咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,452 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 951 篇 工学
    • 520 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 82 篇 光学工程
    • 78 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 566 篇 理学
    • 285 篇 数学
    • 210 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 28 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 20 篇 security
  • 20 篇 heuristic algori...
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,251 篇 英文
  • 162 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1452 条 记 录,以下是871-880 订阅
排序:
Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
收藏 引用
International Journal of Network security 2021年 第2期23卷 332-342页
作者: Ren, Juan Zhang, Leyou Wang, Baocang Science and Technology on Communication Security Laboratory Chengdu610041 China School of Mathematics and Statistics Xidian University Xi'an710126 China School of Information Engineering Xuchang University Xuchang461000 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an710071 China
Attribute-based searchable encryption (ABSE) scheme is an efficient mechanism to implement access control and secure keywords search based on attributes over encrypted data. However, most existing ABSE schemes rely on... 详细信息
来源: 评论
Decentralizing Multi-Authority Attribute-Based Access control Scheme with Fully Hidden Policy
收藏 引用
International Journal of Network security 2021年 第4期23卷 588-603页
作者: Zhang, Leyou Ren, Juan Kang, Li Wang, Baocang School of Mathematics and Statistics Xidian University Xi’an710126 China Science and Technology on Communication Security Laboratory Chengdu610041 China School of Information Engineering Xuchang University Xuchang461000 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China
Decentralized multi-authority attribute-based encryption (MA-ABE) is considered a potential method to protect users’ privacy in the cloud. However, most of the existing works cannot provide a complete solution since ... 详细信息
来源: 评论
Modulation Recognition of Underwater Acoustic communication Signals Based on Joint Feature Extraction
Modulation Recognition of Underwater Acoustic Communication ...
收藏 引用
2019 IEEE International Conference on Signal, information and Data Processing, ICSIDP 2019
作者: Ge, Yizhou Zhang, Xin Zhou, Qing Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China No.36 Research Institute of CETC Jiaxing314000 China School of Marine Science and Technology Northwestern Polytechnical University Xi'an710072 China
Recently, the research on modulation identification of underwater acoustic (UWA) communication signals has attracted much attention. It is a challenge to identify the modulation of underwater acoustic communication si... 详细信息
来源: 评论
Tigc-Net: Transformer-Improved Graph Convolution Network for Spatio-Temporal Prediction
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Kai Yang, Chunfeng Zhou, Zhengyuan Liu, Yao Ji, Tianjiao Sun, Weiya Chen, Yang School of Cyber Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China The College of Software Engineering Southeast University Nanjing210096 China Laboratory of Image Science and Technology The School of Computer Science and Engineering Southeast University Nanjing210096 China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of Radiology Zhongda Hospital Southeast University Nanjing210009 China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing210096 China NHC Key Laboratory of Medical Virology and Viral Diseases National Institute for Viral Disease Control and Prevention Chinese Center for Disease Control and Prevention Beijing China Beijing Institute of Tracking and Communication Technology Beijing100094 China
Modeling spatio-temporal sequences is an important topic yet challenging for existing neural networks. Most of the current spatio-temporal sequence prediction methods usually capture features separately in temporal an... 详细信息
来源: 评论
Distributed Fine-Grained Traffic Speed Prediction for Large-Scale Transportation Networks based on Automatic LSTM Customization and Sharing
arXiv
收藏 引用
arXiv 2020年
作者: Lee, Ming-Chang Lin, Jia-Chun Gran, Ernst Gunnar Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik2815 Norway Simula Research Laboratory Fornebu1364 Norway
Short-term traffic speed prediction has been an important research topic in the past decade, and many approaches have been introduced. However, providing fine-grained, accurate, and efficient traffic-speed prediction ... 详细信息
来源: 评论
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes
Extending Registration and Authentication Processes of FIDO2...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and communications (TrustCom)
作者: Chengqian Guo Quanwei Cai Qiongxiao Wang Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering CAS Data Assurance and Communication Security Research Center CAS School of Cyber Security University of Chinese Academy of Sciences School of Cyber Security University of Science and Technology of China
FIDO2, the newest set of FIDO specifications, enables the user to leverage an external authenticator for the authentication in both mobile and desktop environments (referred to as user agent). For the secure registrat... 详细信息
来源: 评论
Robust Beamforming Based on Covariance Matrix Reconstruction and ADMM
Robust Beamforming Based on Covariance Matrix Reconstruction...
收藏 引用
IEEE International Conference on Radar
作者: Pengcheng Gong Zhaobin Wang Kaiyan Xu School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China Hubei Key Laboratory for High-efficiency Utilization of Solar Energy and Operation Control of Energy Storage System Hubei University of Technology Wuhan China
Considering at the issue that the performance of the traditional beamforming algorithm will decrease sharply when the disturbance occurs at the disturbed position and the steering vector mismatch occurs, a new robust ... 详细信息
来源: 评论
Research on evaluation index system for software vulnerability analysis methods  4
Research on evaluation index system for software vulnerabili...
收藏 引用
4th IEEE International Conference on Data science in Cyberspace, DSC 2019
作者: Li, Jin Huang, Min-Huan Lu, Shuai-Bing Li, Hu Chen, Jin-Fu National Key Laboratory of Science and Technology on Information System Security Beijing China School of Computer Science and Communication Engineering Jiangsu University Jiangsu China
Due to the diversity of existing software vulnerability analysis methods, a unified index system is required if we are to accurately and comprehensively evaluate the analytic effects in order to further improve the le... 详细信息
来源: 评论
Research of Association Rules Mining based on Fuzzy Alarm Extraction
Research of Association Rules Mining based on Fuzzy Alarm Ex...
收藏 引用
作者: Li tongyan Lei dong Qin Zhiguang Chengdu University of Information Technology Dept.of Communication Engineering Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu University of Information Technology Dept.of Communication Engineering
In communication alarm correlation analysis, original alarm data often have problems about information redundancy, data incompleteness, time synchronization and "sharp boundary". This paper proposed a novel ... 详细信息
来源: 评论
GPDP: Game-Enhanced Personalized Differentially Private Smart Community
GPDP: Game-Enhanced Personalized Differentially Private Smar...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and communications (GreenCom)
作者: Yuping Zhang Youyang Qu Longxiang Gao Bruce Gu Lei Cui Xuemeng Zhai School of Network & Communication Chendu Technological University Chendu Sichuan China School of Information Technology Deakin University Geelong VIC Australia College of Engineering and Science Victoria University Footscary VIC Australia Key Laboratory of Advanced Control and Intelligent Information System Taiyuan University of Science and Technology Taiyuan Shanxi China College of Engineering and Science University of Electronic Science and Technology of China Chengdu Sichuan China
Smart community, as a key component of Internet of Things (IoT), is experiencing fast booming, which significantly enhances residents' quality of life. Using fog computing to establish a smart community is an effe... 详细信息
来源: 评论