咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science And Technology On Communication Information Security Control Laboratory"
1470 条 记 录,以下是71-80 订阅
排序:
Vector Approximate Message Passing with Sparse Bayesian Learning for Gaussian Mixture Prior
收藏 引用
China communications 2023年 第5期20卷 57-69页
作者: Chengyao Ruan Zaichen Zhang Hao Jiang Jian Dang Liang Wu Hongming Zhang National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and SecuritySoutheast UniversityNanjing 210096China Purple Mountain Laboratories No.9 Mozhou East RoadNanjing 211111China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing 210044China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China
Compressed sensing(CS)aims for seeking appropriate algorithms to recover a sparse vector from noisy linear ***,various Bayesian-based algorithms such as sparse Bayesian learning(SBL)and approximate message passing(AMP... 详细信息
来源: 评论
On the Performance of NOMA Over Coded Caching in Cache-Aided Wireless Network  8
On the Performance of NOMA Over Coded Caching in Cache-Aided...
收藏 引用
8th IEEE International Conference on Network Intelligence and Digital Content, IC-NIDC 2023
作者: Ma, Yuanyuan Zhi, Ruxin Xu, Zhan Ministry of Information Industry Beijing Information Science and Technology University Key Laboratory of Information and Communication Systems Beijing100101 China Ministry of Education Beijing Information Science and Technology University Key Laboratory of Modern Measurement and Control Technology Beijing100101 China
This paper centers around the examination of a downlink system comprising of a base station (BS) located at the center of a circular cell. Within this cell, we find cache-equipped users uniformly distributed. Our aim ... 详细信息
来源: 评论
Joint Task Offloading and Computation in a Multi-Carrier Multi-Relay MEC System  4th
Joint Task Offloading and Computation in a Multi-Carrier Mul...
收藏 引用
4th International Conference on Frontiers of Electronics, information and Computation Technologies, ICFEICT 2024
作者: Zhang, Siyu Zhang, Yuexia Li, Junjie Zheng, Hui Zhang, Changyong Zhang, Ruichang Li, Zhili Key Laboratory of Information and Communication Systems Beijing Information Science and Technology University Beijing China Key Laboratory of Modern Measurement and Control Technology Beijing Information Science and Technology University Beijing China Datang Microelectronics Technology Company Ltd Beijing China R&D Cente Beijing Smartchip Microelectronics Technology Co. Ltd Beijing China
As the continuous emergence of new applications, such as face recognition and automatic driving, wireless devices are faced with problems, for instance, limited computing resources and excessive energy consumption. Th... 详细信息
来源: 评论
100 km Discrete-Modulated Continuous-Variable Quantum Key Distribution Using Probabilistic Shaped 16QAM
100 km Discrete-Modulated Continuous-Variable Quantum Key Di...
收藏 引用
2024 Asia communications and Photonics Conference, ACP 2024 and International Conference on information Photonics and Optical communications, IPOC 2024
作者: Pan, Yan Li, Yang Wu, Mingze Zhang, Yichen Wang, Heng Huang, Wei Shao, Yun Xu, Bingjie Liu, Jinlu National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China
We first experimentally demonstrated discrete-modulated continuous-variable quantum key distribution over 100.93 km of standard single-mode fiber using probabilistic shaped 16QAM. The results show that a secret key ra... 详细信息
来源: 评论
Research on Covariance Matrix and Freedom Degree of GNSS Anti-jamming Array  6
Research on Covariance Matrix and Freedom Degree of GNSS Ant...
收藏 引用
6th International Conference on Signal and Image Processing, ICSIP 2021
作者: Nan, Pulong Wang, Lijun Pan, Gaofeng Science and Technology On Communication Information Security Control Laboratory Jiaxing China
The paper focuses on the covariance matrix and freedom degree widely involved in array anti-jamming processing. Based on the eigen decomposition of array covariance matrix of received signals, the correlation properti... 详细信息
来源: 评论
Phased Array Full-Duplex for Concurrent Multifunction: Architecture and Implementation  13
Phased Array Full-Duplex for Concurrent Multifunction: Archi...
收藏 引用
13th International Conference on Microwave and Millimeter Wave technology, ICMMT 2021
作者: Chen, Shunyang Chen, Jiarui Huang, Xiaoguo Chen, Linglu Zhang, Qi Chen, Binhui Zhu, Menglei Science And Technology On Communication Information Security Control Laboratory Jiaxing China
In this article, the realization of concurrent multifunction in phased array full-duplex platforms is discussed. For modern complex electromagnetic environment, an efficient architecture is needed to accomplish the co... 详细信息
来源: 评论
Signals of Opportunity Navigation Using LTE Downlink Signals  22
Signals of Opportunity Navigation Using LTE Downlink Signals
收藏 引用
22nd IEEE International Conference on communication technology, ICCT 2022
作者: Wang, Yiteng Zhu, Huijie Liang, Tianyi Qian, Jiachuan The 36th Research Institute of China Electronics Technology Group Corporation Science and Technology on Communication Information Security Control Laboratory Jiaxing China
For the global navigation satellite system (GNSS) cannot meet the positioning requirements under occlusion or malicious interference, this paper proposes a receiver self-localization method using long-term evolution (... 详细信息
来源: 评论
Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1947-1976页
作者: Asif Rahim Yanru Zhong Tariq Ahmad Sadique Ahmad Mohammed A.ElAffendi School of Computer and Information Security Guilin University of Electronic TechnologyGuilin541004China Guangxi Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin University of Electronic TechnologyGuilin541004China School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of *** Neural Networks(CNNs)have shown promi... 详细信息
来源: 评论
SDM-based electronic defense intelligent networking technology  8
SDM-based electronic defense intelligent networking technolo...
收藏 引用
8th Symposium on Novel Photoelectronic Detection technology and Applications
作者: Ma, Baoqiang Liu, Tongyu Yong, Zhang Shuai, Jia Dong, Liu Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
With the increasingly prominent role of high-tech weapons in modern warfare, electronic warfare has also become a topic that has attracted worldwide attention. At present, global electronic warfare is in an important ... 详细信息
来源: 评论
NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets  20th
NEST: Strong Key-Insulated Password-Based Shared-Custodial B...
收藏 引用
20th International Conference on information security and Cryptology, Inscrypt 2024
作者: Gao, Birou Zhang, Rui Xiao, Yuting Zou, Huan Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology Dongguan University of Technology Guangdong China Information Security Center China Mobile Communication Corporation Beijing China
Blockchain wallets protect users’ assets by securely storing keys. Research has explored various aspects, including BIP32 for key derivation in cold/hot settings and PDPKS further enhancing key insulation. However, m... 详细信息
来源: 评论