咨询与建议

限定检索结果

文献类型

  • 8,035 篇 会议
  • 5,878 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 13,916 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,024 篇 工学
    • 4,586 篇 计算机科学与技术...
    • 3,678 篇 软件工程
    • 2,424 篇 信息与通信工程
    • 1,613 篇 电子科学与技术(可...
    • 1,430 篇 控制科学与工程
    • 1,299 篇 电气工程
    • 908 篇 机械工程
    • 863 篇 仪器科学与技术
    • 832 篇 光学工程
    • 717 篇 生物工程
    • 560 篇 化学工程与技术
    • 527 篇 材料科学与工程(可...
    • 410 篇 动力工程及工程热...
    • 387 篇 生物医学工程(可授...
    • 318 篇 航空宇航科学与技...
    • 313 篇 交通运输工程
    • 297 篇 土木工程
    • 279 篇 环境科学与工程(可...
    • 275 篇 安全科学与工程
    • 273 篇 网络空间安全
  • 4,992 篇 理学
    • 2,182 篇 数学
    • 1,719 篇 物理学
    • 831 篇 生物学
    • 691 篇 统计学(可授理学、...
    • 563 篇 化学
    • 470 篇 系统科学
    • 389 篇 大气科学
  • 1,852 篇 管理学
    • 1,226 篇 管理科学与工程(可...
    • 678 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 342 篇 农学
  • 336 篇 医学
  • 250 篇 法学
  • 158 篇 经济学
  • 93 篇 军事学
  • 52 篇 教育学
  • 36 篇 艺术学
  • 26 篇 文学
  • 5 篇 历史学

主题

  • 327 篇 feature extracti...
  • 222 篇 simulation
  • 203 篇 deep learning
  • 202 篇 semantics
  • 200 篇 optimization
  • 182 篇 computational mo...
  • 136 篇 neural networks
  • 131 篇 wireless communi...
  • 131 篇 accuracy
  • 131 篇 training
  • 118 篇 reinforcement le...
  • 115 篇 object detection
  • 114 篇 convolution
  • 110 篇 image segmentati...
  • 109 篇 predictive model...
  • 107 篇 three-dimensiona...
  • 105 篇 conferences
  • 103 篇 data mining
  • 102 篇 visualization
  • 100 篇 signal to noise ...

机构

  • 268 篇 faculty of infor...
  • 262 篇 university of ch...
  • 200 篇 shandong provinc...
  • 186 篇 beijing key labo...
  • 149 篇 beijing key labo...
  • 146 篇 beijing key labo...
  • 107 篇 beijing key labo...
  • 102 篇 hubei province k...
  • 97 篇 state key labora...
  • 93 篇 school of comput...
  • 92 篇 key laboratory o...
  • 90 篇 institute of inf...
  • 89 篇 department of co...
  • 86 篇 state key labora...
  • 82 篇 college of compu...
  • 76 篇 zhejiang provinc...
  • 71 篇 tsinghua nationa...
  • 69 篇 school of softwa...
  • 67 篇 national mobile ...
  • 67 篇 national key lab...

作者

  • 92 篇 yang yang
  • 63 篇 li li
  • 60 篇 zhaoming lu
  • 55 篇 shuxiang guo
  • 54 篇 junfei qiao
  • 54 篇 zhao yao
  • 44 篇 wang lei
  • 43 篇 chen zhibo
  • 42 篇 liu yang
  • 40 篇 wei li
  • 40 篇 caili guo
  • 38 篇 qiao junfei
  • 37 篇 liu bo
  • 37 篇 liu jun
  • 35 篇 qiu xiaolan
  • 35 篇 ding wang
  • 34 篇 bin wang
  • 33 篇 li peng
  • 33 篇 zhang lei
  • 32 篇 li zheng

