咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是1261-1270 订阅
排序:
The identification algorithm of network key role based on behavior accumulation
The identification algorithm of network key role based on be...
收藏 引用
10th International Conference on Wireless communications, Networking and Mobile Computing (WiCOM 2014)
作者: Xiaofeng Xu Xiao Li Science and Technology on Communication Information Security Control Laboratory Jiaxing China Chinese Electronic Technology Group Corporation No.36 Institute Jiaxing China
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati... 详细信息
来源: 评论
A Sparsity Adaptive Compressive Sampling Matching Pursuit Algorithm
A Sparsity Adaptive Compressive Sampling Matching Pursuit Al...
收藏 引用
2014 International Conference on Industrial Engineering and information technology
作者: Xiang-pu LIU Feng YANG Xiang YI Li-li GUO College of Information and Communication Engineering Harbin Engineering University Science and Technology on Electronic Information Control Laboratory
In the area of compressed sensing(CS),the compressive sampling matching pursuit(Co Sa MP) algorithm offers a theoretical reconstruction guarantee in noise environment by exploiting a backtracking *** it relies on the ... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论
An Audio Zero-Watermark Scheme Based on Energy Comparing
收藏 引用
China communications 2014年 第7期11卷 110-116页
作者: YANG Yu LEI Min CHENG Mingzhi LIU Bohuai LIN Guoyuan XIAO Da Information Security Center Beijing University of Posts and Telecommunications Beijing China College of Information Engineering Beijing Institute of Graphic Communication Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing China School of Computer Science and Technology China University of Mining and Technology China
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of ***,there is little research on audio *** paper proposes an audio zero-watermark scheme base... 详细信息
来源: 评论
DESIGNING OF AUTHENTICATION PROTOCOL FOR MULTI-LEVEL security VIRTUAL DESKTOPS
DESIGNING OF AUTHENTICATION PROTOCOL FOR MULTI-LEVEL SECURIT...
收藏 引用
2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems
作者: Yanbing Liu Haijun Zhang Jing Ma Yunpeng Xiao Engineering Laboratory of Network and Information Security Chongqing University of Posts and Telecommunications Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory The 54th Research Institute of China Electronic Technology Group Corporation
In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops,this paper proposes a authentication protocol based on multi-level security virtual ***,t... 详细信息
来源: 评论
Passive satellite localization using TDOA/FDOA/AOA measurements
Passive satellite localization using TDOA/FDOA/AOA measureme...
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Bin, Yang Zheng Lei, Wang Qun, Chen Pei Nan, Lu An Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China
Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using... 详细信息
来源: 评论
Designing of authentication protocol for multi-level security virtual desktops
Designing of authentication protocol for multi-level securit...
收藏 引用
IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS)
作者: Yanbing Liu Haijun Zhang Jing Ma Yunpeng Xiao Engineering Laboratory of Network and Information Security Chongqing University of Posts and Telecommunications Chongqing China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory The 54th Research Institute of China Electronic Technology Group Corporation Hebei China
In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops, this paper proposes a authentication protocol based on multi-level security virtual desk... 详细信息
来源: 评论
Hawkeye: Finding spamming accounts
Hawkeye: Finding spamming accounts
收藏 引用
Asia-Pacific Network Operations and Management Symposium (APNOMS)
作者: Chia-Heng Li Fu-Hau Hsu Shih-Jen Chen Chuan-Sheng Wang Yao-Hsin Chen Yan-Ling Hwang Computer Science and Information Engineering National Central University Jhongli Taiwan Information and Communication Security Laboratory Chunghwa Telecom Co. Ltd Yangmei Taiwan Instutute for Informtion Industry Taipei Taiwan Information and Communication Research Laboratories Industrial Technology Research Institute Hsinchu Taiwan School of Applied Foreign Languages Chung Shan Medical University Taichung Taiwan
Email spam is a critical problem to the Internet for a long time. The average amount of spam mail reached 72.1% of all email traffic in the world in 2012. The greatest threat to the email service providers was the spa... 详细信息
来源: 评论
The autocorrelation distribution of balanced Boolean function
收藏 引用
Frontiers of Computer science 2013年 第2期7卷 272-278页
作者: Yu ZHOU Weiguo ZHANG Juan LI Xinfeng DONG Guozhen XIAO Science and Technology on Communication Security Laboratory China Chengdu 610041 State Key Laboratory of Integrated Service Networks Xidian UniversityChina Xi'an 710071 Foreign Language Department Emei Campus Southwest Jiaotong University China Emei 614202 State Key Laboratory of Information Security Chinese Academy of SciencesChina Beijing 100093
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower ... 详细信息
来源: 评论
The Multi-Objective Hybrid SA Algorithm for DC Motor Design
The Multi-Objective Hybrid SA Algorithm for DC Motor Design
收藏 引用
2014 International Conference on Artificial,Intelligence and Software Engineering(AISE 2014)
作者: Xiao-min ZHAO Guo-li LI Rui ZHOU Kun JIANG Cun-gang HU Guang-hui FANG Hao MENG School of Electrical Engineering and Automation Anhui University National Engineering Laboratory of Energy-Saving Motor & Control Technology Anhui University Anhui Province Laboratory of Electrical Economize and Safety Anhui University College of Computer Science and Technology Anhui University School of Communication and Control Engineering Jiangnan University School of Information and Computer Anhui Agricultural University
The DC motor is optimal designed using multi-objective hybrid Simulated Annealing(SA) algorithm. Typical examples of optimization show the efficiency and feasibility of the algorithm.
来源: 评论