咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,452 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 951 篇 工学
    • 520 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 82 篇 光学工程
    • 78 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 566 篇 理学
    • 285 篇 数学
    • 210 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 28 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 20 篇 security
  • 20 篇 heuristic algori...
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,251 篇 英文
  • 162 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1452 条 记 录,以下是891-900 订阅
排序:
Practical security analysis of a continuous-variable quantum random number generator with a noisy local oscillator
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Weinan Zhang, Yichen Zheng, Ziyong Li, Yang Xu, Bingjie Yu, Song State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
A quantum random-number generator (QRNG) can theoretically generate unpredictable random numbers with perfect devices and is an ideal and secure source of random numbers for cryptography. However, the practical implem... 详细信息
来源: 评论
A Patient Centric Agent Assisted Private Blockchain on Hyperledger Fabric for Managing Remote Patient Monitoring
A Patient Centric Agent Assisted Private Blockchain on Hyper...
收藏 引用
International Conference on Electrical and Computer Engineering (ICECE)
作者: Md. Anwar Hussen Wadud T. M. Amir-Ul-Haque Bhuiyan Md Ashraf Uddin Md. Motiur Rahman Mawlana Bhashani Science and Technology University Bangladesh Institute of Information and Communication Technology Bangladesh University of Engineering and Technology Internet Commerce Security Laboratory Federation University Australia Australia
Recently, during the COVID-19 situation, the requirement and importance of tracking patients from a remote location have increased significantly. Most patients now prefer to obtain their doctor's care and check th... 详细信息
来源: 评论
Research on Nonlinear Frequency Compression Method of Hearing Aid with Adaptive Compression Ratio
收藏 引用
Computer Modeling in Engineering & sciences 2019年 第11期121卷 551-567页
作者: Xia Wang Hongming Shen Huawei Tao Ruiyu Liang Xing Deng Haijian Shao Li Zhao Cairong Zou School of Information Science and Technology Nantong UniversityNantong226019China School of Information Science and Engineering Henan University of TechnologyZhengzhou450001China School of Communication Engineering Nanjing Institute of TechnologyNanjing211167China School of Automation Key Laboratory of Measurement and Control for CSEMinistry of EducationSoutheast UniversityNanjing210096China School of Computer Science Jiangsu University of Science and TechnologyZhenjiang212003China School of Information Science and Engineering Southeast UniversityNanjing210096China
To make full use of the residual audible frequency band of hearing-loss patients and improve the intelligibility of speech,an adaptive nonlinear frequency compression(NFC)algorithm is proposed,which amplifies signals ... 详细信息
来源: 评论
High-speed Gaussian modulated continuous-variable quantum key distribution with a local local oscillator based on pilot-tone-assisted phase compensation
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Heng Pi, Yaodi Huang, Wei Li, Yang Shao, Yun Yang, Jie Liu, Jinlu Zhang, Chenlin Zhang, Yichen Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
A high-speed Gaussian modulated continuous-variable quantum key distribution (CVQKD) with a local local oscillator (LLO) is experimentally demonstrated based on pilot-tone-assisted phase compensation. In the proposed ... 详细信息
来源: 评论
Two-stage solution of quantum process tomography in the natural basis
Two-stage solution of quantum process tomography in the natu...
收藏 引用
IEEE Conference on Decision and control
作者: Shuixin Xiao Yuanlong Wang Daoyi Dong Jun Zhang School of Engineering and Information Technology University of New South Wales Canberra ACT Australia UMich-SJTU Joint Institute Shanghai Jiao Tong University Shanghai China Key Laboratory of Systems and Control Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China Centre for Quantum Computation and Communication Technology (Australian Research Council) Centre for Quantum Dynamics Griffith University Brisbane Queensland Australia
Quantum process tomography (QPT) is a critical task for characterizing the dynamics of quantum systems and achieving precise quantum control. In this paper, we propose an effective two-stage solution (TSS) for QPT in ... 详细信息
来源: 评论
RePAD: Real-time Proactive Anomaly Detection for Time Series
arXiv
收藏 引用
arXiv 2020年
作者: Lee, Ming-Chang Lin, Jia-Chun Gran, Ernst Gunnar Department of Information Security and Communication Technology Norwegian University of Science and Technology Ametyst-bygget Gjøvik2815 Norway Simula Research Laboratory Fornebu1364 Norway
During the past decade, many anomaly detection approaches have been introduced in different fields such as network monitoring, fraud detection, and intrusion detection. However, they require understanding of data patt... 详细信息
来源: 评论
An Optimized Method of Packet Loss Rate under Backup Path Protection in OBS Network
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1746卷
作者: Aodong Meng Yucheng Chen Jiahao Dai Yongqun Chen Science and Technology on Communication Information Security Control Laboratory Jiaxing China No.36 Research Institute of CETC Jiaxing China
In order to calculate the packet loss rate in OBS network, this paper proposes a method, which performs good in both accuracy and rapidity, based on Erlang B formula to estimate the packet loss probability in OBS netw...
来源: 评论
Improved cryptanalysis of step-reduced SM3
收藏 引用
science China(information sciences) 2018年 第3期61卷 226-227页
作者: Yanzhao SHEN Dongxia BAI Hongbo YU Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University School of Mathematics Shandong University Department of Computer Science and Technology Tsinghua University Science and Technology on Communication Security Laboratory
SM3 is the Chinese hash standard and is standardized in GB/T 32905-2016[1].As a hash function,it must fulfill three security requirements,collision resistance,preimage resistance,and second preimage *** the ongoing ev... 详细信息
来源: 评论
Wireless communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm  5th
Wireless Communication Signal Strength Prediction Method Bas...
收藏 引用
5th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2019
作者: Chen, Zhao Xiong, Ning Wang, Yujue Ding, Yong Xiang, Hengkui Tang, Chenjun Liu, Lingang Zou, Xiuqing Luo, Decun Key Lab on Cognitive Radio and Information Processing School of Information and Communication Guilin University of Electronic Technology Guilin541004 China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China
Existing interference protection systems lack automatic evaluation methods to provide scientific, objective and accurate assessment results. To address this issue, this paper develops a layout scheme by geometrically ... 详细信息
来源: 评论
Direction Modulation Design for UAV Assisted by IRS with Discrete Phase Shift
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green communications and Networking 2025年
作者: Li, Maolin Gao, Wei Wu, Qi Shu, Feng Pan, Cunhua Wu, Di Hainan University School of Information and Communication Engineering Haikou570228 China Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai200240 China Beijing Jiaotong University State Key Laboratory of Rail Traffic Control and Safety Beijing100044 China Hainan University School of Information and Communication Engineering Collaborative Innovation Center of Information Technology Haikou570228 China Nanjing University of Science and Technology School of Electronic and Optical Engineering Nanjing210094 China Southeast University National Mobile Communications Research Laboratory China
As a physical layer security technology, directional modulation (DM) can be combined with intelligent reflect-ing surface (IRS) to improve the security of drone communications. In this paper, a directional modulation ... 详细信息
来源: 评论