咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1171-1180 订阅
排序:
An Iterative Co-Saliency Framework for RGBD Images
arXiv
收藏 引用
arXiv 2017年
作者: Cong, Runmin Lei, Jianjun Fu, Huazhu Lin, Weisi Huang, Qingming Cao, Xiaochun Hou, Chunping School of Electrical and Information Engineering Tianjin University Tianjin300072 China School of Computer Engineering Nanyang Technological University Singapore639798 Singapore Institute for Infocomm Research Ocular Imaging Department Agency for Science Technology and Research Singapore138632 Singapore School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences
As a newly emerging and significant topic in computer vision community, co-saliency detection aims at discovering the common salient objects in multiple related images. The existing methods often generate the co-salie... 详细信息
来源: 评论
A Stackelberg Game for DSTC-Based Cognitive Radio Networks with Multiple Cooperative Relays
A Stackelberg Game for DSTC-Based Cognitive Radio Networks w...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Lijie Wang Yi Tang Bo Yuan Dangfeng Zhu Xi'an Satellite Control Center Xi'an China National Key Laboratory of Science and Technology Information System Security Beijing China
The spectrum utility can be improved when cooperative communication technology is incorporated into cognitive radio network, and both the licensed users and secondary users can benefit from cooperating. In this cooper... 详细信息
来源: 评论
Agile laser beam deflection with high steering precision and angular resolution using liquid crystal optical phased array
Agile laser beam deflection with high steering precision and...
收藏 引用
IEEE International Nanoelectronics Conference (INEC)
作者: Xiangru Wang Shuanghong Wu Man Li School of Optoelectronic Information University of Electronic Science and Tech. of China Chengdu China Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe China
To improve the steering precision and angular resolution of liquid crystal optical phased array, in this paper, we proposed a modified periodic phase controlled method to realize a continuous scanning with a constant ... 详细信息
来源: 评论
A new important-place identification method
A new important-place identification method
收藏 引用
IEEE International Conference on Computer and communications, ICCC 2015
作者: Ma, Chun-Lai Ma, Tao Shan, Hong Electronic Engineering Institute Hefei China Science and Technology on Communication Information Security Control Laboratory Hefei China
For the problem that the location of LBSN users was sparse because of it was updated sporadically. An important place identification method was studied by improving the clustering algorithm. Firstly, a velocity prunin... 详细信息
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable Computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论
Cloud Platform Based Automated security Testing System for Mobile Internet
收藏 引用
Tsinghua science and technology 2015年 第6期20卷 537-544页
作者: Dan Tao Zhaowen Lin Cheng Lu the School of Electronic and Information Engineering Beijing Jiaotong University Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Network and Information Center Institute of Network TechnologyScience and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryNational Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and Telecommunications
With respect to security, the use of various terminals in the mobile Internet environment is *** terminal testing methods cannot simulate actual testing environments; thus, the test results do not accurately reflect t... 详细信息
来源: 评论
A hybrid biometric identification framework for high security applications
收藏 引用
Frontiers of Computer science 2015年 第3期9卷 392-401页
作者: Xuzhou LI Yilong YIN Yanbin NING Gongping YANG Lei PAN School of Computer Science and Technology Shandong University Jinan 250101 China Key Laboratory of Information Security and Intelligent Control of Shandong Province Shandong Youth University of Political Science Jinan 250103 China
Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions... 详细信息
来源: 评论
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis
Handedness Recognition through Keystroke-Typing Behavior in ...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and communications (TrustCom)
作者: Chao Shen Haodi Xu Haijun Wang Xiaohong Guan Science and Technology on Electronic Information Control Laboratory Chengdu China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
Recognizing computer users' handedness provides important clues for profiling computer criminals in digital forensic analysis. Existing technologies for handedness recognition have two main problems that limit the... 详细信息
来源: 评论
Comment on “Quantum oblivious set-member decision protocol”
收藏 引用
Physical Review A 2016年 第3期93卷 036301-036301页
作者: Bin Liu Di Xiao Wei Huang Ting-Ting Song Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) of Ministry of Education College of Computer Science Chongqing University Chongqing 400044 China Science and Technology on Communication Security Laboratory Chengdu 610041 China Department of Computer Science College of Information Science and Technology Jinan University Guangzhou 510632 China
In a recent paper [Phys. Rev. A 92, 022309 (2015)], the authors proposed a quantum oblivious set-member decision protocol, which is designed to allow a server to check whether a private secret of a user is a member of... 详细信息
来源: 评论
Network node importance measurement method based on vulnerability analysis  4th
Network node importance measurement method based on vulnerab...
收藏 引用
4th International Conference on Computer Engineering and Networks, CENet2014
作者: Li, Yahui Yang, Hongwa Xie, Kai Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China Northern Electronic Instrument Institute Beijing100191 China
As to select the important nodes from network, the key problems are to determine the basis and quantitative standard of evaluating node importance. This chapter proposes the measurement method of network node importan... 详细信息
来源: 评论