咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是571-580 订阅
排序:
Secure two-way fiber-optic time transfer against sub-ns asymmetric delay attack
arXiv
收藏 引用
arXiv 2022年
作者: Li, Yang Hu, Jinlong Ma, Li Huang, Wei Zhang, Shuai Luo, Yujie Zhou, Chuang Zhang, Chenlin Wang, Heng Pan, Yan Shao, Yun Zhang, Yichen Chen, Xing Chen, Ziyang Yu, Song Guo, Hong Xu, Bingjie Science And Technology On Communication Security Laboratory Institute Of Southwestern Communication Chengdu610041 China State Key Laboratory Of Information Photonics And Optical Communications Beijing University Of Posts And Telecommunications Beijing100876 China State Key Laboratory Of Advanced Optical Communication Systems And Networks Department Of Electronics Center For Quantum Information Technology Peking University Beijing100871 China
Two-way fiber-optic time transfer is a promising precise time synchronization technique with sub-nanosecond accuracy. However, asymmetric delay attack is a serious threat which cannot be prevent by any encryption meth... 详细信息
来源: 评论
Clutter classification for cognitive radar with a deep convolutional neural network  5
Clutter classification for cognitive radar with a deep convo...
收藏 引用
IET International Radar Conference 2020, IET IRC 2020
作者: Peng, Xiaoyan Tian, Yong Wang, Peng Yu, Junpeng Ren, Weiyi School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Electronic Information Control Laboratory Chengdu China
Nowadays, the electromagnetic environment of radar is complex and changeable, and the traditional algorithm is no longer effective to the situation. Hence, it is difficult for radar to have better performance. In this... 详细信息
来源: 评论
CLPVG: Circular limited penetrable visibility graph as a new network model for time series
arXiv
收藏 引用
arXiv 2021年
作者: Xuan, Qi Zhou, Jinchao Qiu, Kunfeng Xu, Dongwei Zheng, Shilian Yang, Xiaoniu Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Visibility Graph (VG) transforms time series into graphs, facilitating signal processing by advanced graph data mining algorithms. In this paper, based on the classic Limited Penetrable Visibility Graph (LPVG) method,... 详细信息
来源: 评论
Learning Fair and Efficient Multiple Access Schemes with Decomposed MADDPG
Learning Fair and Efficient Multiple Access Schemes with Dec...
收藏 引用
Future communications and Networks (FCN), International Conference on
作者: Zhaoyang Liu Haoxin Lin Xijun Wang Jie Gong Xiang Chen School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin China State Key Lab of Novel Software Technology Nanjing University Nanjing China Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
With the growing demand for wireless communication networks, achieving efficient and equitable channel access schemes has become paramount. In this paper, we delve into the realm of distributed channel access in homog... 详细信息
来源: 评论
High-throughput decoder of quasi-cyclic LDPC codes with limited precision for continuous-variable quantum key distribution systems
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Chuang Li, Yang Ma, Li Yang, Jie Huang, Wei Wang, Heng Luo, Yujie Lau, Francis C.M. Li, Yong Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China Department of Electronic and Information Engineering The Hong Kong Polytechnic University Hong Kong College of Computer Science Chongqing University Chongqing400044 China
More than Mbps secret key rate was demonstrated for continuous-variable quantum key distribution (CV-QKD) systems, but real-time postprocessing is not allowed, which is restricted by the throughput of the error correc... 详细信息
来源: 评论
SComplex: Advancing Specific Emitter Identification Through Deep Spiking Complex Neural Networks Beyond Traditional Lightweight Approaches
SComplex: Advancing Specific Emitter Identification Through ...
收藏 引用
IEEE International Conference on communications in China (ICCC)
作者: Naiyu Zhang Yabin Zhang Congan Xu Wei Zhang Haoran Zha Yu Han Qiao Tian Zeyu Tang Advanced Technology Research Institute Beijing Institute of Technology Jinan China College of Information and Communication Engineering Harbin Engineering University Harbin China Naval Aeronautical University Yantai China National Key Laboratory of Electromagnetic Space Security Chengdu Sichuan China College of computer science Harbin Engineering University Harbin China
Specific emitter identification (SEI), pivotal in military communication reconnaissance and electronic warfare, also plays a crucial role in civilian spectrum management. Traditional deep neural network methodologies ... 详细信息
来源: 评论
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4  1st
Protecting the Data Plane of SDN From Malicious Flow Entries...
收藏 引用
1st International Conference on security and Privacy in Digital Economy, SPDE 2020
作者: Zhi, Yifang Yang, Li Yang, Gaolei Zhang, Yuehong Science and Technology on Communication Information Security Control Laboratory Jiaxing China Xidian University Xi’an China PLA Air Force Xi’an Flight Academy Xi’an China
In Software-defined network (SDN), the switching devices on the data plane rely on the flow entries issued by controllers to forward packets. Therefore, the correctness of flow entries becomes critical. However, the l... 详细信息
来源: 评论
Geomagnetic Matching Combined Navigation Based on Improving Operation Efficiency of DTW Algorithm
Geomagnetic Matching Combined Navigation Based on Improving ...
收藏 引用
International Conference on Electronic Measurement and Instruments, ICEMI
作者: Gang Huo Junna Shang Dongli Zhang Yiteng Wang Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of China Electronics Technology Group Corporation Hangzhou Dianzi University HangZhou Zhejiang Hangzhou Dianzi University HangZhou Zhejiang Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of China Electronics Technology Group Corporation Jiaxing Zhejiang
Aiming at the problem of “singularity” generated by the traditional DTW matching algorithm, the DDTW matching algorithm is used to match the geomagnetic sequence, and the first derivative of the sequence is compared... 详细信息
来源: 评论
Research on PDCCH Channel in 5G NR System
Research on PDCCH Channel in 5G NR System
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Liang Tianyi Zhu Huijie Science and Technology on Communication Information Security Control Laboratory Jiaxing China No. 36 Research Institute of China Electronics Technology Group Corporation Jiaxing China
In the 5th Generation Mobile communication technology (5G) system, physical downlink control channel (PDCCH) controls the transmission and reception of uplink and downlink data by transmitting Downlink control Informa... 详细信息
来源: 评论
Heterogeneous influence of individuals’ behavior on mask efficacy in gathering environments
收藏 引用
Frontiers of Engineering Management 2022年 第4期9卷 550-562页
作者: Haochen SUN Xiaofan LIU Zhanwei DU Ye WU Haifeng ZHANG Xiaoke XU College of Information and Communication Engineering Dalian Minzu UniversityDalian 116600China Web Mining Laboratory Department of Media and CommunicationCity University of Hong KongHong KongChina WHO Collaborating Centre for Infectious Disease Epidemiology and Control School of Public HealthLi Ka Shing Faculty of MedicineThe University of Hong KongHong KongChina Laboratory of Data Discovery for Health Hong Kong Science and Technology ParkHong KongChina Computational Communication Research Center Beijing Normal University(Zhuhai)Zhuhai 519087China School of Journalism and Communication Beijing Normal UniversityBeijing 100875China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Mathematical ScienceAnhui UniversityHefei 230601China
Wearing masks is an easy way to operate and popular measure for preventing *** masks can slow down the spread of viruses,their efficacy in gathering environments involving heterogeneous person-to-person contacts remai... 详细信息
来源: 评论