咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是151-160 订阅
排序:
Unicast Beamforming in the Presence of a Smart Reactive Jammer: A Stackelberg Game Approach  24
Unicast Beamforming in the Presence of a Smart Reactive Jamm...
收藏 引用
24th IEEE International Workshop on Signal Processing Advances in Wireless communications, SPAWC 2023
作者: Shi, Bai Shao, Huaizhong Lin, Jingran Zhai, Zhikai University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu China Laboratory of Electromagnetic Space Cognition and Intelligent Control Beijing100083 China Peng Cheng Laboratory Shenzhen518055 China
The malicious jamming attacks will disrupt legitimate public wireless communication systems, which has become a critical issue that must be considered in modern communication system design. This paper considers an ant... 详细信息
来源: 评论
Interval Type-2 Fuzzy Hierarchical Adaptive Cruise Following-control for Intelligent Vehicles
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第9期9卷 1658-1672页
作者: Hong Mo Yinghui Meng Fei-Yue Wang Dongrui Wu the College of Electric and Information Engineering Changsha University of Science and TechnologyChangsha 410114China the State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190 Qingdao Academy of Intelligent Industries Qingda 266109 the Center of China Economic and Social Security University of Chinese Academy of SciencesBeijing 100190China the Ministry of Education Key Laboratory on Image Information Processing and Intelligent Control the School of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China
Intelligent vehicles can effectively improve traffic congestion and road traffic *** cruise followingcontrol(ACFC)is a vital part of intelligent *** this paper,a new hierarchical vehicle-following control strategy is ... 详细信息
来源: 评论
Infrared Target Detection Based on the Fusion of Mask R-CNN and Image Enhancement Network
Infrared Target Detection Based on the Fusion of Mask R-CNN ...
收藏 引用
2022 Chinese Automation Congress, CAC 2022
作者: Liu, Fang Guan, Song Yu, Kuaikuai Gong, Hua Shengyang Ligong University College of Science Shenyang110159 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjing300308 China
In this paper, we focus on the problem of the infrared image detection. Aiming at the problem of the low contrast of the infrared images, an adaptive gamma transformation algorithm (AGT) is established to intelligentl... 详细信息
来源: 评论
A Passive Navigation Algorithm Based on Derivative Dynamic Time Regularization Geomagnetic Matching  2
A Passive Navigation Algorithm Based on Derivative Dynamic T...
收藏 引用
2021 2nd International Conference on Modeling, Big Data Analytics and Simulation, MBDAS 2021
作者: Wang, Yiteng Bao, Jinhong Li, Zehua Science and Technology on Communication Information Security Control Laboratory China No.36 Research Institute of China Electronics Technology Group Corporation China College of Telecommunication Engineering Hangzhou Dianzi University Hangzhou310018 China
As satellite positioning has shortcomings such as susceptibility to multipath interference, we look forward to using a new algorithm to solve these problems. The method of derivative dynamic time regularization is use... 详细信息
来源: 评论
Load Balancing Routing Algorithm for LEO Satellite Networks Based on Ant Colony Optimization
收藏 引用
Internet technology Letters 2025年 第3期8卷
作者: Zhi, Ruxin Wang, Jiahui Xu, Zhan Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing China Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing China
To address the problem of the unbalanced load and optimize the traffic distribution of large-scale low earth orbit (LEO) satellite networks, this paper proposes a load-balancing routing algorithm for LEO satellite net... 详细信息
来源: 评论
Prompt and Contrastive Learning for Few-shot Sentiment Classification  5
Prompt and Contrastive Learning for Few-shot Sentiment Class...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Wang, Fei Chen, Long Huang, Xiaohua Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ... 详细信息
来源: 评论
News-driven financial warning based on label information attention  5
News-driven financial warning based on label information att...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Zhilin, Ren Long, Chen Xiaohua, Huang Wenjing, Wang Cai, Xu Wei, Zhao Ziyu, Guan Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Most existing news-driven stock market prediction methods ignore the potential relationship between financial news and stocks. The complex relationship can help us to improve the accuracy of algorithmic trading system... 详细信息
来源: 评论
Delayed interference-based broadband optical chaos generation in a mutual coupled RSOA and DFB system
收藏 引用
Optics Letters 2025年 第10期50卷 3381-3384页
作者: Qian, Jiahao Jiang, Ning Li, Anran Zhang, Yiqun Xu, Bingjie Huang, Wei Qiu, Kun School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China Tianfu Jiangxi Laboratory Chengdu641419 China National Key Laboratory of Security Communication Chengdu610041 China
In this Letter, a delayed interference (DI)-based chaos generation scheme in a mutually coupled system consisting of a reflective semiconductor optical amplifier (RSOA) and a distributed feedback (DFB) semiconductor l... 详细信息
来源: 评论
Rotational random extraction of Toeplitz matrix for ghost imaging  4
Rotational random extraction of Toeplitz matrix for ghost im...
收藏 引用
4th International Conference on Optoelectronic science and Materials, ICOSM 2022
作者: Cheng, Zhengdong Sun, Maosheng Chen, Yi Chang, Haikuan Liu, Yanyan State Key Laboratory of Pulsed Power Laser Technology National University of Defense Technology Huangshan Road No.460 HeFei230037 China Science and Technology on Electro-Optical Information Security Control Laboratory Weiwu Road No.9 Tianjin300450 China
If Toeplitz matrix is used for compression-aware ghost imaging, the imaging quality will be very low. In order to solve the problem, a new experimental scheme for ghost imaging is proposed in this paper. The scheme fi... 详细信息
来源: 评论
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory  17
Analysis of Attack Effectiveness Evaluation of AD hoc Networ...
收藏 引用
17th International Conference on Computational Intelligence and security, CIS 2021
作者: Dai, Jiahao Chen, Yongqun China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a... 详细信息
来源: 评论