咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1151-1160 订阅
排序:
A New Method of the Virtual TDOA Estimation for the Passive Radar Source Localization Based on PSAAA
A New Method of the Virtual TDOA Estimation for the Passive ...
收藏 引用
International Conference on Wireless communications and Signal Processing
作者: Pengwu Wan Zan Li Benjian Hao Boyang Liu Jianfeng Zhu State Key Laboratory of Integrated Services Networks Xidian University Science and Technology on Communication Information Security Control Laboratory
The passive synthetic aperture antenna array (P-SAAA) technology is inspired by the idea of synthetic aperture sonar and synthetic aperture radar, which is a new method used to the passive radar source localization us... 详细信息
来源: 评论
High visibility temporal ghost imaging with classical light
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Jianbin Wang, Jingjing Chen, Hui Zheng, Huaibin Liu, Yanyan Zhou, Yu Li, Fu-Li Xu, Zhuo Electronic Materials Research Laboratory Key Laboratory of the Ministry of Education International Center for Dielectric Research Xi'an Jiaotong University Xi'an710049 China Science and Technology on Electro-Optical Information Security Control Laboratory MOE Key Laboratory for Nonequilibrium Synthesis and Modulation of Condensed Matter Department of Applied Physics Xi'an Jiaotong University Xi'an710049 China
High visibility temporal ghost imaging with classical light is possible when superbunching pseudothermal light is employed. In the numerical simulation, the visibility of temporal ghost imaging with pseudothermal ligh... 详细信息
来源: 评论
New quaternary sequences of even length with optimal auto-correlation
arXiv
收藏 引用
arXiv 2017年
作者: Su, Wei Yang, Yang Zhou, Zhengchun Tang, Xiaohu School of Economics and Information Engineering Southwestern University of Finance and Economics Chengdu610074 China School of Mathematics Southwest Jiaotong University Chengdu611756 Provincial Key Lab of Information Coding and Transmission Institute of Mobile Communications Southwest Jiaotong University Chengdu611756 Science and Technology on Communication Security Laboratory Chengdu610041
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length N can... 详细信息
来源: 评论
Modified CORDIC Algorithm for Computation of Arctangent with Variable Iterations
Modified CORDIC Algorithm for Computation of Arctangent with...
收藏 引用
2016 IEEE 13th International Conference on Signal Processing(ICSP2016)
作者: Huijie Zhu Yizhou Ge Bin Jiang Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of China Electronics Technology Group Corporation
In this paper, a modified CORIDC algorithm for computation of arctangent is presented. Unlike the conventional CORDIC algorithm which has constant number of iterations, the proposed algorithm calculates the nearest pr... 详细信息
来源: 评论
A Study on the Influence of Bit Error Ratio against Jamming Signal Ratio under Different Channel Jamming
A Study on the Influence of Bit Error Ratio against Jamming ...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Huan Li Wenhua Ye No.36 Research Institute of CETC Jiaxing Zhejiang China Science Technology on Communication Information Security Control Laboratory
The performance of digital communication systems, depending on the signal modulation and demodulation. In this paper, loading several different jamming pattern to different digital communication modulation system mode... 详细信息
来源: 评论
Efficient collision attacks on smart card implementations of masked AES
收藏 引用
science China(information sciences) 2015年 第5期58卷 97-111页
作者: WANG An WANG ZongYue ZHENG XueXin WANG XiaoMei CHEN Man ZHANG GuoShuang WU LiJi Institute of Microelectronics Tsinghua University Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University China Academy of Electronics and Information Technology School of Computer and Communication Engineering University of Science and TechnologyBeijing Science and Technology on Communication Security Laboratory
Collision attack is often employed against some cryptographic algorithms such as AES and *** a usual countermeasure, masking can resist such attacks to some extent. In CHES 2011, Clavier et *** a collision-correlation... 详细信息
来源: 评论
Observer-based controller Synthesis for T-S Fuzzy Systems under Imperfect Premise Matching
Observer-based Controller Synthesis for T-S Fuzzy Systems un...
收藏 引用
第28届中国控制与决策会议
作者: Jie Zhou Tao Zhao Science and Technology on Communication Security Laboratory School of Electrical Engineering and Information Sichuan University
This study focuses on observer-based controller synthesis for T-S fuzzy systems under imperfect premise *** fuzzy observer and fuzzy controller do not share the same membership functions and rules number with the T-S ... 详细信息
来源: 评论
INTELLIGENT information NETWORK security AND MANAGEMENT
收藏 引用
China communications 2016年 第7期13卷 3-6页
作者: Yixian Yang Zhongshan Zhang Wenjing Li Information Security Center(ISC) Beijing University of Posts and Telecommunications(BUPT) National Engineering Laboratory for Disaster Backup and Recovery the School of Computer and Communication Engineering in the University of Science and Technology Beijing(USTB) State Key Lab of Networking and Switching Technologies Network Management Research Center at BUPT National Innovation Research Group of China
Intelligent information Network security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of mo... 详细信息
来源: 评论
Triple-bit quantization with asymmetric distance for nearest neighbor search  1
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Deng, Han Xie, Hongtao Ma, Wei Dai, Qiong Chen, Jianjun Lu, Ming National Engineering Laboratory for Information Security Technologies Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha China School of Information Engineering HeNan Radio and Television University Zhengzhou China
Binary embedding is an effective way for nearest neighbor (NN) search as binary code is storage efficient and fast to compute. It tries to convert real-value signatures into binary codes while preserving similarity of... 详细信息
来源: 评论
Co-saliency Detection for RGBD Images Based on Multi-constraint Feature Matching and Cross Label Propagation
arXiv
收藏 引用
arXiv 2017年
作者: Cong, Runmin Lei, Jianjun Fu, Huazhu Huang, Qingming Cao, Xiaochun Hou, Chunping School of Electrical and Information Engineering Tianjin University Tianjin300072 China Ocular Imaging Department Institute for Infocomm Research Agency for Science Technology and Research Singapore School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing100093 China
Co-saliency detection aims at extracting the common salient regions from an image group containing two or more relevant images. It is a newly emerging topic in computer vision community. Different from the most existi... 详细信息
来源: 评论