语言

  • 12,951 篇 英文
  • 555 篇 中文
  • 418 篇 其他
  • 9 篇 法文
  • 8 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 意大利文
检索条件"机构=Key Laboratory of Network Information System Technology"
13916 条 记 录,以下是41-50 订阅
排序:
High spectral efficiency 65536 QAM mobile fronthaul based on filtered Delta-Sigma modulation scheme
收藏 引用
Journal of Lightwave technology 2025年 第10期43卷 4546-4554页
作者: Yang, Xiongwei Yu, Jianjun Zhang, Long Wei, Yi Tan, Jingwen Zhao, Feng Zhou, Wen Wang, Kaihui the School of Information Science and Technology Shanghai200433 China the School of Information Science and Technology State Key Laboratory of ASIC and System Shanghai200433 China Purple Mountain Laboratories Nanjing211111 China Xian University of Posts and Telecommunications Xian China
In this paper, we experimentally demonstrate high spectral efficiency mobile fronthaul (MFH) for 1024/65536 quadrature amplitude modulation (1024/65536-QAM) signals based on a novel filtered delta-sigma modulation (DS... 详细信息
来源: 评论
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional networks
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3179-3201页
作者: Baoquan Liu Xi Chen Qingjun Yuan Degang Li Chunxiang Gu School of Cyberspace Security Zhengzhou UniversityZhengzhou450002China School of Cyberspace Security Information Engineering UniversityZhengzhou450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001China
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... 详细信息
来源: 评论
Brillouin Frequency Shift Extraction for BOTDA Based on Gramian Angular Fields  4
Brillouin Frequency Shift Extraction for BOTDA Based on Gram...
收藏 引用
4th International Computational Imaging Conference, CITA 2024
作者: Zhu, Borong Zhang, Zhihao Qian, Yuhao Ma, Xiaole Wang, Liang Yu, Kuanglu Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
To accurately extract Brillouin frequency shift of BOTDA with large sweeping step sizes, a novel structure of GAFCNN is proposed, combining time series coding with convolutional neural networks. The experimental data ... 详细信息
来源: 评论
Enhancing GNSS Signal Authentication through Multi-Antenna systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第5期24卷 4361-4376页
作者: Tan, Haijun Xie, Ning Huang, Lei Li, Hongbin Pengcheng National Laboratory of China Control and Network Foundation Laboratory Shenzhen518107 China Shenzhen University State Key Laboratory of Radio Frequency Heterogeneous Integration Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen518060 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States
The Global Navigation Satellite system (GNSS) receiver has become indispensable in navigation applications due to its affordability and reliable accuracy. Despite its widespread use, GNSS is vulnerable to manipulation... 详细信息
来源: 评论
Laser image refractive index sensor based on the combination of a coreless optical fiber and a digital camera
收藏 引用
Optoelectronics Letters 2025年 第2期21卷 65-68页
作者: GUO Jingzhong LAN Feng CHEN Xiang LIU Haifeng Xi’an Institute of Space Radio Technology Xi’an 710100China Key Laboratory of Optoelectronic Sensor and Sensing Network Technology College of Electronic Information and Optical EngineeringNankai UniversityTianjin 300350China
As a laser passes through a scattering medium,the light interacts with the irregular reflections within the medium,resulting in light scattering and the formation of *** this paper,an image sensor based on the combina... 详细信息
来源: 评论
AdaptHM: A Fully Adaptive Data Migration Strategy for Hybrid Memory systems
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年 第3期44卷 923-936页
作者: Peng, Zhouxuan Feng, Dan Chen, Jianxi Hu, Jing Liu, Yachun Hu, Jinlei Zhang, Jintong Wan, Tianyu Chen, Zuoning Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology MoE of China Wuhan430074 China Chinese Academy of Engineering Beijing100088 China
Data migration strategies (DMSs) improve the overall performance of hybrid memory systems by migrating frequently accessed (hot) data to faster memory. However, designing an efficient DMS is challenging since the key ... 详细信息
来源: 评论
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
Cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论
Unsupervised Outlier Detection with Reinforced Noise Discriminator
收藏 引用
ACM Transactions on Intelligent systems and technology 2025年 第2期16卷 1-26页
作者: Zhang, Zhongping Liu, Daoheng Zhu, Jinwei Wu, Youxi Hebei Key Laboratory of Computer Virtual Technology and System Integration School of Information Science and Engineering Yanshan University Qinhuangdao China School of Information Science and Engineering Yanshan University Qinhuangdao China School of Artificial Intelligence Hebei University of Technology Tianjin China
Outlier detection is one of the hot topics in the field of machine learning and data mining. At present, there are many kinds of outlier detection algorithms. The accuracies of traditional outlier detection algorithms... 详细信息
来源: 评论
RF-Sauron:Enabling Contact-Free Interaction on Eyeglass Using Conformal RFID Tag
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14320-14332页
作者: Yang, Baizhou Chen, Ling Peng, Xiaopeng Chen, Jiashen Tang, Yani Wang, Wei Fang, Dingyi Feng, Chao Northwest University Shaanxi Key Laboratory of Passive Internet of Things and Neural Computing School of Information Science and Technology Xi'an710127 China Northwest University Xi'an Key Laboratory of Advanced Computing and Software Security School of Information Science and Technology Xi'an710127 China Rochester Institute of Technology RochesterNY14623 United States Northwest University Xi'an Key Laboratory of Advanced Computing and System Security School of Information Science and Technology Xi'an710127 China Northwest University Shaanxi International Joint Research Centre for the Battery-Free Internet of Things School of Information Science and Technology Xi'an710127 China
Smart eyeglasses are emerging as a new medium for human-computer interaction. Existing solutions typically rely on cameras or touchpads, raising privacy invasion concerns or requiring users to physically interact with... 详细信息
来源: 评论
A pipelining task offloading strategy via delay-aware multi-agent reinforcement learning in Cybertwin-enabled 6G network
收藏 引用
Digital Communications and networks 2025年 第1期11卷 92-105页
作者: Haiwen Niu Luhan Wang Keliang Du Zhaoming Lu Xiangming Wen Yu Liu Beijing Laboratory of Advanced Information Networks Beijing Univ.of Posts&TelecomBeijing 100876China Beijing Key Lab of Network System Architecture and Convergence Beijing Univ.of Posts&TelecomBeijing 100876China School of Information and Communication Engineering Beijing Univ.of Posts&TelecomBeijing100876China
Cybertwin-enabled 6th Generation(6G)network is envisioned to support artificial intelligence-native management to meet changing demands of 6G ***-Agent Deep Reinforcement Learning(MADRL)technologies driven by Cybertwi... 详细信息
来源: 评论