咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是651-660 订阅
排序:
Intelligent Reflection Enabling Technologies for Integrated and Green Internet-of-Everything Beyond 5G: communication, Sensing, and security
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Wei Xu, Wei You, Xiaohu Zhao, Chunming Wei, Kejun The National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China The Purple Mountain Laboratories Nanjing211111 China The China Academy of Information and Communications Technology China
Internet-of-Everything (IoE) has gradually been recognized as an integral part of future wireless networks. In IoE, there can be an ultra-massive number of smart devices of various types to be served, imposing multi-d... 详细信息
来源: 评论
Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks
收藏 引用
Journal of Modern Power Systems and Clean Energy 2021年 第3期9卷 477-484页
作者: Ming Ni Manli Li Jun’e Li Yingjun Wu Qi Wang the NARI Group Corporation(State Grid Electric Power Research Institute) NARI Technology Co.Ltd.and the State Key Laboratory of Smart Grid Protection and ControlNanjing 211106China the School of Cyber Science and Engineering Wuhan Universityand the Key Laboratory of Aerospace Information Security and Trusted Computing of the Ministry of EducationWuhan 430072China the College of Energy and Electrical Engineering Hohai UniversityNanjing 211100China the School of Electrical Engineering Southeast UniversityNanjing 210096China
Due to the tight coupling between the cyber and physical sides of a cyber-physical power system(CPPS),the safe and reliable operation of CPPSs is being increasingly impacted by cyber *** situation poses a challenge to... 详细信息
来源: 评论
Smart Meter Intrusion Detection Based on APSO-DBN Model  1
Smart Meter Intrusion Detection Based on APSO-DBN Model
收藏 引用
1st International Conference on Smart City Challenges and Outcomes for Urban Transformation, SCOUT 2021
作者: Zhang, Yi-Ying Luo, Jian He, Yeshen Ma, Shengguo Liang, Kun Liu, Zhu Internet of Things and Information Security Laboratory Tianjin University of Science & Technology Tianjin300457 China Shenzhen Guodian Technology Communication Co. Ltd. China Cridcom CO. LTD. Shenzhen518110 China Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
With the continuous development of network technology and information technology, more and more attention has been paid to the network security of smart meters. When facing the network intrusion data of smart meters, ... 详细信息
来源: 评论
Large Generative Model Assisted 3D Semantic communication
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Feibo Peng, Yubo Dong, Li Wang, Kezhi Yang, Kun Pan, Cunhua You, Xiaohu Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China School of Information Science and Engineering Hunan Normal University Changsha China Changsha Social Laboratory of Artificial Intelligence Hunan University of Technology and Business Changsha China The Department of Computer Science Brunel University London United Kingdom The School of Computer Science and Electronic Engineering University of Essex ColchesterCO4 3SQ United Kingdom Changchun Institute of Technology China The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The Frontiers Science Center for Mobile Information Communication and Security National Mobile Communications Research Laboratory Southeast University Nanjing China The Purple Mountain Laboratories Nanjing China
Semantic communication (SC) is a novel paradigm for data transmission in 6G. However, there are several challenges posed when performing SC in 3D scenarios: 1) 3D semantic extraction;2) Latent semantic redundancy;and ... 详细信息
来源: 评论
Deployment of NRF in the Docker and Kubernetes - Based NFV Platform
Deployment of NRF in the Docker and Kubernetes - Based NFV P...
收藏 引用
Workshops of the 34th International Conference on Advanced information Networking and Applications, WAINA 2020
作者: Huang, Di Xu, Zhan Tian, Zhigang Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science & Technology University Beijing China School of Information and Communication Engineering Beijing Information Science & Technology University Beijing China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
Network Function Virtualization (NFV) which is one of the core technologies plays an important role in reality. NFV permits using Virtual Network Functions (VNF) as software components on top of a virtualization syste... 详细信息
来源: 评论
DistTune: Distributed fine-grained adaptive traffic speed prediction for growing transportation networks
arXiv
收藏 引用
arXiv 2021年
作者: Lee, Ming-Chang Lin, Jia-Chun Gran, Ernst Gunnar Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Simula Research Laboratory Fornebu Norway
Over the past decade, many approaches have been introduced for traffic speed prediction. However, providing fine-grained, accurate, time-efficient, and adaptive traffic speed prediction for a growing transportation ne... 详细信息
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China The Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China The Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Jiwei Shen, Chao Wang, Buhong Xia, Xiaofang Zhang, Meng Lin, Chenhao Li, Qian Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China Air Traffic Control and Navigation College Air Force Engineering University Xi’an China Information and Navigation College Air Force Engineering University Xi’an China School of Computer Science and Technology Xidian University Xi’an China
—Deep learning methods can not only detect false data injection attacks (FDIA) but also locate attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep learning vulnerabilities have be... 详细信息
来源: 评论
Two-Stage Task Planning Based on Resource Interchange in Space information Networks  15th
Two-Stage Task Planning Based on Resource Interchange in Spa...
收藏 引用
15th EAI International Conference on communications and Networking, ChinaCom 2020
作者: Liu, Runzi Li, Jing Ji, Xiang Wu, Weihua Zhou, Di Zhang, Yan School of Information and Control Engineering Xi’an University of Architecture and Technology Xi’an710055 China School of Telecommunications Engineering Xidian University Xi’an710071 China Science and Technology on Communication Networks Laboratory CETC the 54th Research Institute Shijiazhuang050081 China
The high computational complexity and the mismatch between the space-time distribution of tasks and resources raise great challenges on task planning in space information networks (SINs). This paper studies the task p... 详细信息
来源: 评论
Modeling Building Method of Lissajous Figure Reversal Period Based on the Group Quantization Phase Processing
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 551-558页
作者: DU Baoqiang LI Songlin SUN Xiyan FU Qiang School of Electronic Information Engineering Zhengzhou University of Light Industry School of Information and Communication Guilin University of Electronic Technology Science and Technology on Electronic Information Control Laboratory
To deeply understand the essential relationship between two different-frequency signals and explore the phase synchronization law in frequency standard comparison, a novel modeling building method of Lissajous figure ... 详细信息
来源: 评论