咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是1111-1120 订阅
排序:
Image Encryption Using 2D Sine-Piecewise Linear Chaotic Map
Image Encryption Using 2D Sine-Piecewise Linear Chaotic Map
收藏 引用
International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)
作者: Yan-Ru Zhong Hua-Yi Liu Xi-Yan Sun Ru-Shi Lan Xiao-Nan Luo School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China School of Information and Communication Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Image and Graphics Guilin University of Electronic Technology Guilin China
In this paper, a new image encryption algorithm is proposed by integrating Sine and piecewise linear chaotic maps. In order to realize the effect of encrypted image, the security key and 2D Sine-piecewise linear chaot... 详细信息
来源: 评论
A new real-time calculating method for TDOA and FDOA passive location
A new real-time calculating method for TDOA and FDOA passive...
收藏 引用
2016年第二届能源设备科学与工程国际学术会议
作者: Yiming Zhou Jiawei Zhu No.36 Research Institute of CETC Science and Technology on Communication Information Security Control Laboratory
By researching on the differential evolution(DE)algorithm and passive localization model of two-station time difference of arrival(TDOA)and frequency difference of arrival(FDOA),a new calculating method based on DE al... 详细信息
来源: 评论
Humidity Error Compensating of MEMS Gyros Based on A daptive Threshold Denoising and RBF Neural Network
Humidity Error Compensating of MEMS Gyros Based on A daptive...
收藏 引用
第37届中国控制会议
作者: Wang Xin-wang Shen Xiao-lin Cao Hui-liang Deng Bo-wen School of Electrical and Control Engineering North University of China IEEE Science and Technology on Electronic Test & Measurement Laboratory North University of China School of Information and Communication Engineering North University of China
The large random errors in a typical MEMS gyros under the ranges of relative humidity *** order to solve the large random error under the ranges of relative humidity,a method based on adaptive threshold denoising and ... 详细信息
来源: 评论
A Route Optimization Model Based on Link State Awareness in SDN
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: Ran Li ZhaoWen Lin Jie Xu Yi Sun Network and Information Center Institute of Network Technology Beijing University of Posts and Telecommunications Beijing 100876 China 2 Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081 China 3 National Engineering Laboratory for Mobile Network Security Beijing 100876 China
In addressing the routing issue in the SDN environment, an improved ant colony algorithm is proposed in this paper, in which the ants tend to balance the path with less pheromone. Besides, the Top-K optimal path algor...
来源: 评论
Realization of remote sensing image segmentation based on K-means clustering
收藏 引用
IOP Conference Series: Materials science and Engineering 2019年 第7期490卷
作者: Yanhong Wang Denghui Li Yuying Wang Guangxi Key Lab of Wireless Wideband Communication & Signal Processing Guilin China Institute Of Information Technology of Guilin University of Electronic Technology Key Laboratory of Cognitive Radio and Information Processing Ministry of Education (Guilin University of Electronic Technology) GUET Guilin China School of Computer Science and Information Security of GUET
Segmentation of remote sensing image is the key technology of positioning system. Firstly, we transform the remote sensing image from RGB pace to Lab space. Then, three centres are iterated by using K- means algorithm...
来源: 评论
MD-UCON: A Multi-Domain Access control Model for SDN Northbound Interfaces
收藏 引用
Journal of Physics: Conference Series 2019年 第3期1187卷 032091-032091页
作者: Chang, Rui Lin, Zhaowen Sun, Yi Xu, Jie Network and Information Center Institute of Network Technology Beijing University of Posts and Telecommunications Beijing 100876 China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory National Engineering Laboratory for Mobile Network Security (No. 【2013】 2685) Network and Information Center Institute of Network Technology / Institute of Sensing Technology and Business Beijing University of Posts and Telecommunications. Beijing 100876 China
In SDN (Software Defined Network) environments, for the security considerations of the upper-layer application behaviors, we need to consider adding an access control mechanism to the northbound interface of the SDN c...
来源: 评论
New State Recovery Attacks on the Grain v1 Stream Cipher
收藏 引用
China communications 2016年 第11期13卷 180-188页
作者: Lin Ding Chenhui Jin Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao Zhengzhou Information Science and Technology Institute 450000 Zhengzhou China Science and Technology on Communication Security Laboratory 610041 Chengdu China
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key... 详细信息
来源: 评论
Default OSN privacy settings: Privacy risks  7th
Default OSN privacy settings: Privacy risks
收藏 引用
7th International Conference on eDemocracy, e-Democracy 2017
作者: Michota, Alexandra Katsikas, Sokratis Systems Security Laboratory Department of Digital Systems School of Information and Communication Technologies University of Piraeus 150 Androutsou St. Piraeus18532 Greece Center for Cyber and Information Security Norwegian University of Science and Technology P.O. Box 191 Gjøvik2802 Norway
Empirical privacy evaluation in OSNs may provide a better under standing of the effectiveness and the efficiency of the default privacy controls and those customized by the users. Proper user perception of the privacy... 详细信息
来源: 评论
Publisher Correction: Mitigation potential of global ammonia emissions and related health impacts in the trade network
收藏 引用
Nature communications 2021年 第1期12卷 7084页
作者: Rong Ma Ke Li Yixin Guo Bo Zhang Xueli Zhao Soeren Linder ChengHe Guan Guoqian Chen Yujie Gan Jing Meng School of Economics and Management Beihang University Beijing China. Harvard-NUIST Joint Laboratory for Air Quality and Climate Jiangsu Key Laboratory of Atmospheric Environment Monitoring and Pollution Control Collaborative Innovation Center of Atmospheric Environment and Equipment Technology School of Environmental Science and Engineering Nanjing University of Information Science and Technology Nanjing China. John A. Paulson School of Engineering and Applied Sciences Harvard University Cambridge MA USA. Princeton School of Public and International Affairs Princeton University Princeton NJ USA. Laboratory for Climate and Ocean-Atmosphere Studies Department of Atmospheric and Oceanic Sciences School of Physics Peking University Beijing China. School of Management China University of Mining and Technology (Beijing) Beijing China. zhangbo@***. School of Management China University of Mining and Technology (Beijing) Beijing China. Joint Research Centre Food Security Group European Commissions Ispra Italy. Arts and Science New York University Shanghai Shanghai China. Laboratory of Systems Ecology and Sustainability Science College of Engineering Peking University Beijing China. School of Government The Leo KoGuan Building Peking University 100871 Beijing China. The Bartlett School of Sustainable Construction University of College London London WC1E 7HB UK. jing.j.meng@ucl.ac.uk.
来源: 评论
Traffic Analysis of a Networks based on Stochastic Geometry to Exclude Malice Flow
收藏 引用
IOP Conference Series: Materials science and Engineering 2018年 第1期466卷
作者: Jiahao Dai Xiaofeng Xu Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No.36 Institute Zhejiang Jiaxing China
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ...
来源: 评论