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 48 篇 college of under...
  • 23 篇 acoustic science...
  • 19 篇 the state key la...
  • 19 篇 key laboratory o...
  • 18 篇 national key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 institute of blo...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 liu songzuo
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 yang ziqi
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 shang zhigang
  • 3 篇 zhang haigang
  • 3 篇 qin zhan

语言

  • 183 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
193 条 记 录,以下是61-70 订阅
排序:
Propagation Characteristics of Lateral Wave in Shallow Water Based on the Time-Domain Wavenumber-Integration Method
Propagation Characteristics of Lateral Wave in Shallow Water...
收藏 引用
2024 OES China Ocean Acoustics, COA 2024
作者: Song, Zhenting Dong, Yang Zhan, Jiankang Shi, Zhanfei Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology China Harbin Engineering University Key Laboratory of Marine Information Acquisition and Security Ministry of Industry and Information Technology China College of Underwater Acoustic Engineering Harbin Engineering University Harbin China
To clarify the propagation mechanism and characteristics of lateral waves, in this paper, the wavenumber-integration method was used to establish a time-domain numerical model of shallow waveguide. The influence of la... 详细信息
来源: 评论
A Comparative Study of IMM Kalman Filters and Neural Computing for Underwater Bearing Only Target Motion Analysis  21
A Comparative Study of IMM Kalman Filters and Neural Computi...
收藏 引用
21st International Bhurban Conference on Applied Sciences and technology, IBCAST 2024
作者: Ali, Wasiq Gang, Qiao Shah, Syed Asim College of Underwater Acoustic Engineering Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology Key Laboratory of Marine Information Acquisition and Security Ministry of Industry and Information Technology Harbin150001 China College of Information and Communication Engineering Harbin Engineering University Harbin150001 China
Bearing only target motion analysis (BOTMA) is essential for tracking and locating underwater targets, particularly in situations when conventional approaches such as range-based observations are not feasible or acces... 详细信息
来源: 评论
The Sensitive Properties of Hydrate Reservoirs Based on Seismic Stereoscopic Detection technology
收藏 引用
Acta Geologica Sinica(English Edition) 2020年 第2期94卷 530-544页
作者: LIU Xueqin XING Lei QIN Zhiliang LIU Huaishan Acoustic Science and Technology Laboratory Harbin Engineering UniversityHarbin 150001China Key Laboratory of Marine Information Acquisition and Security(Harbin Engineering University) Ministry of Industry and Information TechnologyHarbin 150001China College of Underwater Acoustic Engineering.Harbin Engineering University Harbin 150001China Key Lab of Submarine Geosciences and Prospecting Techniques MOE and College of Marine GeosciencesOcean University of ChinaQingdao 266100China Evaluation and Detection Technology Laboratory of Marine Mineral Resources Qingdao 266100China National Laboratory for Marine Science and Technology Qingdao 266061China
Higher-precision determinations of hydrate reservoirs, hydrate saturation levels and storage estimations are important for guaranteeing the ability to continuously research, develop and utilize natural gas hydrate res... 详细信息
来源: 评论
Research on the Cross-Correlation Characteristics of Signals from Ocean Bottom Seismometer
Research on the Cross-Correlation Characteristics of Signals...
收藏 引用
2024 OES China Ocean Acoustics, COA 2024
作者: Cao, Dejin Zhang, Haigang Xie, Jinhuai Gao, Xiao College of Underwater Acoustic Engineering Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology Key Lab. of Mar. Info. Acquisition and Security of Ministry of Industry and Information Technology Harbin China
In this study, considerable differences in waveform between vector signals and acoustic pressure signals were received from the seabed interface. The cross-correlation characteristics between the acoustic pressure and... 详细信息
来源: 评论
Study of the strength characteristics of particle velocity at the seabed interface
Study of the strength characteristics of particle velocity a...
收藏 引用
2023 International Conference on Frontiers of Ocean Science and technology, ICFOST 2023
作者: Xie, Jinhuai Cao, Dejin Zhang, Haigang National Key Laboratory of Underwater Acoustic Technology Harbin Engineering University Harbin China Key Laboratory of Marine Information Acquisition and Security Ministry of Industry and Information Technology Harbin Engineering University Harbin China College of Underwater Acoustic Engineering Harbin Engineering University Harbin China
When studying the propagation characteristics of the acoustic vector field, the law that the horizontal particle velocity intensity is stronger than the vertical particle velocity intensity does not apply near the sea... 详细信息
来源: 评论
Passive Line Spectrum Detection of a Moving Target With the Fractional Fourier Transform
Passive Line Spectrum Detection of a Moving Target With the ...
收藏 引用
2024 OES China Ocean Acoustics, COA 2024
作者: Yuxin, Zhao Dajun, Sun Jidan, Mei Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology Harbin150001 China Ministry of Industry and Information Technology Key Laboratory of Marine Information Acquisition and Security Harbin150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin150001 China
To detect line spectrum signals from underwater moving targets, a long-time-integral line spectrum detection method based on the fractional Fourier transform (FRFT) is proposed in this work. This method can mitigate t... 详细信息
来源: 评论
The optimal attack-defense scheme for secret sharing  15
The optimal attack-defense scheme for secret sharing
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Ma, Juan Chen, Yuling Lv, Xiao Qian, Xiaobin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables Weifang China Guizhou Shuanhui Big Data Industry Development Co. Ltd Guiyang China Guizhou CoVision Science &technology Co. Ltd Guiyang China
The attack-defense issue of secret sharing has been a pressing cryptography research need. For solving this issue, this study proposes an optimal secret-share attack-defense model with game theory and information theo... 详细信息
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web  9
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
9th IEEE International Conference on data Science in Cyberspace, DSC 2024
作者: Chen, Hongfan Diao, Yigang Xiang, Hui Huo, Yixuan Xie, Xiaqing Zhao, Jiapeng Wang, Xuebin Sun, Yanwei Shi, Jinqiao Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Beijing China Data and Technology Support Center Cyberspace Administration of China Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node  15
A Multipath Source Location Privacy Protection Scheme in Wir...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Sun, Jing Chen, Yuling Lv, Xiao Qian, Xiaobin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security Guilin China Weifang University of Science and Technology Blockchain Laboratory of Agricultural Vegetables Weifang China Guizhou Shuanhui Big Data Industry Development Co.Ltd Guiyang China Guizhou CoVision Science &technology Co.Ltd Guiyang China
Wireless sensor networks (WSNs) are widely devoted to monitoring target. Attackers can detect the source node by hop-by-hop backtracking strategy. Therefore, it is necessary to protect the location privacy of data sou... 详细信息
来源: 评论