咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1121-1130 订阅
排序:
Realization of remote sensing image segmentation based on K-means clustering
收藏 引用
IOP Conference Series: Materials science and Engineering 2019年 第7期490卷
作者: Yanhong Wang Denghui Li Yuying Wang Guangxi Key Lab of Wireless Wideband Communication & Signal Processing Guilin China Institute Of Information Technology of Guilin University of Electronic Technology Key Laboratory of Cognitive Radio and Information Processing Ministry of Education (Guilin University of Electronic Technology) GUET Guilin China School of Computer Science and Information Security of GUET
Segmentation of remote sensing image is the key technology of positioning system. Firstly, we transform the remote sensing image from RGB pace to Lab space. Then, three centres are iterated by using K- means algorithm...
来源: 评论
MD-UCON: A Multi-Domain Access control Model for SDN Northbound Interfaces
收藏 引用
Journal of Physics: Conference Series 2019年 第3期1187卷 032091-032091页
作者: Chang, Rui Lin, Zhaowen Sun, Yi Xu, Jie Network and Information Center Institute of Network Technology Beijing University of Posts and Telecommunications Beijing 100876 China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory National Engineering Laboratory for Mobile Network Security (No. 【2013】 2685) Network and Information Center Institute of Network Technology / Institute of Sensing Technology and Business Beijing University of Posts and Telecommunications. Beijing 100876 China
In SDN (Software Defined Network) environments, for the security considerations of the upper-layer application behaviors, we need to consider adding an access control mechanism to the northbound interface of the SDN c...
来源: 评论
New State Recovery Attacks on the Grain v1 Stream Cipher
收藏 引用
China communications 2016年 第11期13卷 180-188页
作者: Lin Ding Chenhui Jin Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao Zhengzhou Information Science and Technology Institute 450000 Zhengzhou China Science and Technology on Communication Security Laboratory 610041 Chengdu China
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key... 详细信息
来源: 评论
Default OSN privacy settings: Privacy risks  7th
Default OSN privacy settings: Privacy risks
收藏 引用
7th International Conference on eDemocracy, e-Democracy 2017
作者: Michota, Alexandra Katsikas, Sokratis Systems Security Laboratory Department of Digital Systems School of Information and Communication Technologies University of Piraeus 150 Androutsou St. Piraeus18532 Greece Center for Cyber and Information Security Norwegian University of Science and Technology P.O. Box 191 Gjøvik2802 Norway
Empirical privacy evaluation in OSNs may provide a better under standing of the effectiveness and the efficiency of the default privacy controls and those customized by the users. Proper user perception of the privacy... 详细信息
来源: 评论
Publisher Correction: Mitigation potential of global ammonia emissions and related health impacts in the trade network
收藏 引用
Nature communications 2021年 第1期12卷 7084页
作者: Rong Ma Ke Li Yixin Guo Bo Zhang Xueli Zhao Soeren Linder ChengHe Guan Guoqian Chen Yujie Gan Jing Meng School of Economics and Management Beihang University Beijing China. Harvard-NUIST Joint Laboratory for Air Quality and Climate Jiangsu Key Laboratory of Atmospheric Environment Monitoring and Pollution Control Collaborative Innovation Center of Atmospheric Environment and Equipment Technology School of Environmental Science and Engineering Nanjing University of Information Science and Technology Nanjing China. John A. Paulson School of Engineering and Applied Sciences Harvard University Cambridge MA USA. Princeton School of Public and International Affairs Princeton University Princeton NJ USA. Laboratory for Climate and Ocean-Atmosphere Studies Department of Atmospheric and Oceanic Sciences School of Physics Peking University Beijing China. School of Management China University of Mining and Technology (Beijing) Beijing China. zhangbo@***. School of Management China University of Mining and Technology (Beijing) Beijing China. Joint Research Centre Food Security Group European Commissions Ispra Italy. Arts and Science New York University Shanghai Shanghai China. Laboratory of Systems Ecology and Sustainability Science College of Engineering Peking University Beijing China. School of Government The Leo KoGuan Building Peking University 100871 Beijing China. The Bartlett School of Sustainable Construction University of College London London WC1E 7HB UK. jing.j.meng@ucl.ac.uk.
