咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology On Communication Information Security Control Laboratory"
1438 条 记 录,以下是51-60 订阅
排序:
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAYESIAN ALGORITHM WEIGHT OPTIMIZATION  10
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAY...
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Fang, Junzhe Wang, Liyong Ji, Haojie Guo, Teng Hu, Te Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China Zaozhuang Network Security Guarantee Center Zaozhuang China
As a major software testing method, fuzzing has the potential to enhance testing coverage and detect a great number of software vulnerabilities in complex code programs. The current fuzzy testing for multiple input pa... 详细信息
来源: 评论
A Study on Resource Allocation for Mobile Edge Computing-Assisted Industrial Iot
A Study on Resource Allocation for Mobile Edge Computing-Ass...
收藏 引用
2023 International Conference on Networks, communications and Intelligent Computing, NCIC 2023
作者: Lu, Jie Zhang, Yuexia Li, Junjie Ministry of Information Industry Beijing Information Science and Technology University Key Laboratory of Information and Communication Systems Beijing China Control Technology Ministry of Education Beijing Information Science and Technology University Key Laboratory of Modern Measurement Beijing China
Since the advancement of mobile communication technology, traditional industries are gradually transforming and upgrading, which leads to problems such as insufficient computing resources and excessive energy consumpt... 详细信息
来源: 评论
An Asymmetric Channel Attack Monitoring Method for Round-Trip Fiber Time Synchronization System  37
An Asymmetric Channel Attack Monitoring Method for Round-Tri...
收藏 引用
37th European Frequency and Time Forum, EFTF 2024
作者: Xu, Xuesong Zhang, Yichen Xu, Hailong Bian, Yiming Li, Yang Xu, Bingjie Yu, Song School of Electronic Engineering Beijing University of Posts and Telecommunications State Key Laboratory of Information Photonics and Optical Communications Beijing100876 China Institute of Southwestern Communication Science and Technology on Communication Security Laboratory Chengdu610041 China
We present a method for monitoring potential asymmetric channel attacks within a round-trip fiber time synchronization system. This is achieved by observing and tracking the time difference at the remote end. Experime... 详细信息
来源: 评论
MULTI-ROBOT PATH PLANNING AND COOPERATIVE OBSTACLE AVOIDANCE BASED ON MONTE-CARLO TREE SEARCH  10
MULTI-ROBOT PATH PLANNING AND COOPERATIVE OBSTACLE AVOIDANCE...
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Dai, Juan Jing, Yanzhang Su, Zhong Zhu, Cui Beijing Key Laboratory of High Dynamic Navigation Technology Beijing Information Science & Technology University Beijing China Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing China School of Automation Beijing Information Science & Technology University Beijing China School of Information and Communication Engineering Beijing Information Science & Technology University Beijing China
With the rapid development of artificial intelligence technologies, multi-robot cooperative processing tasks are becoming more and more common in various applications. However, traditional single-robot planning algori... 详细信息
来源: 评论
Confident information Coverage Reliability Evaluation for Sensor Networks of Openly Deployed ICP Systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2024年 2卷 565-574页
作者: Chen, Suning Yi, Yuanyuan Yi, Lingzhi Liu, Shenghao Deng, Xianjun Xia, Yunzhi Fan, Xiaoxuan Yang, Laurence T. Park, Jong Hyuk Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China Seoul National University of Technology Department of Computer Science and Engineering Seoul01811 Korea Republic of
Industrial Cyber-Physical (ICP) systems are integration of computation and physical processes to help achieve operational excellence. As sensors and actuators compose the openly deployed ICP systems and are often susc... 详细信息
来源: 评论
Arbitrarily rotating polarization direction and manipulating phases in linear and nonlinear ways using programmable metasurface
收藏 引用
Light(science & Applications) 2024年 第9期13卷 1789-1800页
作者: Wei Liu Si Ran Wang Jun Yan Dai Lei Zhang Qiao Chen Qiang Cheng Tie Jun Cui State Key Laboratory of Millimeter Waves Southeast UniversityNanjing 210096China Institute of Electromagnetic Space Southeast UniversityNanjing 210096China Frontiers Science Center for Mobile Information Communication and Security Southeast UniversityNanjing 210096China Electrical Engineering Department Chalmers University of TechnologyGothenburg 41258Sweden
Independent controls of various properties of electromagnetic(EM)waves are crucially required in a wide range of *** metasurface is a promising candidate to provide an advanced platform for manipulating EM ***,we prop... 详细信息
来源: 评论
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 421-432页
作者: Xiaodong Qu Chengcheng Guan Gang Xie Zhiyi Tian Keshav Sood Chaoli Sun Lei Cui the Shanxi Key Laboratory of Advanced Control and Equipment Intelligence Taiyuan University of Science and TechnologyTaiyuan 030024China the Faculty of Engineering and Information Technology University of Technology SydneyUltimo 2007Australia the Centre for Cyber Security Research and Innovation Deakin UniversityMelbourne 3125Australia the School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China
Accurate load forecasting is critical for electricity production,transmission,and *** learning(DL)model has replaced other classical models as the most popular prediction ***,the deep prediction model requires users t... 详细信息
来源: 评论
Detection of PFCP Protocol Based on Fuzz Method  2
Detection of PFCP Protocol Based on Fuzz Method
收藏 引用
2nd International Conference on Computer, control and Robotics, ICCCR 2022
作者: Cao, Yebei Chen, Yucheng Zhou, Wenan Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China
5G as a widely used mobile network, its security is of great significance. PFCP protocol is one of the important protocols that introduced into 5G core network, After the analysis of PFCP protocol and its security thr... 详细信息
来源: 评论
A Latency-offset Online Trajectory Planner based on Successive Convex Approximation
A Latency-offset Online Trajectory Planner based on Successi...
收藏 引用
2022 IEEE International Conference on Unmanned Systems, ICUS 2022
作者: Li, Yiming Jiang, Bin Yang, Junan Wang, Jian Li, Beibei Huang, Keju Shao, Kun College of Electronic Engineering National University of Defense Technology Hefei China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
An online trajectory planner permits autonomous unmanned vehicles to maneuver in a changing mission scenario and varying environment. However, in real-time online plannings, task performance, completeness and accuracy... 详细信息
来源: 评论
Decoy-state quantum-key-distribution-based quantum private query with error tolerance bound
收藏 引用
Physical Review A 2024年 第5期109卷 052442-052442页
作者: Bin Liu Zhonghao Liang Wei Huang Fei Gao Jiayi Yuan Bingjie Xu College of Computer Science The State Key Laboratory of Networking and Switching Technology Center for Network and Information Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China
Quantum private query (QPQ) faces many challenges in practical applications. At present, some scholars have made substantial work on overcoming channel loss, channel noise, and nonideal light sources, respectively. Ho... 详细信息
来源: 评论