咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是551-560 订阅
排序:
Design Compact YOLO based Network for Small Target Detection on Infrared Image
Design Compact YOLO based Network for Small Target Detection...
收藏 引用
Chinese Automation Congress (CAC)
作者: Shuang Liu Zhicheng Liu Yuhai Li Wancheng Liu Chenyang Ge Longjun Liu Institute of Artificial Intelligence and Robotics (IAIR) Xi’an Jiaotong University Xi’an China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China
most YOLO object detection neural networks prefer to focus on traditional RGB image, but previous studies rarely consider special YOLO network with compact architecture for infrared image. In this paper, we analyze or... 详细信息
来源: 评论
Modulation Recognition Based on Lightweight Residual Network via Binary Quantization
Modulation Recognition Based on Lightweight Residual Network...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Heng Ji Wangyang Xu Lu Gan Zhengwu Xu Science and Technology on Communication Information Security Control Laboratory Jiaxing China University of Electronic Science and Technology of China Chengdu China Yibin Institute of UESTC Yibin China
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c... 详细信息
来源: 评论
Phase noise model for continuous-variable quantum key distribution using a local local oscillator
收藏 引用
Physical Review A 2021年 第3期104卷 032608-032608页
作者: Yun Shao Heng Wang Yaodi Pi Wei Huang Yang Li Jinlu Liu Jie Yang Yichen Zhang Bingjie Xu Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing 100876 China
The value of residual phase noise, after phase compensation, is one of the key limitations of performance improvement for continuous-variable quantum key distribution using a local local oscillator (LLO CV-QKD) system... 详细信息
来源: 评论
Modulation Recognition Based on Lightweight Residual Network via Hybrid Pruning
Modulation Recognition Based on Lightweight Residual Network...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Heng Ji Wangyang Xu Lu Gan Zhengwu Xu Science and Technology on Communication Information Security Control Laboratory Jiaxing China University of Electronic Science and Technology of China Chengdu China Yibin Institute of UESTC Yibin China
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c... 详细信息
来源: 评论
Direction Modulation Design for UAV Assisted by IRS with discrete phase shift
arXiv
收藏 引用
arXiv 2024年
作者: Li, Maolin Gao, Wei Wu, Qi Shu, Feng Pan, Cunhua Wu, Di The School of Information and Communication Engineering Hainan University Haikou570228 China The School of Information and Communication Engineering Collaborative Innovation Center of Information Technology Hainan University Haikou570228 China The School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing210094 China The National Mobile Communications Research Laboratory Southeast University China The School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China
As a physical layer security technology, directional modulation (DM) can be combined with intelligent reflect-ing surface (IRS) to improve the security of drone communications. In this paper, a directional modulation ... 详细信息
来源: 评论
Message from the General Conference Chairs
Proceedings - 2021 International Conference on Networking an...
收藏 引用
Proceedings - 2021 International Conference on Networking and Network Applications, NaNA 2021 2021年 XIX页
作者: Wang, Zhenjiang Gu, Naijie Ho, Pin-Han Chen, Shunyang Lijiang Culture and Tourism College China University of Science and Technology of China China University of Waterloo Canada Science and Technology on Communication Information Security Control Laboratory China
来源: 评论
FPGA-based Acceleration of Structured Light Depth Estimation
FPGA-based Acceleration of Structured Light Depth Estimation
收藏 引用
Chinese Automation Congress (CAC)
作者: Shijie Wang Xiaodong Deng Wancheng Liu Yuhai Li Shitao Chen Longjun Liu Institute of Artificial Intelligence and Robotics (IAIR) Xi’an Jiaotong University Xi’an China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China
Stereo depth estimation is widely applied in computer vision and intelligent robotic systems. For real-time mobile stereo vision applications, how to efficiently design and implement stereo matching on resource-limite... 详细信息
来源: 评论
Design an Efficient DNN Inference Framework with PS-PL Synergies in FPGA for Edge Computing
Design an Efficient DNN Inference Framework with PS-PL Syner...
收藏 引用
Chinese Automation Congress (CAC)
作者: Wancheng Liu Yuhai Li Yining Yang Jinyu Zhu Longjun Liu Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China Institute of Artificial Intelligence and Robotics (IAIR) Xi’an Jiaotong University Xi’an China
in recent years, Deep Neural Network (DNN) based methods have achieved great success for changing inflexible machine to intelligent and live system. Internet of Things (IoT) applications equipped with DNN in domains s... 详细信息
来源: 评论
Factored Trace Lasso Based Linear Regression Methods: Optimizations and Applications  5th
Factored Trace Lasso Based Linear Regression Methods: Optimi...
收藏 引用
5th International Conference on Cognitive Systems and Signal Processing, ICCSIP 2020
作者: Zhang, Hengmin Du, Wenli Liu, Xiaoqian Zhang, Bob Qian, Feng School of Information Science and Engineering Key Laboratory of Advanced Control and Optimization for Chemical Processes Ministry of Education East China University of Science and Technology Shanghai200237 China Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Department of Computer and Information Science University of Macau 999078 China
Consider that matrix trace lasso regularized convex p -norm with p= 1, 2 regression methods usually have the higher computational complexity due to the singular value decomposition (SVD) of larger size matrix in big d... 详细信息
来源: 评论
Twitter Bot Detection with Multi-Head Attention and Supervised Contrastive Learning
Twitter Bot Detection with Multi-Head Attention and Supervis...
收藏 引用
International Conference on Wavelet Active Media technology and information Processing (ICWAMTIP)
作者: Liu Qiang Lu Jiazhong Huang Yuanyuan Zhang Weisha Lv Jun School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China School of Foreign Languages University of Electronic Science and Technology of China Chengdu China MetaX Integrated Circuits (Shanghai) Co. Ltd
The task of detecting bots on Twitter is an indispensable task for combating social network disinformation, curbing rumors, and managing online public opinion. However, today's social bots often disguise themselve... 详细信息
来源: 评论