咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是401-410 订阅
排序:
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Secure Rate-Splitting Multiple Access Transmissions in LMS Systems
arXiv
收藏 引用
arXiv 2023年
作者: He, Minjue Zhao, Hui Miao, Xiaqing Wang, Shuai Pan, Gaofeng Science and Technology on Electronic Information Control Laboratory Chengdu610043 China Communication Systems Department EURECOM Sophia Antipolis06410 France School of Information and Electronics Beijing Institute of Technology Beijing100081 China
This letter investigates the secure delivery performance of the rate-splitting multiple access scheme in land mobile satellite (LMS) systems, considering that the private messages intended by a terminal can be eavesdr... 详细信息
来源: 评论
Research on Lightweight Sensing technology Based on Single-Antenna Multicarrier
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20678-20694页
作者: Jiang, Yu Zhu, Di Wang, Jiadong Hu, Aiqun Southeast University School of Cyber Scienc and Engineering Purple Mountain Laboratories Nanjing210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing210096 China Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Southeast University School of Cyber Science and Engineering Nanjing210096 China Southeast University School of Cyber Science and Engineering School of Information Science and Engineering Nanjing210096 China Southeast University State Key Laboratory of Mobile Communication Nanjing210096 China
Channel State information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens... 详细信息
来源: 评论
RainGaugeNet: CSI-Based Sub-6 GHz Rainfall Attenuation Measurement and Classification for ISAC Applications
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yan Yang, Jie Huang, Yixuan Yang, Tao Wen, Chao-Kai Jin, Shi The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Frontiers Science Center for Mobile Information Communication and Security Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing210096 China The National Engineering Research Center of Water Resources Efficient Utilization and Engineering Safety Institute of Water Science and Technology Hohai University Nanjing210098 China The Institute of Communications Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan The National Mobile Communications Research Laboratory Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China
Rainfall impacts daily activities and can lead to severe hazards such as flooding. Traditional rainfall measurement systems often lack granularity or require extensive infrastructure. While the attenuation of electrom... 详细信息
来源: 评论
Research On Multi - Target Data Association and Location Algorithm Based On Passive Multi - Sensor System
Research On Multi - Target Data Association and Location Alg...
收藏 引用
International Conference on Wavelet Active Media technology and information Processing (ICWAMTIP)
作者: Yao Siyi Xu Jianliang Shen Weiguo Wang Li Li Wanchun School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Communication Information Security Control Laboratory Jiaxing PRC
In this paper, the multi-target positioning research is carried out on the basis of a passive multi-sensor reconnaissance system, which requires an algorithm to solve the problem of multi-target data association and p... 详细信息
来源: 评论
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Li Li, Yujun Li, Jin Huang, Minhuan Nie, Yuanping Liu, Yiwei School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Science and Technology on Information System Security Chengdu China National Key Laboratory of Science and Technology on Information System Security Beijing China
With the continuous extension of the Industrial Internet, cyber incidents caused by software vulnerabilities have been increasing in recent years. However, software vulnerabilities detection is still heavily relying o... 详细信息
来源: 评论
Deep transfer clustering of radio signals
arXiv
收藏 引用
arXiv 2021年
作者: Xuan, Qi Li, Xiaohui Chen, Zhuangzhi Xu, Dongwei Zheng, Shilian Yang, Xiaoniu The Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China The Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Modulation recognition is an important task in radio signal processing. Most of the current researches focus on supervised learning. However, in many real scenarios, it is difficult and cost to obtain the labels of si... 详细信息
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
Computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论
Adaptive visibility graph neural network and it's application in modulation classification
arXiv
收藏 引用
arXiv 2021年
作者: Xuan, Qi Qiu, Kunfeng Zhou, Jinchao Chen, Zhuangzhi Xu, Dongwei Zheng, Shilian Yang, Xiaoniu The Institute of Cyberspace Security The College of Information Engineering Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China The Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Our digital world is full of time series and graphs which capture the various aspects of many complex systems. Traditionally, there are respective methods in processing these two different types of data, e.g., Recurre... 详细信息
来源: 评论
Path Planning for Mars Rovers Using Constraint-Based Approach on Path Length and Turning Radius
SSRN
收藏 引用
SSRN 2023年
作者: Dai, Juan Li, Jianfeng Zhu, Shengtao Su, Zhong Zhu, Cui Beijing Key Laboratory of High Dynamic Navigation Technology Beijing Information Science & Technology University Beijing100192 China Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing100192 China School of Automation Beijing Information Science & Technology University Beijing100192 China School of Information and Communication Engineering Beijing Information Science & Technology University Beijing100101 China
An improved dynamic window approach is proposed for local path planning of the Mars rover based on its constraint characteristics and kinematic model. The dynamic window algorithm is commonly utilized in intelligent r... 详细信息
来源: 评论