来源: 评论
Traffic Analysis of a Networks based on Stochastic Geometry to Exclude Malice Flow
收藏 引用
IOP Conference Series: Materials science and Engineering 2018年 第1期466卷
作者: Jiahao Dai Xiaofeng Xu Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No.36 Institute Zhejiang Jiaxing China
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ...
来源: 评论
Publisher Correction: Increasing the presence of BIPOC researchers in computational science
Nature computational science
收藏 引用
Nature computational science 2024年 第10期4卷 798页
作者: Christine Yifeng Chen Alan Christoffels Roger Dube Kamuela Enos Juan E Gilbert Sanmi Koyejo Jason Leigh Carlo Liquido Amy McKee Kari Noe Tai-Quan Peng Karaitiana Taiuru Cosmochemical and Isotopic Signatures Group Nuclear and Chemical Sciences Division Lawrence Livermore National Laboratory Livermore CA USA. chen127@llnl.gov. South African MRC (SAMRC) Bioinformatics Unit South African National Bioinformatics Institute University of the Western Cape Cape Town South Africa. alan@sanbi.ac.za. Africa Centers for Disease Control and Prevention African Union Addis Ababa Ethiopia. alan@sanbi.ac.za. College of Science Rochester Institute of Technology Rochester NY USA. rrdube@***. Office of Indigenous Knowledge and Innovation University of Hawai'i Honolulu HI USA. kenos@hawaii.edu. Computer & Information Science & Engineering Department University of Florida Gainesville FL USA. juan@ufl.edu. Department of Computer Science Stanford University Stanford CA USA. sanmi@cs.stanford.edu. Department of Information and Computer Sciences University of Hawai'i at Mānoa Honolulu HI USA. leighj@hawaii.edu. Pi'ikū Co. Kailua HI USA. carlo.h.liquido@***. Department of Educational Foundations University of Hawai'i at Mānoa Honolulu HI USA. amymckee@hawaii.edu. 'ĀinaQuest Honolulu HI USA. amymckee@hawaii.edu. Office of Indigenous Knowledge and Innovation University of Hawai'i Honolulu HI USA. karinoe@hawaii.edu. Department of Communication Michigan State University East Lansing MI USA. pengtaiq@msu.edu. Taiuru & Associates Limited Auckland New Zealand. karaitiana@taiuru.maori.nz. Ngāi Tahu Ngāti Kahungunu Ngāti Toa Auckland New Zealand. karaitiana@taiuru.maori.nz.
来源: 评论
Fast signal recovery from saturated measurements by linear loss and nonconvex penalties
arXiv
收藏 引用
arXiv 2018年
作者: He, Fan Huang, Xiaolin Liu, Yipeng Yan, Ming Institute of Image Processing and Pattern Recognition Shanghai Jiao Tong University The MOE Key Laboratory of System Control and Information Processing Shanghai200240 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China The Department of Computational Mathematics Science and Engineering Michigan State University MI United States
Sign information is the key to overcoming the inevitable saturation error in compressive sensing systems, which causes information loss and results in bias. For sparse signal recovery from saturation, we propose to us... 详细信息
来源: 评论
Wide-range-tunable Dirac-cone band structure in a chiral-time-symmetric non-Hermitian system
收藏 引用
Physical Review A 2017年 第5期96卷 052121-052121页
作者: S. Lin Z. Song School of Physics Nankai University Tianjin 300071 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308 China
We establish a connection between an arbitrary Hermitian tight-binding model with chiral (C) symmetry and its non-Hermitian counterpart with chiral-time (CT) symmetry. We show that such a non-Hermitian Hamiltonian is ... 详细信息
来源: 评论
构建新型网络空间安全生态体系实现从网络大国走向网络强国
收藏 引用
Engineering 2018年 第1期 105-116页
作者: 杨小牛 王巍 许小丰 庞国荣 张春磊 Science and Technology on Communication Information Security Control Laboratory Science and Technology on Electro-Optical Information Security Control Laboratory
首先面向我国网络空间实际情况,提出网络空间"三分论",针对公共互联网(C空间)、党政军保密网(S空间)和关键基础设施网(K空间)三大网络空间的不同需求,给出了相应的安全应对策略和研究框架。然后重点针对公共互联网,探讨了基于... 详细信息
来源: 评论