咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是721-730 订阅
排序:
Deterministic generation of non-classical mechanical states in cavity optomechanics via reinforcement learning
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Yu-Hong Tan, Qing-Shou Kuang, Le-Man Liao, Jie-Qiao Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Key Laboratory for Matter Microstructure and Function of Hunan Province Department of Physics Synergetic Innovation Center for Quantum Effects and Applications Hunan Normal University Changsha410081 China Key Laboratory of Hunan Province on Information Photonics and Freespace Optical Communication College of Physics and Electronics Hunan Institute of Science and Technology Yueyang414000 China Institute of Interdisciplinary Studies Hunan Normal University Changsha410081 China
Non-classical mechanical states, as vital quantum resources for exploring macroscopic quantum behavior, have wide applications in the study of the fundamental quantum mechanics and modern quantum technology. In this w... 详细信息
来源: 评论
Practical Continuous-variable Quantum Key Distribution with Feasible Optimization Parameters
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Li Yang, Jie Zhang, Tao Shao, Yun Liu, Jinlu Luo, Yujie Wang, Heng Huang, Wei Fan, Fan Zhou, Chuang Zhang, Liangliang Zhang, Shuai Zhang, Yichen Li, Yang Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
Continuous-variable quantum key distribution (CV-QKD) offers an approach to achieve a potential high secret key rate (SKR) in metropolitan areas. There are several challenges in developing a practical CV-QKD system fr... 详细信息
来源: 评论
A Many-Objective Optimization Evolutionary Algorithm Based on Hyper-Dominance Degree
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Zhe Han, Fei Ling, Qing-Hua Han, Henry Jiang, Jing Wang, Yue School of Computer Science and Communication Engineering Jiangsu University Zhenjiang212013 China Jiangsu Key Laboratory of Security Technology for industrial Cyberspace Jiangsu University Zhenjiang212013 China School of Computer Science Jiangsu University of Science and Technology Zhenjiang212100 China School of Engineering & Computer Science Baylor University Waco76798 United States School of Computer and information Anqing normal University Anqing246011 China School of Mechatronical Engineering Beijing Institute of Technology Beijing100081 China
Compared with multi-objective optimization, solving many-objective optimization problems usually require more strong selection pressure to improve convergence. However, too strong selection pressure usually leads to t... 详细信息
来源: 评论
An alternative approach for computing discrete logarithms in compressed SIDH
arXiv
收藏 引用
arXiv 2021年
作者: Lin, Kaizhan Wang, Weize Wang, Lin Zhao, Chang-An School of Mathematics Sun Yat-Sen University Guangzhou510275 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China Guangdong Key Laboratory of Information Security Guangzhou510006 China
Currently, public-key compression of supersingular isogeny Diffie-Hellman (SIDH) and its variant, supersingular isogeny key encapsulation (SIKE) involve pairing computation and discrete logarithm computation. In this ... 详细信息
来源: 评论
A Multi-Objective Evolutionary Algorithm Based on Adaptive Grid for Multi-Objective Optimization with Irregular Pareto Fronts
SSRN
收藏 引用
SSRN 2023年
作者: Han, Fei Liu, Zhe Ling, Qing-Hua Han, Henry Jiang, Jing Wang, Yue School of Computer Science and Communication Engineering Jiangsu University Zhenjiang212013 China Jiangsu Key Laboratory of Security Technology for industrial Cyberspace Jiangsu University Zhenjiang212013 China School of Computer Science Jiangsu University of Science and Technology Zhenjiang212100 China School of Engineering & Computer Science Baylor University Waco76798 United States School of Computer and information Anqing normal University Anqing246011 China School of Mechatronical Engineering Beijing Institute of Technology Beijing100081 China
Most existing multi-objective optimization algorithms suffer from performance degradation when solving problems with irregular Pareto fronts due to the ineffective diversity preservation strategies. To address this is... 详细信息
来源: 评论
Dynamic Tracking of Ship Course with Limited Input Based on ZG control and Bivariate S-Function
Dynamic Tracking of Ship Course with Limited Input Based on ...
收藏 引用
Chinese control and Decision Conference, CCDC
作者: Shengmian Xie Yunong Zhang Jinjin Guo Mengling Xiao School of Information and Communication Engineering Guangzhou Maritime University Guangzhou China Guangdong Key Laboratory of Modern Control Technology Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
The nonlinear control system of ship is complex, which is a focus of research and key core of dynamic tracking. Because the input of the actual system is often restricted by the physical constraints of the actuator an... 详细信息
来源: 评论
Computing Power in the Sky: Digital Twin-assisted Collaborative Computing with Multi-UAV Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Research on Improved Multiple Users Detection Algorithm in Pattern Division Multiple Access System
SSRN
收藏 引用
SSRN 2022年
作者: Tang, Wanwei Wang, Lixia Wang, Zedai Han, Guofeng Zhao, Jinlong Yue, Xinwei The Key Laboratory of Intelligent Data Information Processing and Control of Hebei Province Tangshan University Tangshan063000 China The School of Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong The Guofeng Han is with the Tangshan employment service center Tangshan human resources and Social Security Bureau Tangshan063000 China The School of Electronic and Information Engineering Beihang University Beijing100191 China The School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China
Receiver detection algorithm has always been a research hotspot in communication system and the key point to determine the performance of 5G system. Both industry and academia have been committed to finding detection ... 详细信息
来源: 评论
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network
GraphEye: A Novel Solution for Detecting Vulnerable Function...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Li Zhou Minhuan Huang Yujun Li Yuanping Nie Jin Li Yiwei Liu School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Science and Technology on Information System Security BeijingChina School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
With the continuous extension of the Industrial Internet, cyber incidents caused by software vulnerabilities have been increasing in recent years. However, software vulnerabilities detection is still heavily relying o... 详细信息
来源: 评论
Outlier Detection for Sensor Data Streams Based on Maximum Frequent and Minimum Rare Patterns  15th
Outlier Detection for Sensor Data Streams Based on Maximum F...
收藏 引用
15th CCF Conference on Computer Supported Cooperative Work and Social Computing, Chinese CSCW 2020
作者: Shi, Xiaochen Cai, Saihua Sun, Ruizhi College of Information and Electrical Engineering China Agricultural University Beijing100083 China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang212013 China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang Jiangsu212013 China The Ministry of Agriculture Beijing100083 China
Identifying outliers in data is an essential assignment in data mining. It aims to find the data that is significantly different from other data in the data streams, and scholars have proposed many outlier detection m... 详细信息
来源: 评论