咨询与建议

限定检索结果

文献类型

  • 1,143 篇 期刊文献
  • 1,020 篇 会议
  • 12 册 图书

馆藏范围

  • 2,175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,461 篇 工学
    • 869 篇 计算机科学与技术...
    • 723 篇 软件工程
    • 357 篇 信息与通信工程
    • 219 篇 电子科学与技术(可...
    • 214 篇 电气工程
    • 180 篇 控制科学与工程
    • 154 篇 生物工程
    • 153 篇 光学工程
    • 104 篇 材料科学与工程(可...
    • 103 篇 机械工程
    • 90 篇 生物医学工程(可授...
    • 85 篇 化学工程与技术
    • 82 篇 仪器科学与技术
    • 72 篇 网络空间安全
    • 50 篇 动力工程及工程热...
    • 46 篇 安全科学与工程
    • 40 篇 交通运输工程
  • 821 篇 理学
    • 318 篇 数学
    • 317 篇 物理学
    • 185 篇 生物学
    • 101 篇 化学
    • 94 篇 统计学(可授理学、...
    • 57 篇 系统科学
  • 318 篇 管理学
    • 182 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 71 篇 工商管理
  • 92 篇 医学
    • 70 篇 临床医学
    • 59 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 72 篇 法学
    • 53 篇 社会学
  • 30 篇 经济学
  • 27 篇 农学
  • 24 篇 军事学
  • 15 篇 文学
  • 14 篇 教育学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 52 篇 feature extracti...
  • 39 篇 security
  • 38 篇 training
  • 35 篇 deep learning
  • 34 篇 semantics
  • 33 篇 authentication
  • 33 篇 machine learning
  • 28 篇 object detection
  • 25 篇 accuracy
  • 22 篇 internet of thin...
  • 22 篇 network security
  • 21 篇 protocols
  • 21 篇 cryptography
  • 20 篇 support vector m...
  • 20 篇 testing
  • 19 篇 privacy
  • 18 篇 conferences
  • 18 篇 convolution
  • 18 篇 optimization
  • 18 篇 computational mo...

机构

  • 88 篇 institute of inf...
  • 85 篇 school of cyber ...
  • 43 篇 national key lab...
  • 33 篇 university of ch...
  • 33 篇 institute of com...
  • 31 篇 state key labora...
  • 29 篇 guilin huigu ins...
  • 26 篇 institute of qua...
  • 26 篇 beijing institut...
  • 26 篇 school of cyber ...
  • 24 篇 guilin universit...
  • 22 篇 school of comput...
  • 21 篇 national enginee...
  • 21 篇 national enginee...
  • 21 篇 hubei engineerin...
  • 20 篇 services computi...
  • 18 篇 hubei key labora...
  • 18 篇 guilin universit...
  • 17 篇 department of el...
  • 17 篇 national compute...

作者

  • 29 篇 guo li
  • 25 篇 luo xiaonan
  • 22 篇 cao xiaochun
  • 20 篇 hideki imai
  • 17 篇 li ji
  • 16 篇 das ashok kumar
  • 16 篇 hu shengshan
  • 15 篇 zhang leo yu
  • 15 篇 li xiang
  • 14 篇 xuan qi
  • 14 篇 mahmood khalid
  • 14 篇 yang jian
  • 14 篇 jin hai
  • 13 篇 shi jinqiao
  • 13 篇 wen yan
  • 12 篇 timofte radu
  • 12 篇 yang xiaoniu
  • 12 篇 zhao jinjing
  • 12 篇 wang qin
  • 11 篇 li guo

