咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science And Technology On Communication Information Security Control Laboratory"
1470 条 记 录,以下是51-60 订阅
排序:
A polarization sensitive interferometer:Delta interferometer
收藏 引用
Chinese Physics B 2024年 第3期33卷 369-377页
作者: 卫超奇 刘建彬 董翼飞 孙雨农 周宇 郑淮斌 刘严严 闫秀生 李福利 徐卓 Key Laboratory of Multifunctional Materials and Structures Ministry of Education & International Center for Dielectric ResearchSchool of Electronic Science and EngineeringXi'an Jiaotong UniversityXi'an 710049China MOE Key Laboratory for Nonequilibrium Synthesis and Modulation of Condensed Matter Department of Applied PhysicsXi'an Jiaotong UniversityXi'an 710049China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308China
A new type of polarization sensitive interferometer is proposed,named the Delta interferometer,inspired by its geometry resembling the Greek letter *** main difference between the Delta interferometer and other existi... 详细信息
来源: 评论
A Novel Orthogonal LoRa Multiple Access Algorithm for Satellite Internet of Things
收藏 引用
China communications 2022年 第3期19卷 279-289页
作者: Chengwen Zhang Liankai Wang Libin Jiao Shipeng Wang Jun Shi Jia Yue School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150080China Science and Technology on Communication Networks Laboratory Shijiazhuang 050081China Key Laboratory of Police Wireless Digital Communication Ministry of Public SecurityHarbin 150001China
In recent years,LoRa has been extensively researched in the satellite Internet of Things(IoT).However,the multiple access technology of LoRa is still one of the bottlenecks of satellite *** improve the multiple access... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Radio Signal Modulation Pattern Recognition Based on Time-Frequency Adaptive Decomposition and Hybrid Neural Network
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Dai, Shaogang Xu, Jianwei Zhou, Huaji Hangzhou Dianzi University School of communication engineering Hangzhou310018 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China
Automatic modulation classification of electromagnetic signals has an important role in the field of signal processing. The current methods for identifying the modulation pattern of radio signals mainly used end-to-en... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Mainlobe DRFM Jamming Suppression via Blind Source Separation Using Tensor Decomposition  8
Mainlobe DRFM Jamming Suppression via Blind Source Separatio...
收藏 引用
8th International Conference on Signal and Image Processing, ICSIP 2023
作者: Dong, Luxin Wang, Bing Pan, Bunian Kong, Yukai Yu, Xianxiang Cui, Guolong University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Science and Technology on Electronic Information Control Laboratory Chengdu610036 China
This paper deals with the suppression problem of mainlobe digital radio frequency memory (DRFM) jamming especially for intra-pulse slice forwarding jamming for phased array radar. A novel mainlobe DRFM jamming suppres... 详细信息
来源: 评论
Classification of Deforestation Factors in 6G Satellite Forest Images  5th
Classification of Deforestation Factors in 6G Satellite Fore...
收藏 引用
5th EAI International Conference on 6G for Future Wireless Networks, 6GN 2022
作者: Li, Yuhai Sun, Yuxin Meng, Xianglong Xi, Liang Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300300 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
The terrestrial satellite network will play an essential role in 6G. Through the satellite system, people can obtain a lot of ground image information to process tasks and feedback. Forest resource is an essential res... 详细信息
来源: 评论
6G Network Traffic Intrusion Detection Using Multiresolution Auto-encoder and Feature Matching Discriminator  5th
6G Network Traffic Intrusion Detection Using Multiresolution...
收藏 引用
5th EAI International Conference on 6G for Future Wireless Networks, 6GN 2022
作者: Li, Yuhai Sun, Yuxin He, Dong Xi, Liang Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300300 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
With the development of 6G technology, security and privacy have become extremely important in the face of larger network traffic bandwidth. An effective intrusion detection system can deal with the network attacks. D... 详细信息
来源: 评论
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAYESIAN ALGORITHM WEIGHT OPTIMIZATION  10
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAY...
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Fang, Junzhe Wang, Liyong Ji, Haojie Guo, Teng Hu, Te Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China Zaozhuang Network Security Guarantee Center Zaozhuang China
As a major software testing method, fuzzing has the potential to enhance testing coverage and detect a great number of software vulnerabilities in complex code programs. The current fuzzy testing for multiple input pa... 详细信息
来源: 评论
A Study on Resource Allocation for Mobile Edge Computing-Assisted Industrial Iot
A Study on Resource Allocation for Mobile Edge Computing-Ass...
收藏 引用
2023 International Conference on Networks, communications and Intelligent Computing, NCIC 2023
作者: Lu, Jie Zhang, Yuexia Li, Junjie Ministry of Information Industry Beijing Information Science and Technology University Key Laboratory of Information and Communication Systems Beijing China Control Technology Ministry of Education Beijing Information Science and Technology University Key Laboratory of Modern Measurement Beijing China
Since the advancement of mobile communication technology, traditional industries are gradually transforming and upgrading, which leads to problems such as insufficient computing resources and excessive energy consumpt... 详细信息
来源: 评论