咨询与建议

限定检索结果

文献类型

  • 356 篇 会议
  • 128 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 486 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 182 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 104 篇 信息与通信工程
    • 45 篇 电子科学与技术(可...
    • 34 篇 仪器科学与技术
    • 32 篇 控制科学与工程
    • 28 篇 网络空间安全
    • 25 篇 电气工程
    • 17 篇 机械工程
    • 11 篇 生物工程
    • 8 篇 光学工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 航空宇航科学与技...
    • 5 篇 土木工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
  • 92 篇 管理学
    • 77 篇 管理科学与工程(可...
    • 19 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 79 篇 理学
    • 44 篇 数学
    • 15 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 13 篇 生物学
    • 11 篇 系统科学
    • 8 篇 化学
  • 17 篇 文学
    • 16 篇 新闻传播学
  • 13 篇 法学
    • 8 篇 社会学
    • 4 篇 法学
  • 10 篇 军事学
    • 8 篇 军队指挥学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 23 篇 security
  • 15 篇 feature extracti...
  • 14 篇 algorithm design...
  • 11 篇 signal to noise ...
  • 11 篇 training
  • 10 篇 scheduling
  • 9 篇 routing
  • 9 篇 throughput
  • 9 篇 clustering algor...
  • 8 篇 network topology
  • 8 篇 vectors
  • 8 篇 switches
  • 8 篇 internet
  • 7 篇 bandwidth
  • 7 篇 semantics
  • 7 篇 heterogeneous ne...
  • 6 篇 support vector m...
  • 6 篇 load balancing
  • 6 篇 architecture
  • 6 篇 traffic control

机构

  • 102 篇 national digital...
  • 46 篇 national digital...
  • 39 篇 national digital...
  • 18 篇 china national d...
  • 11 篇 national digital...
  • 11 篇 china national d...
  • 10 篇 purple mountain ...
  • 10 篇 school of cyber ...
  • 9 篇 china national d...
  • 9 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 7 篇 national digital...
  • 7 篇 information engi...
  • 6 篇 national digital...
  • 6 篇 state key labora...
  • 5 篇 school of cyber ...
  • 5 篇 national digital...

作者

  • 23 篇 kaizhi huang
  • 17 篇 guozhen cheng
  • 15 篇 julong lan
  • 15 篇 hongchang chen
  • 15 篇 jiangxing wu
  • 14 篇 bin yan
  • 13 篇 xinsheng ji
  • 11 篇 wang binqiang
  • 11 篇 hongchao hu
  • 10 篇 yunfei guo
  • 10 篇 lan julong
  • 10 篇 jian chen
  • 10 篇 binqiang wang
  • 10 篇 ruiyang huang
  • 10 篇 liang jin
  • 10 篇 fucai chen
  • 9 篇 jianpeng zhang
  • 9 篇 huang kaizhi
  • 9 篇 peng yi
  • 9 篇 hu yuxiang

