咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,452 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 951 篇 工学
    • 520 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 82 篇 光学工程
    • 78 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 566 篇 理学
    • 285 篇 数学
    • 210 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 28 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 20 篇 security
  • 20 篇 heuristic algori...
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,251 篇 英文
  • 162 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1452 条 记 录,以下是931-940 订阅
排序:
Research on Color Harmony Evaluation Method based on Color Complexity Measure
Research on Color Harmony Evaluation Method based on Color C...
收藏 引用
Culture-oriented science & technology (ICCST), International Conference on
作者: Yanting Gao Jingjing Zhang Shuang Wang Yuncong Peng Aixia Tang School of Information and Communication Engineering Communication University of China Beijing China Ministry of Culture and Tourism Key Laboratory of Acoustic Visual Technology and Intelligent Control System (Communication University of China) Beijing Key Laboratory of Modern Entertainment Technology (Communication University of China) School of Computer Science and Cybersecurity Communication University of China Beijing China
Color harmony is an important factor affecting the aesthetic feeling of images and plays an important role in visual perception. It can evaluate the feasibility of images by constructing the computational model of hum... 详细信息
来源: 评论
Advanced geometry surface coding for dynamic point cloud compression
arXiv
收藏 引用
arXiv 2021年
作者: Xiong, Jian Gao, Hao Wang, Miaohui Li, Hongliang Ngan, King Ngi Lin, Weisi College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China College of Artificial Intelligence Nanjing University of Posts and Telecommunications Nanjing210003 China School of Computer Science and Cyberspace Security Hainan University China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore
In video-based dynamic point cloud compression (V-PCC), 3D point clouds are projected onto 2D images for compressing with the existing video codecs. However, the existing video codecs are originally designed for natur... 详细信息
来源: 评论
A Analysis of Attack and Defense Mobile Ad Hoc Network Based on OPNET
A Analysis of Attack and Defense Mobile Ad Hoc Network Based...
收藏 引用
作者: Jiahao Dai Xiaofeng Xu Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No.36 Institute
Due to the broadcast nature of wireless communications, the damage to mobile ad hoc networks is becoming more and more common. We propose a network stability model that can effectively reflect the network performance ... 详细信息
来源: 评论
On the regularization and optimization in quantum detector tomography
arXiv
收藏 引用
arXiv 2022年
作者: Xiao, Shuixin Wang, Yuanlong Zhang, Jun Dong, Daoyi Yokoyama, Shota Petersen, Ian R. Yonezawa, Hidehiro University of Michigan Shanghai Jiao Tong University Joint Institute Shanghai Jiao Tong University Shanghai200240 China School of Engineering and Information Technology University of New South Wales CanberraACT2600 Australia Key Laboratory of Systems and Control Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Centre for Quantum Computation and Communication Technology Australian Research Council Centre for Quantum Dynamics Griffith University BrisbaneQLD4111 Australia Centre for Quantum Computation and Communication Technology Australian Research Council CanberraACT2600 Australia School of Engineering Australian National University CanberraACT2601 Australia
Quantum detector tomography (QDT) is a fundamental technique for calibrating quantum devices and performing quantum engineering tasks. In this paper, we utilize regularization to improve the QDT accuracy whenever the ... 详细信息
来源: 评论
A Novel Localization Method Based on FDA Beam Intersection
A Novel Localization Method Based on FDA Beam Intersection
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Yezi Ma Ping Wei Huaguo Zhang School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Communication Information Security Control Laboratory School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In the past localization methods, both mechanical and phased array radars require angle scanning because their beampatterns are only angle-dependent, resulting in the echo time difference only contains the range infor... 详细信息
来源: 评论
Twin-field quantum key distribution with passive-decoy state
arXiv
收藏 引用
arXiv 2020年
作者: Teng, Jun Lu, Feng-Yu Yin, Zhen-Qiang Fan-Yuan, Guan-Jie Wang, Rong Wang, Shuang Chen, Wei Huang, Wei Xu, Bing-Jie Guo, Guang-Can Han, Zheng-Fu CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China Synergetic Innovation Center of Quantum Information & Quantum Physics University of Science and Technology of China HefeiAnhui230026 China State Key Laboratory of Cryptography P. O. Box 5159 Beijing100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication ChengduSichuan610041 China
Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance l... 详细信息
来源: 评论
Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Rui-Qiang Yin, Zhen-Qiang Lu, Feng-Yu Wang, Rong Wang, Shuang Chen, Wei Huang, Wei Xu, Bing-Jie Guo, Guang-Can Han, Zheng-Fu CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China Synergetic Innovation Center of Quantum Information & Quantum Physics University of Science and Technology of China HefeiAnhui230026 China State Key Laboratory of Cryptography P. O. Box 5159 Beijing100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication ChengduSichuan610041 China
Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics. In practice, the secret key rate of a QKD protocol is always lowered with the inc... 详细信息
来源: 评论
Topologically Enhanced Circular Dichroism from Metasurfaces
收藏 引用
Physical Review Applied 2021年 第3期16卷 L031001-L031001页
作者: Jiaxin Chen Lishuan Wang Wei Wu Wei Cai Huasong Liu Mengxin Ren Jingjun Xu Key Laboratory of Weak-Light Nonlinear Photonics Ministry of Education School of Physics and TEDA Applied Physics Institute Nankai University Tianjin 300071 People’s Republic of China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308 People’s Republic of China Tianjin Key Laboratory of Optical Thin Film Tianjin Jinhang Technical Physics Institute Tianjin 300080 People’s Republic of China Collaborative Innovation Center of Extreme Optics Shanxi University Taiyuan Shanxi 030006 People’s Republic of China
Circular dichroism (CD) is one of the most distinctive properties of chiral materials. In recent decades, chiral metasurfaces have been regarded as a promising framework to realize chiral optical devices with ultrathi... 详细信息
来源: 评论
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
收藏 引用
China communications 2018年 第2期15卷 190-208页
作者: Jin Li Jinfu Chen Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang National key laboratory of science and technology on information system security Beijing institute of system engineering School of Computer Science and Communication Engineering Jiangsu University
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... 详细信息
来源: 评论
MILP-aided bit-based division property for ARX ciphers
收藏 引用
science China(information sciences) 2018年 第11期61卷 229-231页
作者: Ling SUN Wei WANG Ru LIU Meiqin WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Science and Technology on Communication Security Laboratory No.30 Research Institute of China Electronics Technology Group Corporation State Key Laboratory of Cryptology
Division property, which was proposed by Todo [1]at EUROCRYPT 2015, is a new technique to detect integral property. It could explicitly depict the hidden properties between the traditional ALL and BALANCE properties i... 详细信息
来源: 评论