咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是821-830 订阅
排序:
Energy-Efficient UAV Trajectory Design for Backscatter communication: A Deep Reinforcement Learning Approach
收藏 引用
China communications 2020年 第10期17卷 129-141页
作者: Yiwen Nie Junhui Zhao Jun Liu Jing Jiang Ruijin Ding School of Electronic and Information Engineering Beijing Jioatong UniversityBeijing 100044China School of Information Engineering East China Jiaotong UniversityNanchang 330013China Institute of Network Sciences and Cyberspace Tsinghua UniversityBeijing 100084China Beijing National Research Center for Information Science and Technology(BNRist) Beijing 100084China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and TelecommunicationsXi’an 710121China Institute for Artificial Intelligence Tsinghua University(THUAI)Beijing 100084China State Key Laboratory of Intelligent Technologies and Systems Tsinghua UniversityBeijing 100084China Beijing National Research Center for Information Science and Technology(BNRist) Department of AutomationTsinghua UniversityBeijing 100084China
Recently,backscatter communication(BC)has been introduced as a green paradigm for Internet of Things(IoT).Meanwhile,unmanned aerial vehicles(UAVs)can serve as aerial base stations(BSs)to enhance the performance of BC ... 详细信息
来源: 评论
Example-based web page recoloring method
收藏 引用
Frontiers of Computer science 2020年 第5期14卷 229-231页
作者: Yonghao Long Zhihao Zang Xiangping Chen Fan Zhou Xiaonan Luo School of Data and Computer Science National Engineering Research Center of Digital LifeSun Yat-sen UniversityGuangzhou510006China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion The School of Communication and DesignSun Yat-sen UniversityGuangzhou510006China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China
1 Introduction The user interface(UI)is very important for a software product,and a well-designed UI will attract users and make a good *** has been shown that color plays an important role in invoking emotional react... 详细信息
来源: 评论
Federated Coordinate Descent for Privacy-Preserving Multiparty Linear Regression
arXiv
收藏 引用
arXiv 2022年
作者: Leng, Xinlin Li, Chenxu Xu, Weifeng Sun, Yuyan Wang, Hongtao School of Control and Computer Engineering North China Electric Power University Baoding071051 China School of Computer Science and Technology Shandong University of Finance and Economics Jinan250014 China Beijing Key Laboratory of IoT Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Hebei Key Laboratory of Knowledge Computing for Energy & Power Baoding071051 China
Federated linear regressions have been developed and applied in various domains, where multiparties collaboratively and securely perform optimization algorithms, e.g., Gradient Descent, to learn a set of optimal model... 详细信息
来源: 评论
Code rate estimation and code sequence retrieval of the binary phase-coded radar signal using further autocorrelation analysing
Code rate estimation and code sequence retrieval of the bina...
收藏 引用
2019 International Conference on communications, information System, and Computer Engineering, CISCE 2019
作者: Jiang, Bin Li, Jie Yang, Xiaohong Zhu, Jun Xiong, Ying Tang, Bin Science and Technology on Communication Information Security Control Laboratory 36th Research Institute of CETC Jiaxing China University of Electronic Science and Technology of China Chengdu China
The binary phase-coded radar signal code rate estimation and code sequence retrieval are important in EW and ELINT. In this paper, the statistical autocorrelation function of the binary phase-coded radar signal is stu... 详细信息
来源: 评论
Swing error phase modulation jamming method of airborne SAR
Swing error phase modulation jamming method of airborne SAR
收藏 引用
2019 International Conference on communications, information System, and Computer Engineering, CISCE 2019
作者: Li, Jie Jiang, Bin Liang, Wenyan Zhu, Jun Xiong, Ying Tang, Bin Science and Technology on Communication Information Security Control Laboratory 36th Research Institute of CETC Jiaxing China University of Electronic Science and Technology of China Chengdu China
A new airborne synthetic aperture radar (SAR) jamming-swing error phase modulation jamming is presented. The method uses the swing error of the line-of-sight SAR during the motion of the airborne SAR and modulate the ... 详细信息
来源: 评论
Bitstream protocol classification mechanism based on feature extraction
Bitstream protocol classification mechanism based on feature...
收藏 引用
2019 International Conference on Networking and Network Applications, NaNA 2019
作者: Wang, Wei Bai, Binbin Wang, Yichuan Hei, Xinhong Zhang, Li Science and Technology on Communication Information Security Control Laboratory No.36 Research Institution of CETC China College of Computer Science and Engineering Xi'An University of Technology Xi'an China
In recent years, with the continuous expansion of network communication scale, the types of niche protocols and various proprietary communication protocols are increasing day by day, but botnet and various network att... 详细信息
来源: 评论
Att-TCN: An Advertising Attribution Method Based on Temporal Convolutional Network with Attention Mechanism
Att-TCN: An Advertising Attribution Method Based on Temporal...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Bowen Xie Yi Sun Zhaowen Lin Baoquan Ma School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Technologies Beijing China National Computer System Engineering Research Institute of China Beijing China National Engineering Laboratory for Industry Control System Information Security Technology Beijing China
Advertising attribution is an effective method to measure the effect of various advertisements in the era of Internet advertising. It enables scientific tracking back and refined operation of advertising by quantitati... 详细信息
来源: 评论
Demodnet: Learning soft demodulation from hard information using convolutional neural network
arXiv
收藏 引用
arXiv 2020年
作者: Zheng, Shilian Zhou, Xiaoyu Chen, Shichuan Qi, Peihan Yang, Xiaoniu Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China
Soft demodulation is a basic module of traditional communication receivers. It converts received symbols into soft bits, that is, log likelihood ratios (LLRs). However, in the non-ideal additive white Gaussian noise (... 详细信息
来源: 评论
A Spectrum Status Duration Prediction Method Based on Homotopy Theory for UAV communication  6
A Spectrum Status Duration Prediction Method Based on Homoto...
收藏 引用
6th IEEE International Conference on Computer and communications, ICCC 2020
作者: Zhou, Tao Luo, Shan Zheng, Peixiang Lin, Rongping School of Aeronautics and Astronautics University of Electronic Science and Technology of China Chengdu China Aircraft Swarm Intelligent Sensing and Cooperative Control Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
With the development of wireless communication technology, a large number of spectrum resources are occupied and become increasingly scarce. If drones want to communicate, they need to share spectrum with others. The ... 详细信息
来源: 评论
A novel approach to reducing information leakage for quantum key distribution
arXiv
收藏 引用
arXiv 2021年
作者: Mao, Hao-Kun Zhao, Qiang Qiao, Yu-Cheng Yan, Bing-Ze Xu, Bing-Jie Abd El-Latif, Ahmed A. Li, Qiong Department of Computer Science and Technology Harbin Institute of Technology Harbin150080 China College of Software Engineering ZhengZhou University of Light Industry ZhengZhou450053 China Guangxi Key Lab Cryptography & Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt
Quantum key distribution (QKD) is an important branch of quantum information science as it holds promise for unconditionally secure communication. For QKD research, a central issue is to improve the final secure key r... 详细信息
来源: 评论