咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是1131-1140 订阅
排序:
HRPGAN: A GAN-based Model to Generate High-resolution Remote Sensing Images
收藏 引用
IOP Conference Series: Earth and Environmental science 2020年 第1期428卷
作者: Hai Sun Ping Wang Yifan Chang Li Qi Hailei Wang Dan Xiao Cheng Zhong Xuelian Wu Wenbo Li Bingyu Sun China Telecom Shanghai Ideal Information Industry (Group) Co. Ltd Shanghai China Department of Airborne Remote Sensing National Disaster Reduction Center of China Beijing China Institute of Technology Innovation Hefei Institute of Physical Science Chinese Academy of Sciences Hefei China The Third Research Institute of the Ministry of Public Security Shanghai China Guizhou Key Laboratory of Economics System Simulation Guizhou University of Finance and Economics Guiyang China Beijing Aerospace Flight Control Center Beijing China Institute of Intelligent Machines Chinese Academy of Sciences Hefei China
Generative adversarial networks (GAN) has been mainly used in the generation of natural images such as MNIST, CIFAR10 as well as Imagenet datasets and achieves satisfying generation results. However, GAN always fails ...
来源: 评论
A secure and high-performance multi-controller architecture for software-defined networking
收藏 引用
Frontiers of information technology & Electronic Engineering 2016年 第7期17卷 634-646页
作者: Huan-zhao WANG Peng ZHANG Lei XIONG Xin LIU Cheng-chen HU Department of Computer Science and Technology Xi'an Jiaotong UniversityXi'an 710059China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081China MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong UniversityXi'an 710049China
controllers play a critical role in software-defined networking(SDN).However,existing singlecontroller SDN architectures are vulnerable to single-point failures,where a controller's capacity can be saturated by fl... 详细信息
来源: 评论
Weak value amplification via second-order correlated technique
收藏 引用
Chinese Physics B 2016年 第2期25卷 58-61页
作者: 崔挺 黄靖正 刘翔 曾贵华 State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Laboratory on Navigation and Location-based Serviceand Center of Quantum Information Sensing and Processing Shanghai Jiao Tong University Shanghai Key Laboratory of Aerospace Intelligent Control Technology Shanghai Institute of Spaceflight Control Technology College of Information Science and Technology Northwest University
We propose a new framework combining weak measurement and second-order correlated technique. The theoretical analysis shows that weak value amplification (WVA) experiment can also be implemented by a second-order co... 详细信息
来源: 评论
Semi-fragile watermarking for image authentication based on compressive sensing
收藏 引用
science China(information sciences) 2016年 第5期59卷 248-250页
作者: Ling DU Xiaochun CAO Wei ZHANG Xinpeng ZHANG Na LIU Jianguo WEI School of Computer Science and Technology Tianjin University School of Computer Shenyang Aerospace University State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Communication and Information Engineering Shanghai University
Dear editor,With the aid of sophisticated photoediting software,multimedia content security is becoming increasingly prominent[1,2].The problems of verifying the integrity and recovering the alterations have been a ma... 详细信息
来源: 评论
Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction
arXiv
收藏 引用
arXiv 2017年
作者: Zhao, Yijia Zhang, Yichen Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified. In continuous-variable measurement-device-independent quantu... 详细信息
来源: 评论
Improved multiparty quantum key agreement in travelling mode
收藏 引用
science China(Physics,Mechanics & Astronomy) 2016年 第12期59卷 12-21页
作者: Wei Huang Qi Su BingJie Xu Bin Liu Fan Fan HengYue Jia YingHui Yang Science and Technology on Communication Security Laboratory Chengdu 610041China State Key Laboratory of Cryptology Beijing 100878China College of Computer Science Chongqing UniversityChongqing 400044China School of Information Central University of Finance and EconomicsBeijing 100081China School of Mathematics and Information Science Henan Polytechnic UniversityJiaozuo 454000China
The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designi... 详细信息
来源: 评论
Reactive/proactive connectivity management in a tactical service-oriented infrastructure
Reactive/proactive connectivity management in a tactical ser...
收藏 引用
International Conference on Military communications and information Systems (ICMCIS)
作者: Roberto Rigolin F. Lopes Mikko Nieminen Antti Viidanoja Stephen D. Wolthusen Norwegian Information Security Laboratory Norwegian University of Science and Technology Gjovik Norway Communication Systems Fraunhofer FKIE Bonn Germany Patria Systems Tampere Finland School of Mathematics and Information Security Royal Holloway University of London Surrey UK
This paper introduces a model to represent the information systems using a tactical service-oriented infrastructure (TSI) together with the orchestrations of core services providing the reactive/proactive connectivity... 详细信息
来源: 评论
Individual communication Transmitter Identification Using Correntropy-based Collaborative Representation
Individual Communication Transmitter Identification Using Co...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Ying-Ke Lei Science and Technology on Communication Information Security Control Laboratory
In this paper, an efficient radio transmitter identification method is proposed for identifying radio transmitters. The square integral bispectra (SIB) transformation is firstly utilized to extract the features from t... 详细信息
来源: 评论
High speed continuous variable source-independent quantum random number generation
arXiv
收藏 引用
arXiv 2017年
作者: Xu, Bingjie Chen, Ziyang Li, Zhengyu Yang, Jie Su, Qi Huang, Wei Zhang, Yichen Guo, Hong Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Cryptography Beijing100878 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
As a fundamental phenomenon in nature, randomness has a wide range of applications in the fields of science and engineering. Among different types of randomnumber generators (RNG), quantumrandomnumber generator (QRNG)... 详细信息
来源: 评论
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing
收藏 引用
China communications 2016年 第7期13卷 83-91页
作者: Jie Zhu Guoyuan Lin Fucheng You Huaqun Liu Chunru Zhou School of Computer Science and Technology China University of Mining&TechnologyXuzhou 221116China State Key Laboratory for Novel Software Technology hosted at Nanjing University Nanjing 210093China Information Engineering School of Beijing Institute of Graphic Communication Beijing 102600China Beijing Key Laboratory of Signal and Information Processing for High-end Printing Equipment Beijing Institute of Graphic CommunicationBeijing 100026China Information Security Center Beijing University of Posts and TelecommunicationsBeijing 100876China Nanjing University of Information Science&Technology Nanjing 210044China
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the *** secure the factors,a multiway dynamic trust chain transfer model was proposed on t... 详细信息
来源: 评论