咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1141-1150 订阅
排序:
Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction
arXiv
收藏 引用
arXiv 2017年
作者: Zhao, Yijia Zhang, Yichen Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified. In continuous-variable measurement-device-independent quantu... 详细信息
来源: 评论
Improved multiparty quantum key agreement in travelling mode
收藏 引用
science China(Physics,Mechanics & Astronomy) 2016年 第12期59卷 12-21页
作者: Wei Huang Qi Su BingJie Xu Bin Liu Fan Fan HengYue Jia YingHui Yang Science and Technology on Communication Security Laboratory Chengdu 610041China State Key Laboratory of Cryptology Beijing 100878China College of Computer Science Chongqing UniversityChongqing 400044China School of Information Central University of Finance and EconomicsBeijing 100081China School of Mathematics and Information Science Henan Polytechnic UniversityJiaozuo 454000China
The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designi... 详细信息
来源: 评论
Reactive/proactive connectivity management in a tactical service-oriented infrastructure
Reactive/proactive connectivity management in a tactical ser...
收藏 引用
International Conference on Military communications and information Systems (ICMCIS)
作者: Roberto Rigolin F. Lopes Mikko Nieminen Antti Viidanoja Stephen D. Wolthusen Norwegian Information Security Laboratory Norwegian University of Science and Technology Gjovik Norway Communication Systems Fraunhofer FKIE Bonn Germany Patria Systems Tampere Finland School of Mathematics and Information Security Royal Holloway University of London Surrey UK
This paper introduces a model to represent the information systems using a tactical service-oriented infrastructure (TSI) together with the orchestrations of core services providing the reactive/proactive connectivity... 详细信息
来源: 评论
Individual communication Transmitter Identification Using Correntropy-based Collaborative Representation
Individual Communication Transmitter Identification Using Co...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Ying-Ke Lei Science and Technology on Communication Information Security Control Laboratory
In this paper, an efficient radio transmitter identification method is proposed for identifying radio transmitters. The square integral bispectra (SIB) transformation is firstly utilized to extract the features from t... 详细信息
来源: 评论
High speed continuous variable source-independent quantum random number generation
arXiv
收藏 引用
arXiv 2017年
作者: Xu, Bingjie Chen, Ziyang Li, Zhengyu Yang, Jie Su, Qi Huang, Wei Zhang, Yichen Guo, Hong Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Cryptography Beijing100878 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
As a fundamental phenomenon in nature, randomness has a wide range of applications in the fields of science and engineering. Among different types of randomnumber generators (RNG), quantumrandomnumber generator (QRNG)... 详细信息
来源: 评论
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing
收藏 引用
China communications 2016年 第7期13卷 83-91页
作者: Jie Zhu Guoyuan Lin Fucheng You Huaqun Liu Chunru Zhou School of Computer Science and Technology China University of Mining&TechnologyXuzhou 221116China State Key Laboratory for Novel Software Technology hosted at Nanjing University Nanjing 210093China Information Engineering School of Beijing Institute of Graphic Communication Beijing 102600China Beijing Key Laboratory of Signal and Information Processing for High-end Printing Equipment Beijing Institute of Graphic CommunicationBeijing 100026China Information Security Center Beijing University of Posts and TelecommunicationsBeijing 100876China Nanjing University of Information Science&Technology Nanjing 210044China
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the *** secure the factors,a multiway dynamic trust chain transfer model was proposed on t... 详细信息
来源: 评论
Efficient rate-adaptive reconciliation for continuous-variable quantum key distribution
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Xiangyu Zhang, Yichen Yu, Song Bingjie, X.U. Li, Zhengyu Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Beijing100876 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication No. 6 Chuangye Road Chengdu610041 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Center for Quantum Information Technology Center for Computational Science and Engineering Peking University No. 5 Yiheyuan Road Beijing100871 China
information reconciliation protocol has a significant effect on the secret key rate and maximal transmission distance of continuous-variable quantum key distribution (CV-QKD) systems. We propose an efficient rate-adap... 详细信息
来源: 评论
A Method of Individual Radio Transmitter Identification Based on Collaborative Representation
A Method of Individual Radio Transmitter Identification Base...
收藏 引用
2016 IEEE information technology,Networking,Electronic and Automation control Conference(ITNEC 2016)
作者: Zhe Tang Ying-Ke Lei Electronic Engineering Institute Science and Technology on Communication Information Security Control Laboratory
To make use of the correlation among the samples, a method of individual radio transmitter identification based on collaborative representation is put forward in this paper. Firstly, we extract the square integral bis... 详细信息
来源: 评论
Angle-domain doppler pre-compensation for high-mobility OFDM uplink with a massive ULA
arXiv
收藏 引用
arXiv 2017年
作者: Guo, Wei Zhang, Weile Mu, Pengcheng Gao, Feifei Yao, Bobin MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Electronic and Control Engineering Chang'an University Xi'an China
In this paper, we propose a Doppler pre-compensation scheme for high-mobility orthogonal frequency division multiplexing (OFDM) uplink, where a high-speed terminal transmits signals to the base station (BS). Consideri... 详细信息
来源: 评论
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
An error-tolerant keyword search scheme based on public-key ...
收藏 引用
作者: Bo, Yang Zhang, Mingwu Du, Jun-Qiang School of Computer Science Shaanxi Normal University Xi'an710119 China Science and Technology on Communication Security Laboratory Chengdu610041 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer Sciences Hubei University of Technology Wuhan430068 China
An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly matc... 详细信息
来源: 评论