咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 640 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 511 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 363 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 96 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 86 篇 光学工程
    • 77 篇 生物工程
    • 53 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 30 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 278 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 16 篇 institute of cyb...
  • 16 篇 school of inform...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 shilian zheng

语言

  • 1,343 篇 英文
  • 59 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1436 条 记 录,以下是241-250 订阅
排序:
Angle-Based SLAM on 5G mmWave Systems: Design, Implementation, and Measurement
收藏 引用
IEEE Internet of Things Journal 2023年 第20期10卷 17755-17771页
作者: Yang, Jie Wen, Chao-Kai Xu, Jing Que, Hang Wei, Haikun Jin, Shi Southeast University Sch. of Automat. and the Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China National Sun Yat-sen University Institute of Communications Engineering Kaohsiung804 Taiwan Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Southeast University Key Laboratory of Measurement and Control of CSE Ministry of Education School of Automation Nanjing210096 China
Simultaneous localization and mapping (SLAM) is a key technology that provides user equipment (UE) tracking and environment mapping services, enabling the deep integration of sensing and communication. The millimeter-... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Improving key rates by tighter information reconciliation leakage estimation for quantum key distribution
arXiv
收藏 引用
arXiv 2025年
作者: Mao, Hao-Kun Yang, Bo Qiao, Yu-Cheng Yan, Bing-Ze Zhao, Qiang Xu, Bing-Jie Li, Qiong School of Cyberspace Science Faculty of Computing Harbin Institute of Technology Harbin150080 China Guangxi Key Lab Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China School of Information Engineering Zhejiang Ocean University Zhoushan316022 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
Previous research has aimed to precisely estimate information leakage to improve the secure key rate (SKR) and maximum transmission distance in quantum key distribution (QKD). However, existing methods repeatedly cons... 详细信息
来源: 评论
A 3-D Printed Ka-Band Waveguide Bandpass Filter With Quasi-Elliptic Response  13
A 3-D Printed Ka-Band Waveguide Bandpass Filter With Quasi-E...
收藏 引用
13th International Symposium on Antennas, Propagation and EM Theory, ISAPE 2021
作者: Zhang, Fan Xu, Lili Zhang, Jianqiang Nan, Pulong Jin, Xiaofan Pan, Gaofeng Science and Technology on Communication Information Security Control Laboratory Zhejiang Jiaxing314033 China Huawei Technologies Co. Ltd Guangdong Shenzhen518063 China
A Ka-band quasi-elliptic bandpass filter (BPF) based on stereolithography apparatus (SLA) 3-D printing technique is proposed. The filter consists of four coupled resonators with three direct couplings between adjacent... 详细信息
来源: 评论
Research on Space-Time Block Code technology in MIMO System  7
Research on Space-Time Block Code Technology in MIMO System
收藏 引用
7th International Conference on Computer and communications, ICCC 2021
作者: Pan, Conglin Chen, Si Wu, Wei Qian, Jiachuan Wang, Lijun No.36 Research Institute of CETC Science and Technology On Communication Information Security Control Laboratory Jiaxing China School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing China
MIMO technology has been widely used in the telecommunication systems nowadays, and the space-time coding is a key part of MIMO technology. A good coding scheme can exploit the spatial diversity to correct the error w... 详细信息
来源: 评论
Modulation Recognition Based on Lightweight Residual Network via Binary Quantization  7
Modulation Recognition Based on Lightweight Residual Network...
收藏 引用
7th International Conference on Computer and communications, ICCC 2021
作者: Ji, Heng Xu, Wangyang Gan, Lu Xu, Zhengwu Science and Technology On Communication Information Security Control Laboratory Jiaxing314000 China University of Electronic Science and Technology of China Chengdu611731 China Yibin Institute of UESTC Yibin643000 China
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c... 详细信息
来源: 评论
Modulation Recognition Based on Lightweight Residual Network via Hybrid Pruning  7
Modulation Recognition Based on Lightweight Residual Network...
收藏 引用
7th International Conference on Computer and communications, ICCC 2021
作者: Ji, Heng Xu, Wangyang Gan, Lu Xu, Zhengwu Science and Technology On Communication Information Security Control Laboratory Jiaxing314000 China University of Electronic Science and Technology of China Chengdu611731 China Yibin Institute of UESTC Yibin643000 China
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c... 详细信息
来源: 评论
Research on PDCCH Channel in 5G NR System
Research on PDCCH Channel in 5G NR System
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Tianyi, Liang Huijie, Zhu Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China No.36 Research Institute of China Electronics Technology Group Corporation Jiaxing314033 China
In the 5th Generation Mobile communication technology (5G) system, physical downlink control channel (PDCCH) controls the transmission and reception of uplink and downlink data by transmitting Downlink control Informa... 详细信息
来源: 评论
Adversarial Examples Detection of Electromagnetic Signal Based on GAN
Adversarial Examples Detection of Electromagnetic Signal Bas...
收藏 引用
International Conference on Big Data Computing and communications (BIGCOM)
作者: Jiawei Zhu Jiangpeng Li Dongwei Xu Chuntao Gu Qi Xuan Shunling Wang Security Control Laboratory Science and Technology on Communication Information Jiaxing China Institute of Cyberspace Security Zhejiang University of Technology College of Information Engineering Zhejiang University of Technology Hangzhou China
In the field of signal modulation classification, deep neural networks (DNNs) perform very well and have good generalization ability. However, the DNN model is extremely vulnerable. The model gives a false output with... 详细信息
来源: 评论
On the Performance of NOMA Over Coded Caching in Cache-Aided Wireless Network
On the Performance of NOMA Over Coded Caching in Cache-Aided...
收藏 引用
IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Yuanyuan Ma Ruxin Zhi Zhan Xu Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing
This paper centers around the examination of a downlink system comprising of a base station (BS) located at the center of a circular cell. Within this cell, we find cache-equipped users uniformly distributed. Our aim ...
来源: 评论