语言

  • 465 篇 英文
  • 16 篇 中文
  • 5 篇 其他
检索条件"机构=National Digital Switching System Engineering and Techological R and D Center"
486 条 记 录,以下是321-330 订阅
排序:
Primary User Emulation Attacks Analysis for Cognitive radio Networks Communication
收藏 引用
Telkomnika - Indonesian Journal of Electrical engineering 2013年 第7期11卷 3905-3914页
作者: Wang, Shan-Shan Luo, Xing-Guo Li, Bai-Nan National Digital Switching System Engineering Technological R and D Center Jinshui Zhengzhou 450001 China
Cognitive radio Network is an effective technology and a hot research direction which can solve the problem of deficient resource and revolutionize utilization. And its safety technology attracts more and more researc... 详细信息
来源: 评论
Analysis and Prevention for Cross-site Scripting Attack Based on Encoding
Analysis and Prevention for Cross-site Scripting Attack Base...
收藏 引用
2013 IEEE 4th International Conference on Electronics Information and Emergency Communication
作者: ding Lan Wu ShuTing Ye Xing Zhang Wei Library of Zhengzhou Teachers College Department of Intelligence and Reconnaissance Zhengzhou Teachers CollegeSpecial Police Academy China National Digital Switching System Engineering &Technological R&D Center Information Engineering University
With the development of Web application, cross-site scripting attacks have been rapidly increasing, and the technique of those attacks is constantly updating. There has been some special advanced attacks such as the o... 详细信息
来源: 评论
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism
Enhancing wireless security with theory of ill-posed problem...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Xiangyang Xu Wenyu Luo Huawei Song Lizhi Zhang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomize... 详细信息
来源: 评论
A partial CSI based Affinity propagation dynamic clustering algorithm
A partial CSI based Affinity propagation Dynamic clustering ...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Xiaomin ran Min Tong Youquan Mo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
The precondition of the whole known channel state information (CSI) is impractical in realistic system. To deal with this problem, a partial CSI based Affinity propagation dynamic clustering algorithm was proposed in ... 详细信息
来源: 评论
A polynomial estimation algorithm for PN sequence based on reliability accumulation  3rd
A polynomial estimation algorithm for PN sequence based on r...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Meiyue Yang Kaizhi Huang Wenyu Luo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
To solve the problems of current polynomial estimation algorithms for PN sequence, such as insufficient efficiency and error-tolerance, a novel algorithm based on reliability accumulation is proposed combining BM iter... 详细信息
来源: 评论
3d Image Spectral Segmentation Based on The region Mean Histogram
3D Image Spectral Segmentation Based on The Region Mean Hist...
收藏 引用
International Congress on Image and Signal Processing
作者: Lei Zeng Jian Chen Zhongguo Li Bin Yan Xijian Ping National Digital Switching System Engineering &Technology R&D Center Zhengzhou 450002 China
Spectral segmentation algorithms can extract the global impression of an image and are widely used in many areas and applications related to image segmentation. Traditional spectral algorithms need to construct affini... 详细信息
来源: 评论
A multicarrier-based physical layer security scheme for the multicast systems  3rd
A multicarrier-based physical layer security scheme for the ...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Tong Lin Kai-Zhi Huang Wen-Yu Luo National Digital Switching System Engineering & Technological R&D Center NDSC Zhengzhou Henan P.R. China
Traditional physical layer security methods, such as artificial noise, commonly require that the sender has more antennas than that of the receivers, which is not practical in the multicasting system. To solve this pr... 详细信息
来源: 评论
An effective community detection algorithm of the social networks
An effective community detection algorithm of the social net...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Yuan Huang Wei Hou Xiaowei Li Shaomei Li National Computer Network and Information Security Administration Center Beijing China National Digital Switching System Engineering & Technological R&D Center Zhengzhou
The traditional social network community detection algorithms generally lack of consideration of link attributes, and full expression using link attribute information model and mechanism. Aiming at this issue, this pa... 详细信息
来源: 评论
Eavesdropping against artificial noise: Hyperplane clustering
Eavesdropping against artificial noise: Hyperplane clusterin...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Lu Liu Jin Liang Kaizhi Huang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC Information Engineering University Zhengzhou Henan PRC
Wireless secure communication using artificial noise can guarantee security when the transmitter has more antennas than the eavesdropper. Contrarily, this paper considers the problem of eavesdropping when sufficient a... 详细信息
来源: 评论
A second-order spatial hopping transmission scheme for physical layer security
A second-order spatial hopping transmission scheme for physi...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: XinSheng Ji XiaoLei Kang KaiZhi Huang KeMing Ma China National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan P.R. China China Nat. Digital Switching Syst. Eng. & Technol. R&D Center Zhengzhou China
The method of physical layer security in wireless relay communication based on cooperative jamming scheme need the channel of legitimate user keep constant. It fails if the eavesdropper has more antennas than the send... 详细信息
来源: 评论