咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science And Technology On Communication Information Security Control Laboratory"
1470 条 记 录,以下是171-180 订阅
排序:
A Passive Navigation Algorithm Based on Derivative Dynamic Time Regularization Geomagnetic Matching  2
A Passive Navigation Algorithm Based on Derivative Dynamic T...
收藏 引用
2021 2nd International Conference on Modeling, Big Data Analytics and Simulation, MBDAS 2021
作者: Wang, Yiteng Bao, Jinhong Li, Zehua Science and Technology on Communication Information Security Control Laboratory China No.36 Research Institute of China Electronics Technology Group Corporation China College of Telecommunication Engineering Hangzhou Dianzi University Hangzhou310018 China
As satellite positioning has shortcomings such as susceptibility to multipath interference, we look forward to using a new algorithm to solve these problems. The method of derivative dynamic time regularization is use... 详细信息
来源: 评论
Prompt and Contrastive Learning for Few-shot Sentiment Classification  5
Prompt and Contrastive Learning for Few-shot Sentiment Class...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Wang, Fei Chen, Long Huang, Xiaohua Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ... 详细信息
来源: 评论
News-driven financial warning based on label information attention  5
News-driven financial warning based on label information att...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Zhilin, Ren Long, Chen Xiaohua, Huang Wenjing, Wang Cai, Xu Wei, Zhao Ziyu, Guan Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Most existing news-driven stock market prediction methods ignore the potential relationship between financial news and stocks. The complex relationship can help us to improve the accuracy of algorithmic trading system... 详细信息
来源: 评论
Rotational random extraction of Toeplitz matrix for ghost imaging  4
Rotational random extraction of Toeplitz matrix for ghost im...
收藏 引用
4th International Conference on Optoelectronic science and Materials, ICOSM 2022
作者: Cheng, Zhengdong Sun, Maosheng Chen, Yi Chang, Haikuan Liu, Yanyan State Key Laboratory of Pulsed Power Laser Technology National University of Defense Technology Huangshan Road No.460 HeFei230037 China Science and Technology on Electro-Optical Information Security Control Laboratory Weiwu Road No.9 Tianjin300450 China
If Toeplitz matrix is used for compression-aware ghost imaging, the imaging quality will be very low. In order to solve the problem, a new experimental scheme for ghost imaging is proposed in this paper. The scheme fi... 详细信息
来源: 评论
Direct Position Determination in the Presence of Direction-Dependent Mutual Coupling Using a Moving Array  34
Direct Position Determination in the Presence of Direction-D...
收藏 引用
34th General Assembly and Scientific Symposium of the International Union of Radio science, URSI GASS 2021
作者: Ma, Fei Wang, Yuexian Wang, Ling Gong, Yanyun School of Electronics and Information Northwestern Polytechnical University Xi'an China The Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In this paper, a new approach without iteration is proposed for direct position determination (DPD) with Doppler shifts in the presence of unknown direction-dependent mutual coupling (DDMC). The special banded symmetr... 详细信息
来源: 评论
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory  17
Analysis of Attack Effectiveness Evaluation of AD hoc Networ...
收藏 引用
17th International Conference on Computational Intelligence and security, CIS 2021
作者: Dai, Jiahao Chen, Yongqun China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a... 详细信息
来源: 评论
The differential fault analysis on block cipher FeW
收藏 引用
Cybersecurity 2023年 第2期6卷 62-74页
作者: Haiyan Xiao Lifang Wang Jinyong Chang School of Computer Science Northwestern Polytechnical UniversityXiAn 710055People's Republic of China Engineering University of PAP XiAn 710055People's Republic of China School of Information and Control Engineering XiAn University of Architecture and TechnologyXi'An 710055People's Republic of China State Key Laboratory of Information Security(SKLOIS) Institute of Information EngineeringChinese Academy of SciencesBeijing 100089People's Republic of China
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achi... 详细信息
来源: 评论
An analysis of network traffic identification based on decision tree  2
An analysis of network traffic identification based on decis...
收藏 引用
2nd International Conference on Artificial Intelligence and Electromechanical Automation, AIEA 2021
作者: Dai, Jiahao Chen, Yongqun Chen, Yucheng Meng, Aodong China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Energy Minimization Oriented Resource Allocation for Relay Assisted NOMA-MEC Networks
Energy Minimization Oriented Resource Allocation for Relay A...
收藏 引用
IEEE Conference on Global communications (GLOBECOM)
作者: Qianru Wang Liping Qian Yuan Wu Xiaoniu Yang College of Information Engineering Zhejiang University of Technology Hangzhou China State Key Laboratory of Internet of Things for Smart City University of Macau China Science and Technology on Communication Information Security Control Laboratory Jiaxing China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou China
With the growing demand for image transmission, there is a need for solutions that offer low energy consumption and low latency. In this paper, we present a novel relay-assisted system based on non-orthogonal multiple... 详细信息
来源: 评论