咨询与建议

限定检索结果

文献类型

  • 913 篇 会议
  • 591 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,511 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 955 篇 工学
    • 630 篇 计算机科学与技术...
    • 500 篇 软件工程
    • 383 篇 信息与通信工程
    • 160 篇 电子科学与技术(可...
    • 131 篇 电气工程
    • 108 篇 控制科学与工程
    • 77 篇 生物工程
    • 69 篇 网络空间安全
    • 63 篇 仪器科学与技术
    • 56 篇 机械工程
    • 55 篇 安全科学与工程
    • 43 篇 光学工程
    • 32 篇 动力工程及工程热...
    • 32 篇 化学工程与技术
    • 31 篇 生物医学工程(可授...
    • 24 篇 材料科学与工程(可...
    • 21 篇 建筑学
  • 464 篇 理学
    • 246 篇 数学
    • 145 篇 物理学
    • 107 篇 统计学(可授理学、...
    • 83 篇 生物学
    • 46 篇 系统科学
    • 43 篇 化学
  • 207 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 51 篇 法学
    • 36 篇 社会学
  • 38 篇 医学
    • 35 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 23 篇 公共卫生与预防医...
  • 26 篇 军事学
  • 18 篇 经济学
  • 15 篇 农学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 47 篇 feature extracti...
  • 40 篇 deep learning
  • 37 篇 internet of thin...
  • 36 篇 security
  • 33 篇 protocols
  • 32 篇 accuracy
  • 31 篇 training
  • 30 篇 simulation
  • 27 篇 authentication
  • 27 篇 quantum cryptogr...
  • 26 篇 bandwidth
  • 26 篇 semantics
  • 25 篇 real-time system...
  • 23 篇 optimization
  • 23 篇 privacy
  • 21 篇 machine learning
  • 21 篇 blockchain
  • 20 篇 cryptography
  • 19 篇 computational mo...
  • 19 篇 information secu...

机构

  • 180 篇 science and tech...
  • 64 篇 department of in...
  • 43 篇 science and tech...
  • 38 篇 school of inform...
  • 35 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 27 篇 purple mountain ...
  • 26 篇 department of in...
  • 24 篇 department of in...
  • 24 篇 school of inform...
  • 22 篇 school of inform...
  • 22 篇 school of cyber ...
  • 21 篇 school of comput...
  • 20 篇 school of comput...
  • 19 篇 hubei key labora...
  • 19 篇 school of cyber ...
  • 19 篇 state key labora...
  • 17 篇 institute of cyb...
  • 17 篇 national enginee...

作者

  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 23 篇 li yang
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 20 篇 yang jie
  • 19 篇 xiaoniu yang
  • 18 篇 lin jia-chun
  • 17 篇 lee ming-chang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 15 篇 hu shengshan
  • 15 篇 bingjie xu
  • 15 篇 wang heng
  • 14 篇 shilian zheng

