咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是511-520 订阅
排序:
Continuous-variable quantum key distribution over 28.6 km fiber with an integrated silicon photonic receiver chip
arXiv
收藏 引用
arXiv 2024年
作者: Bian, Yiming Pan, Yan Xu, Xuesong Zhao, Liang Li, Yang Huang, Wei Zhang, Lei Yu, Song Zhang, Yichen Xu, Bingjie State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China School of Integrated Circuits Beijing University of Posts and Telecommunications Beijing100876 China
Quantum key distribution, which ensures information-theoretically secret key generation, is currently advancing through photonic integration to achieve high performance, cost reduction and compact size, thereby facili... 详细信息
来源: 评论
Mixed Attention Densely Residual Network for Single Image Super-Resolution
收藏 引用
Computer Systems science & Engineering 2021年 第10期39卷 133-146页
作者: Jingjun Zhou Jing Liu Jingbing Li Mengxing Huang Jieren Cheng Yen-Wei Chen Yingying Xu Saqib Ali Nawaz School of Information and Communication Engineering Hainan UniversityHaikou570228China State Key Laboratory of Marine Resource Utilization in the South China Sea Hainan UniversityHaikou570228China Research Center for Healthcare Data Science Zhejiang LabHangzhou311121China School of Computer Science and Cyberspace Security Hainan UniversityHaikou570228China Graduate School of Information Science and Engineering Ritsumeikan University5258577Japan College of Computer Science and Technology Zhejiang UniversityHangzhou311100China
Recent applications of convolutional neural networks(CNNs)in single image super-resolution(SISR)have achieved unprecedented ***,existing CNN-based SISR network structure design consider mostly only channel or spatial ... 详细信息
来源: 评论
Highly stable power control for chip-based continuous-variable quantum key distribution system
arXiv
收藏 引用
arXiv 2024年
作者: Bian, Yiming Li, Yang Xu, Xuesong Zhang, Tao Pan, Yan Huang, Wei Yu, Song Zhang, Lei Zhang, Yichen Xu, Bingjie State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China School of Integrated Circuits Beijing University of Posts and Telecommunications Beijing100876 China
Quantum key distribution allows secret key generation with information theoretical security. It can be realized with photonic integrated circuits to benefit the tiny footprints and the large-scale manufacturing capaci... 详细信息
来源: 评论
Task Offloading and Primary Node Selection in Blockchain, Digital Twin, and MEC Enabled Internet of Vehicles
Task Offloading and Primary Node Selection in Blockchain, Di...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Jianbo Du Huifang Fang Shulei Li Pengfei Du Ziwen Kong Jiawen Kang Dusit Niyato Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi’an University of Posts and Telecommunications Xi’an China School of Communications Engineering Xidian University Xi’an China Tianyuan Ruixin Communication Technology Co. LTD. Xi’an China Engineering Research Center of Intelligent Airground Integrated Vehicle and Traffic Control Ministry of Education Xihua University Chengdu China School of Automation Guangdong University of Technology China School of Computer Science and Engineering Nanyang Technological University Singapore
In this paper, we investigate the safe task offloading and primary node selection in blockchain, digital twin (DT) and Multi-access Edge Computing (MEC) enabled Internet of Vehicles (IoV). Edge servers centers provide... 详细信息
来源: 评论
Act Now: A Novel Online Forecasting Framework for Large-Scale Streaming Data
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Daojun Zhang, Haixia Wang, Jing Yuan, Dongfeng Zhang, Minggao School of Information Science and Engineering Shandong University China School of Control Science and Engineering Shandong University China Ocean College Jiangsu University of Science and Technology China School of Qilu Transportation Shandong University China Shandong Key Laboratory of Intelligent Communication and Sensing-Computing Integration China
In this paper, we find that existing online forecasting methods have the following issues: 1) They do not consider the update frequency of streaming data and directly use labels (future signals) to update the model, l... 详细信息
来源: 评论
A Long Synthetic Aperture Passive Localization Method Using Two Planes
A Long Synthetic Aperture Passive Localization Method Using ...
收藏 引用
IEEE International Conference on Radar
作者: Bowei Chen Yuqi Wang Guang-Cai Sun Mengdao Xing Zijing Zhang Xiaoniu Yang National Laboratory of Radar Signal Processing Xidian University Xi'an China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
A long synthetic aperture passive localization algorithm is proposed in this paper. First of all, the Doppler change rate of signal can be measured by the image contrast and then, grid points are divided within the ma... 详细信息
来源: 评论
A multip-level additive distortion method for security improvement in palette image steganography
收藏 引用
Journal of Visual communication and Image Representation 2025年 110卷
作者: Chen, Yi Wang, Hongxia Cui, Yunhe Shen, Guowei Guo, Chun Liu, Yong Wu, Hanzhou State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou Provincial Characteristic Key Laboratory of Software Engineering and Information Security Guizhou University Guiyang550025 China School of Cyber Science and Engineering Sichuan University Chengdu610065 China School of Artificial Intelligence Hubei University of Automotive Technology Shiyan442002 China School of Big Data and Computer Science Guizhou Normal University Guiyang550025 China School of Communication and Information Engineering Shanghai University Shanghai200444 China
With the rapid development of the Internet and communication technology, palette images have become a preferred media for steganography. However, the security of palette image steganography faces a big problem. To add... 详细信息
来源: 评论
A code clone detection algorithm based on graph convolution network with AST tree edge
A code clone detection algorithm based on graph convolution ...
收藏 引用
IEEE International Conference on Software Quality, Reliability and security Companion (QRS-C)
作者: Zhicheng Lu Ruochen Li Huamiao Hu Wen-an Zhou Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China
Detecting code cloning will prevent it from bringing risks such as vulnerabilities and intellectual property disputes in complex software systems such as large-scale defense software systems and commercial software sy... 详细信息
来源: 评论
An Enhanced Resource Selection Scheme for Efficient Intra-Platoon Message Delivery
An Enhanced Resource Selection Scheme for Efficient Intra-Pl...
收藏 引用
IEEE Conference on Global communications (GLOBECOM)
作者: Bingying Wang Jun Zheng Cheng Li School of Electronics and Information Engineering Nanjing University of Information Science and Technology Nanjing China National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China Purple Mountain Laboratories Nanjing China School of Engineering Science Simon Fraser University Burnaby Canada Department of Electrical and Computer Engineering Memorial University St. John's Canada
This paper proposes an enhanced resource selection (eInP-RS) scheme for efficient intra-platoon message delivery of cooperative awareness messages (CAMs) and decentralized environmental notification messages (DENMs). ... 详细信息
来源: 评论
IR Net: information restriction and information recovery for accurate binary neural networks
收藏 引用
Neural Computing and Applications 2023年 第19期35卷 14449-14464页
作者: Xue, Ping Lu, Yang Chang, Jingfei Wei, Xing Wei, Zhen School of Computer Science and Information Engineering Hefei University of Technology Hefei China Anhui Mine IOT and Security Monitoring Technology Key Laboratory Hefei China Engineering Research Center of Safety Critical Industrial Measurement and Control Technology Ministry of Education Hefei University of Technology Hefei China Intelligent Manufacturing Institute of Hefei University of Technology Hefei China
Weight and activation binarization can efficiently compress deep neural networks and accelerate model inference, but they cause severe accuracy degradation. Existing optimization methods for binary neural networks (BN...
来源: 评论