咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是571-580 订阅
排序:
Clutter classification for cognitive radar with a deep convolutional neural network  5
Clutter classification for cognitive radar with a deep convo...
收藏 引用
IET International Radar Conference 2020, IET IRC 2020
作者: Peng, Xiaoyan Tian, Yong Wang, Peng Yu, Junpeng Ren, Weiyi School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Electronic Information Control Laboratory Chengdu China
Nowadays, the electromagnetic environment of radar is complex and changeable, and the traditional algorithm is no longer effective to the situation. Hence, it is difficult for radar to have better performance. In this... 详细信息
来源: 评论
CLPVG: Circular limited penetrable visibility graph as a new network model for time series
arXiv
收藏 引用
arXiv 2021年
作者: Xuan, Qi Zhou, Jinchao Qiu, Kunfeng Xu, Dongwei Zheng, Shilian Yang, Xiaoniu Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Visibility Graph (VG) transforms time series into graphs, facilitating signal processing by advanced graph data mining algorithms. In this paper, based on the classic Limited Penetrable Visibility Graph (LPVG) method,... 详细信息
来源: 评论
Learning Fair and Efficient Multiple Access Schemes with Decomposed MADDPG
Learning Fair and Efficient Multiple Access Schemes with Dec...
收藏 引用
Future communications and Networks (FCN), International Conference on
作者: Zhaoyang Liu Haoxin Lin Xijun Wang Jie Gong Xiang Chen School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin China State Key Lab of Novel Software Technology Nanjing University Nanjing China Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
With the growing demand for wireless communication networks, achieving efficient and equitable channel access schemes has become paramount. In this paper, we delve into the realm of distributed channel access in homog... 详细信息
来源: 评论
High-throughput decoder of quasi-cyclic LDPC codes with limited precision for continuous-variable quantum key distribution systems
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Chuang Li, Yang Ma, Li Yang, Jie Huang, Wei Wang, Heng Luo, Yujie Lau, Francis C.M. Li, Yong Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China Department of Electronic and Information Engineering The Hong Kong Polytechnic University Hong Kong College of Computer Science Chongqing University Chongqing400044 China
More than Mbps secret key rate was demonstrated for continuous-variable quantum key distribution (CV-QKD) systems, but real-time postprocessing is not allowed, which is restricted by the throughput of the error correc... 详细信息
来源: 评论
SComplex: Advancing Specific Emitter Identification Through Deep Spiking Complex Neural Networks Beyond Traditional Lightweight Approaches
SComplex: Advancing Specific Emitter Identification Through ...
收藏 引用
IEEE International Conference on communications in China (ICCC)
作者: Naiyu Zhang Yabin Zhang Congan Xu Wei Zhang Haoran Zha Yu Han Qiao Tian Zeyu Tang Advanced Technology Research Institute Beijing Institute of Technology Jinan China College of Information and Communication Engineering Harbin Engineering University Harbin China Naval Aeronautical University Yantai China National Key Laboratory of Electromagnetic Space Security Chengdu Sichuan China College of computer science Harbin Engineering University Harbin China
Specific emitter identification (SEI), pivotal in military communication reconnaissance and electronic warfare, also plays a crucial role in civilian spectrum management. Traditional deep neural network methodologies ... 详细信息
来源: 评论
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4  1st
Protecting the Data Plane of SDN From Malicious Flow Entries...
收藏 引用
1st International Conference on security and Privacy in Digital Economy, SPDE 2020
作者: Zhi, Yifang Yang, Li Yang, Gaolei Zhang, Yuehong Science and Technology on Communication Information Security Control Laboratory Jiaxing China Xidian University Xi’an China PLA Air Force Xi’an Flight Academy Xi’an China
In Software-defined network (SDN), the switching devices on the data plane rely on the flow entries issued by controllers to forward packets. Therefore, the correctness of flow entries becomes critical. However, the l... 详细信息
来源: 评论
Geomagnetic Matching Combined Navigation Based on Improving Operation Efficiency of DTW Algorithm
Geomagnetic Matching Combined Navigation Based on Improving ...
收藏 引用
International Conference on Electronic Measurement and Instruments, ICEMI
作者: Gang Huo Junna Shang Dongli Zhang Yiteng Wang Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of China Electronics Technology Group Corporation Hangzhou Dianzi University HangZhou Zhejiang Hangzhou Dianzi University HangZhou Zhejiang Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of China Electronics Technology Group Corporation Jiaxing Zhejiang
Aiming at the problem of “singularity” generated by the traditional DTW matching algorithm, the DDTW matching algorithm is used to match the geomagnetic sequence, and the first derivative of the sequence is compared... 详细信息
来源: 评论
Research on PDCCH Channel in 5G NR System
Research on PDCCH Channel in 5G NR System
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Liang Tianyi Zhu Huijie Science and Technology on Communication Information Security Control Laboratory Jiaxing China No. 36 Research Institute of China Electronics Technology Group Corporation Jiaxing China
In the 5th Generation Mobile communication technology (5G) system, physical downlink control channel (PDCCH) controls the transmission and reception of uplink and downlink data by transmitting Downlink control Informa... 详细信息
来源: 评论
Heterogeneous influence of individuals’ behavior on mask efficacy in gathering environments
收藏 引用
Frontiers of Engineering Management 2022年 第4期9卷 550-562页
作者: Haochen SUN Xiaofan LIU Zhanwei DU Ye WU Haifeng ZHANG Xiaoke XU College of Information and Communication Engineering Dalian Minzu UniversityDalian 116600China Web Mining Laboratory Department of Media and CommunicationCity University of Hong KongHong KongChina WHO Collaborating Centre for Infectious Disease Epidemiology and Control School of Public HealthLi Ka Shing Faculty of MedicineThe University of Hong KongHong KongChina Laboratory of Data Discovery for Health Hong Kong Science and Technology ParkHong KongChina Computational Communication Research Center Beijing Normal University(Zhuhai)Zhuhai 519087China School of Journalism and Communication Beijing Normal UniversityBeijing 100875China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Mathematical ScienceAnhui UniversityHefei 230601China
Wearing masks is an easy way to operate and popular measure for preventing *** masks can slow down the spread of viruses,their efficacy in gathering environments involving heterogeneous person-to-person contacts remai... 详细信息
来源: 评论
Multi Topological Charges Vortex Beam Generator Based on Nonlinear Bound States in the Continuum with Improvement of Nonlinear Conversion Efficiency
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Hang Li, Hui Tan, Qi Song, Chunyu Li, Mengyao Liu, Yanyan Zhang, Yating Wang, Bo Li, Jie Yao, Jianquan Ministry of Education School of Precision Instruments and Opto-Electronics Engineering Tianjin University Tianjin300072 China Function laboratory for Marine Fisheries Science and FoocProduction Processes Qingdao National LaboratoryTechnology Qingdao China Key Laboratory of Quantum Matt Science Henan Key Laboratory of Photovoltaic Materials Henan University KaifengHenan475004 China Information Materials and Device Applications Key Laboratory of Sichuan ProvincialUniversities Chengdu University of Information Technology 610225 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
In the momentum space of bound states in the continuum (BIC), vortex configurations around the Γ-point are generated by the selection rules. The electric field distribution close to the BIC satisfies twofold rotation... 详细信息
来源: 评论