咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1455 条 记 录,以下是481-490 订阅
排序:
ASTARS Aided NOMA Covert communication Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Yue, Xinwei Song, Xinlong Zhao, Jingjing Huang, Chongwen Jin, Hongxu Xiang, Wei Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing102206 China Beijing Information Science and Technology University Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing102206 China Beihang University School of Electronic and Information Engineering Beijing100191 China Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China Xidian University State Key Laboratory of Integrated Service Networks Xi'an710071 China Hangzhou310027 China Zunyi Normal University School of Information Engineering Zunyi563006 China La Trobe University School of Computing Engineering and Mathmatical Sciences MelbourneVIC3086 Australia
The active simultaneously transmitting and reflecting surface (STARS) has been proposed as a complement of passive STARS (PSTARS) to inhibit the double path-loss. This paper applies the active STARS (ASTARS) to aid in... 详细信息
来源: 评论
Fault Attack of SMS4 Based on Internal Collisions  4
Fault Attack of SMS4 Based on Internal Collisions
收藏 引用
2019 4th International Seminar on Computer technology, Mechanical and Electrical Engineering, ISCME 2019
作者: Zhu, Renjie Ou, Qingyu Luo, Fang Department of Information Security Naval University of Engineering Science and Technology on Communication Security Laboratory Wuhan Hubei430000 China
A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successful... 详细信息
来源: 评论
Sub-Mbps key-rate continuous-variable quantum key distribution with local-local-oscillator over 100 km fiber
arXiv
收藏 引用
arXiv 2022年
作者: Pi, Yaodi Wang, Heng Pan, Yan Shao, Yun Li, Yang Yang, Jie Zhang, Yichen Huang, Wei Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
We experimentally demonstrated a sub-Mbps key rate Gaussian-modulated coherent-state continuous-variable quantum key distribution (CV-QKD) over 100 km transmission distance. To efficiently control the excess noise, th... 详细信息
来源: 评论
Improved GNSS-IR height measurement method based on locally weighted regression
Improved GNSS-IR height measurement method based on locally ...
收藏 引用
9th International Symposium on Test Automation & Instrumentation (ISTAI 2022)
作者: Z. Luo J. Shang F. Li R. Pang Y. Wang College of Telecommunication Engineering Hangzhou Dianzi University Hangzhou 310018 People's Republic of China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 People's Republic of China
Global Navigation Satellite System Interferometric reflectance measurement (GNSS-IR) is a new remote sensing technology which uses satellite reflectance signals for monitoring. Aiming at the problems that the current ... 详细信息
来源: 评论
The Meta Distribution of SINR in UAV-Assisted Cellular Networks
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Minwei Yang, Kai Niyato, Dusit Yuan, Hang Zhou, He Xu, Zhan The School of Information and Electronics Beijing Institute of Technology Beijing100081 China The School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China The School of Computer Science and Engineering Nanyang Technological University 639798 Singapore The Key Laboratory of Modern Measurement and Control Technology Beijing Information Science and Technology University Beijing100101 China The School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China
Mounting compact and lightweight base stations on unmanned aerial vehicles (UAVs) is a cost-effective and flexible solution to provide seamless coverage on the existing terrestrial networks. While the coverage probabi... 详细信息
来源: 评论
Energy Efficiency Optimization of IRS-Aided Multiuser MISO Underlay EH-CR communication Systems By Using PER-SD3 Method
收藏 引用
IEEE Transactions on Cognitive communications and Networking 2025年
作者: Wang, Jun Pei, Hai Yang, Liang Hu, Jinsong Wu, Liang Shu, Feng Fuzhou University College of Electrical Engineering and Automation Fuzhou350108 China Fuzhou University Mechanical and Electrical Engineering Practice Center Fuzhou350108 China Fuzhou University College of Physics and Information Engineering Fuzhou China Southeast University National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing210006 China Hainan University School of Information and Communication Engineering Haikou570228 China Nanjing University of Science and Technology School of Electronic and Optical Engineering Nanjing210094 China
With the increasing demand of wireless communication, the data rates supported by wireless communication technology are required to be higher, which also leads to the shortage of spectrum resources. Cognitive radio (C... 详细信息
来源: 评论
FlexEdge: Digital Twin-Enabled Task Offloading for UAV-Aided Vehicular Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Li, Bin Xie, Wancheng Ye, Yinghui Liu, Lei Fei, Zesong Nanjing University of Information Science and Technology Nanjing210044 China The Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi’an710121 China The Guangzhou Institute of Technology Xidian University Guangzhou510555 China The School of Information and Electronics Beijing Institute of Technology Beijing100081 China
Integrating unmanned aerial vehicles (UAVs) into vehicular networks have shown high potentials in affording intensive computing tasks. In this paper, we study the digital twin driven vehicular edge computing networks ... 详细信息
来源: 评论
Power Internet of Things security Evaluation Method Based on Fuzzy Set Theory  15th
Power Internet of Things Security Evaluation Method Based on...
收藏 引用
15th International Conference on Genetic and Evolutionary Computing, ICGEC 2023
作者: Wang, Yuman Wu, Hongbin Wang, Yilei Wang, Zixiang Zhu, Xinyue Qian, Kexiang SGRI Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co. Ltd. Beijing102200 China Internet Technology Center State Grid Zhejiang Electric Power Co. Ltd. Research Institute Hangzhou310000 China School of Computer Science Northeast Electric Power University Jilin Jilin City132012 China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100000 China
Aiming at the problems of high fuzziness and low integrity of the current Power Internet of Things network security evaluation index system, the fuzzy set theory is used to evaluate the security issues of Power IoT te... 详细信息
来源: 评论
FLARE: Towards Universal Dataset Purification against Backdoor Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Hou, Linshan Luo, Wei Hua, Zhongyun Chen, Songhua Yu Zhang, Leo Li, Yiming School of Computer Science and Technology Harbin Institute of Technology Guangdong Shenzhen518055 China School of Information Technology Deakin University Australia Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong Shenzhen518055 China School of Information and Communication Technology Griffith University Southport Gold CoastQLD4215 Australia College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep neural networks (DNNs) are susceptible to backdoor attacks, where adversaries poison datasets with adversary-specified triggers to implant hidden backdoors, enabling malicious manipulation of model predictions. D... 详细信息
来源: 评论
A Deep Exploration of BitLocker Encryption and security Analysis  20
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Tan, Cheng Zhang, Lijun Bao, Liang Science and Technology on Communication Security Laboratory Chengdu China Security Ministry of Public Security Key Lab of Information Network Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论