语言

  • 1,260 篇 英文
  • 225 篇 其他
  • 30 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science And Technology On Communication Information Security"
1511 条 记 录,以下是71-80 订阅
排序:
Two-Stage Federated Learning Strategy for Fairness and security in Vehicular Networks  23
Two-Stage Federated Learning Strategy for Fairness and Secur...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and communications, TrustCom 2024
作者: Zhang, Xin Guo, Chao Guo, Buxin Beijing Electronics Science and Technology Institute Department of Electronics and Communication Engineering Beijing China Chinese Academy of Sciences Beijing Electronics Science and Technology Institute The Institute of Information Engineering Department of Electronics and Communication Engineering Beijing China Beijing Electronics Science and Technology Institute Department of Cyberspace Security Beijing China
In vehicular networks, securing the network relies on analyzing extensive vehicle perception data to create an accurate road information model. Effective data sharing is crucial for this objective. However, traditiona... 详细信息
来源: 评论
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论
Arbitrarily rotating polarization direction and manipulating phases in linear and nonlinear ways using programmable metasurface
收藏 引用
Light(science & Applications) 2024年 第9期13卷 1789-1800页
作者: Wei Liu Si Ran Wang Jun Yan Dai Lei Zhang Qiao Chen Qiang Cheng Tie Jun Cui State Key Laboratory of Millimeter Waves Southeast UniversityNanjing 210096China Institute of Electromagnetic Space Southeast UniversityNanjing 210096China Frontiers Science Center for Mobile Information Communication and Security Southeast UniversityNanjing 210096China Electrical Engineering Department Chalmers University of TechnologyGothenburg 41258Sweden
Independent controls of various properties of electromagnetic(EM)waves are crucially required in a wide range of *** metasurface is a promising candidate to provide an advanced platform for manipulating EM ***,we prop... 详细信息
来源: 评论
Influence of Access Points’ Height and High Signal Relation in WLAN Fingerprinting-Based Indoor Positioning Systems’ Accuracy  1
收藏 引用
26th International Conference on Distributed Computer and communication Networks: Control, Computation, communications, DCCN 2023
作者: Nicholaus, Mrindoko R. Ruambo, Francis A. Masanga, Elijah E. Muthanna, Mohammed Saleh Ali Lashchev, Andrei Computer Science and Engineering Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of Information Systems and Technology Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Research and Development Department Aifrruis Laboratories Mbeya Tanzania United Republic of Institute of Computer Technologies and Information Security Southern Federal University Taganrog347922 Russia
Wireless Local Area Network (WLAN) Fingerprinting-based Indoor Positioning Systems (IPS) offer several key advantages over other indoor positioning technologies, including cost-effectiveness with high accuracy and pas... 详细信息
来源: 评论
K-Means Clustering with Local Distance Privacy
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 433-442页
作者: Mengmeng Yang Longxia Huang Chenghua Tang the Data61 Commonwealth Scientific and Industrial Research OrganizationMelbourne 3168Australia the School of Computer Science and Communication Engineering Jiangsu UniversityZhenjiang 212013China. the School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin 541010China
With the development of information technology,a mass of data are generated every *** and analysing these data help service providers improve their services and gain an advantage in the fierce market competition.K-mea... 详细信息
来源: 评论
A Novel Orthogonal LoRa Multiple Access Algorithm for Satellite Internet of Things
收藏 引用
China communications 2022年 第3期19卷 279-289页
作者: Chengwen Zhang Liankai Wang Libin Jiao Shipeng Wang Jun Shi Jia Yue School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150080China Science and Technology on Communication Networks Laboratory Shijiazhuang 050081China Key Laboratory of Police Wireless Digital Communication Ministry of Public SecurityHarbin 150001China
In recent years,LoRa has been extensively researched in the satellite Internet of Things(IoT).However,the multiple access technology of LoRa is still one of the bottlenecks of satellite *** improve the multiple access... 详细信息
来源: 评论
Artificial Intelligence-Aid OTFS Receiver: Design and Performance Evaluation
Artificial Intelligence-Aid OTFS Receiver: Design and Perfor...
收藏 引用
2023 International Conference on Ubiquitous communication, Ucom 2023
作者: Wang, Chenxi Qian, Li Ping Zhu, Huijie College of Information Engineering Zhejiang University of Technology Hangzhou China The 36th Research Institute of China Electronics Technology Science and Technology on Communication Information Security Control Laboratory Jiaxing China
OTFS technology is attracting much attention due to its strong adaptability to high-speed mobility and high spectrum efficiency. Studies show that applying deep learning (DL) to traditional communication systems signi... 详细信息
来源: 评论
Analyzing Human Observer Ability in Morphing Attack Detection - Where Do We Stand?
IEEE Transactions on Technology and Society
收藏 引用
IEEE Transactions on technology and Society 2023年 第2期4卷 125-145页
作者: Godage, Sankini Rancha Lovasdal, Froy Venkatesh, Sushma Raja, Kiran Ramachandra, Raghavendra Busch, Christoph Norwegian University of Science and Technology Department of Computer Science Trondheim 22 Gjovik2815 Norway National Police Directorate National Technology Team Euis Program Oslo0369 Norway Norwegian University of Science and Technology Department of Information Security and Communication Technology Trondheim 22 Gjovik2815 Norway
Morphing attacks are based on the technique of digitally fusing two (or more) face images into one, with the final visage resembling the contributing faces. Morphed images not only pose a challenge to Face-Recognition... 详细信息
来源: 评论
Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security
收藏 引用
AI and Ethics 2024年 第3期5卷 1911-1929页
作者: Hashmi, Ehtesham Yamin, Muhammad Mudassar Yayilgan, Sule Yildirim Department of Information Security and Communication Technology (IIK) Norwegian University of Science and Technology (NTNU) Gjøvik Norway
This survey paper explores the transformative role of Artificial Intelligence (AI) in information security. Traditional methods, especially rule-based approaches, faced significant challenges in protecting sensitive d...
来源: 评论
An Efficient and Lightweight Commitment Scheme for IoT Data Streams  19
An Efficient and Lightweight Commitment Scheme for IoT Data ...
收藏 引用
19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023
作者: Katsika, Angeliki Papageorgiou, Konstantinos Fakis, Alexandros Plagianakos, Vassilis Spathoulas, Georgios University of Thessaly Department of Computer Science and Biomedical Informatics Lamia Greece University of the Aegean Department of Information and Communication Systems Engineering Samos Greece Department of Information Security and Communication Technology Gjøvik Norway
Data integrity is a crucial property for offering Internet of Things (IoT) services. Usually, this is achieved by assuming a high level of trust in the service provider, a practice that induces negative implications. ... 详细信息
来源: 评论