语言

  • 2,001 篇 英文
  • 104 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=National Engineering Lab of Info-Security Technology Institute of Information Engineering"
2175 条 记 录,以下是31-40 订阅
排序:
Robust Multi-UAV Placement Optimization for AOA-Based Cooperative Localization
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-15页
作者: Zhou, Lingyun Ning, Xinzhi You, Ming-Yi Zhang, Rongqing Shi, Qingjiang Department of Hubei Key Laboratory of Intelligent Wireless Communications Hubei Engineering Research Center of Intelligent Internet of Things Technology College of Electronics and Information Engineering South-Central Minzu University Wuhan China School of Software Engineering Tongji University Shanghai China National Key Laboratory of Electromagnetic Space Security No.36 Research Institute of CETC Jiaxing China
Unmanned aerial vehicle (UAV) swarm-based localization technology has become increasingly popular due to its exceptional maneuverability, versatile coverage capabilities, and reliable line-of-sight (LoS) connectivity.... 详细信息
来源: 评论
Direct-Unitary MUSIC: A Real-Valued Method for Co-Array-Based Direction-of-Arrival Estimation
Direct-Unitary MUSIC: A Real-Valued Method for Co-Array-Base...
收藏 引用
2024 OES China Ocean Acoustics, COA 2024
作者: Song, Guangming Qu, Xinghao Shang, Zhigang Qiao, Gang Li, Tianshui School of Aerospace Engineering China Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology Harbin150001 China Ministry of Industry and Information Technology Key Laboratory of Marine Information Acquisition and Security Harbin150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin150001 China Eastern Theater Naval Security Department Immediate Security Unit Unit 91007 China Naval Research Institute China
Spatial smoothing (SS) has become a common technique targeted at direction-of-arrival estimation based on sparse linear arrays, which rearranges the corresponding co-array model to favor subspace methods. This paper p... 详细信息
来源: 评论
Transformation Method from AltaRica3.0 to SBIP model
Transformation Method from AltaRica3.0 to SBIP model
收藏 引用
2022 International Conference on Signal Processing, Computer Networks, and Communications, SPCNC 2022
作者: He, Hongbin Yang, Lin Zhang, Long Yang, Feng National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing100141 China
In order to provide reliability and safety assessments for safety-critical systems, Model-Based Safety Analysis (MBSA) methods have been developed, of which AltaRica3.0 is one representative method. However, there are... 详细信息
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
Segmenting foreground objects in a multi-modal background using modified Z-score
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1213-1227页
作者: Choudhury, Suman Kumar Sa, Pankaj Kumar Choo, Kim-Kwang Raymond Bakshi, Sambit Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela India Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Information Technology and Mathematical Sciences University of South Australia AdelaideSA5095 Australia
This article presents a background subtraction method to detect moving objects across a stationary camera view. A hybrid pixel representation is presented to minimize the effect of shadow illumination. A non-recursive... 详细信息
来源: 评论
When LoRa meets distributed machine learning to optimize the network connectivity for green and intelligent transportation system
收藏 引用
Green Energy and Intelligent Transportation 2024年 第3期3卷 24-41页
作者: Malak Abid Ali Khan Hongbin Ma Arshad Farhad Asad Mujeeb Imran Khan Mirani Muhammad Hamza National Key Lab of Autonomous Intelligent Unmanned Systems School of AutomationBeijing Institute of TechnologyBeijing 100081China Department of Computer Science Namal UniversityPakistan Department of Electrical Engineering Tsinghua UniversityBeijing 100084China Faculty of Information Technology Beijing University of TechnologyBeijing 100124China School of Mechanical Engineering Beijing Institute of TechnologyBeijing 100081China
LoRa technology contributes to green energy by enabling efficient,long-range communication for the Internet of Things(IoT).This paper addresses the challenges related to coverage range in outdoor monitoring systems ut... 详细信息
来源: 评论
Driving into Danger: Adversarial Patch Attack on End-To-End Autonomous Driving Systems Using Deep Learning  28
Driving into Danger: Adversarial Patch Attack on End-To-End ...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Wang, Tong Kuang, Xiaohui Li, Hu Du, Qianjin Hu, Zhanhao Deng, Huan Zhao, Gang Institute of System Engineering Academy of Military Sciences Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Deep learning-based autonomous driving systems have been extensively researched due to their superior performance compared to traditional methods. Specifically, end-To-end deep learning systems have been developed, wh... 详细信息
来源: 评论
SP-SLAM: Neural Real-Time Dense SLAM With Scene Priors
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第6期35卷 5182-5194页
作者: Hong, Zhen Wang, Bowen Duan, Haoran Huang, Yawen Li, Xiong Wen, Zhenyu Wu, Xiang Xiang, Wei Zheng, Yefeng The Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Department of Automation Tsinghua University China Tencent Jarvis Lab Shenzhen518057 China The School of Engineering and Mathematical Sciences La Trobe University MelbourneVIC3086 Australia The Medical Artificial Intelligence Laboratory Westlake University Hangzhou310030 China
Neural implicit representations have recently shown promising progress in dense Simultaneous Localization And Mapping (SLAM). However, existing works have shortcomings in terms of reconstruction quality and real-time ... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论