咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是831-840 订阅
排序:
Discrete-Phase Waveform Design to Quadratic Optimization via an ADPM Framework with Convergence Guarantee
Discrete-Phase Waveform Design to Quadratic Optimization via...
收藏 引用
Sensor Array and Multichannel Signal Processing Workshop
作者: Xianxiang Yu Guolong Cui Zhenghong Zhang Lin Zhou Jing Yang Lingjiang Kong School of Information and Communication Engineering University of Electronic Science and Technology of China Science and Technology on Electronic Information Control Laboratory Chengdu China
This paper considers a quadratic optimization problem in radar discrete-phase waveform design under similarity and constant modulus constraints. A computationally efficient iterative algorithm based on the Alternating... 详细信息
来源: 评论
Machine-learning-aided Massive Hybrid Analog and Digital MIMO DOA Estimation for Future Wireless Networks
arXiv
收藏 引用
arXiv 2022年
作者: Shu, Feng Chen, Yiwen Zhan, Xichao Cai, Wenlong Huang, Mengxing Jie, Qijuan Li, Yifang Shi, Baihua Wang, Jiangzhou You, Xiaohu Zhao, Xinyi The School of Mathematics and Statistics Nanjing University of Science and Technology Nanjing210094 China The School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing210094 China The School of Information and Communication Engineering Hainan University Haikou570228 China The National Key Laboratory of Science and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute Beijing100854 China The School of Engineering University of Kent CanterburyCT27NT United Kingdom The School of Southeast University Nanjing211189 China
Due to a high spatial angle resolution and low circuit cost of massive hybrid analog and digital (HAD) multiple-input multiple-output (MIMO), it is viewed as a valuable green communication technology for future wirele... 详细信息
来源: 评论
A Novel Threat Sensing Architecture for Heterogeneous Cognitive Sensor Networks
A Novel Threat Sensing Architecture for Heterogeneous Cognit...
收藏 引用
2019 IEEE International Conference on Signal, information and Data Processing, ICSIDP 2019
作者: Ren, Yongji Zhang, Yun Zhou, Zheng Xu, Xiaofeng Liu, Xiaolei Naval Aviation University Yantai China Science and Technology on Communication Information Security Control Laboratory Jiaxing China Yantai Vocational College Yantai China
With the rapid development and application of novel network information technologies, the various radar and/or communication transmitters have become more intelligent and networked in modern electromagnetic operationa... 详细信息
来源: 评论
Mainlobe Jamming Suppression Via Independent Component Analysis for Polarimetric SIMO Radar
Mainlobe Jamming Suppression Via Independent Component Analy...
收藏 引用
Sensor Array and Multichannel Signal Processing Workshop
作者: Mengmeng Ge Guolong Cui Zhenghong Zhang Lin Zhou Xianxiang Yu Feng Yang Lingjiang Kong School of Information and Communication Engineering University of Electronic Science and Technology of China Science and Technology on Electronic Information Control Laboratory Chengdu China
The presence of mainlobe jamming will significantly reduce the radar detection capabilities. Conventional independent component analysis (ICA)-based methods will suffer from the ineffectiveness when the angle of the t... 详细信息
来源: 评论
Top-down and bottom-up approaches to video Quality of Experience studies;overview and proposal of a new model
arXiv
收藏 引用
arXiv 2023年
作者: Koniuch, Kamil Baraković, Sabina Husić, Jasmina Baraković De Moor, Katrien Janowski, Lucjan Wierzchoń, Michal Institute of Communication Technologies AGH University of Science and Technology Cracow Poland Faculty of Traffic and Communications University of Sarajevo Sarajevo Bosnia and Herzegovina Zmaja od Bosne bb Sarajevo71000 Bosnia and Herzegovina Faculty of Electrical Engineering University of Sarajevo Sarajevo Bosnia and Herzegovina Zmaja od Bosne bb Sarajevo71000 Bosnia and Herzegovina Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway Consciousness Lab Institute of Psychology Jagiellonian University Kraków Poland Centre for Brain Research Jagiellonian University Kraków Poland Jagiellonian Human-Centered Artificial Intelligence Laboratory Jagiellonian University Kraków Poland
Modern video streaming services require quality assurance of the presented audiovisual material. Quality assurance mechanisms allow streaming platforms to provide quality levels that are considered sufficient to yield... 详细信息
来源: 评论
A security enhanced certificateless aggregate signcryption scheme for VANETs
收藏 引用
Peer-to-Peer Networking and Applications 2025年 第4期18卷
作者: Liu, Dong Tang, Wentao Wang, Liangliang Liu, Yang Liu, Zhiquan Zhang, Kai Li, Weiwei School of Computer Science and Technology Xidian University Xi’an710699 China the College of Computer Science and Technology Shanghai University of Electric Power Shanghai201306 China Institute of Network Security Inspection and Evaluation China Industrial Control System Cyber Emergency Response Team Beijing100040 China Key Laboratory of Industrial Information Security Perception and Evaluation Technology Ministry of Industry and Information Technology Beijing100040 China the College of Cyber Security Jinan University Guangzhou510632 China
Unlike traditional Internet of Things (IoT), Vehicular Ad Hoc Networks (VANETs) operate in open environments and transmit information through wireless communication technologies, making VANETs more susceptible to vari... 详细信息
来源: 评论
Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Du, Hongyang Zhang, Ruichen Liu, Yinqiu Wang, Jiacheng Lin, Yijing Li, Zonghang Niyato, Dusit Kang, Jiawen Xiong, Zehui Cui, Shuguang Ai, Bo Zhou, Haibo Kim, Dong In The School of Computer Science and Engineering The Energy Research Institute @ NTU Interdisciplinary Graduate Program Nanyang Technological University Singapore The School of Computer Science and Engineering Nanyang Technological University Singapore The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China The School of Information and Communication Engineering University of Electronic Sciences and Technology of China Chengdu China The School of Automation Guangdong University of Technology China The Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore Shenzhen China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China School of Electronic Science and Engineering Nanjing University Jiangsu Nanjing210093 China The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of
Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across various applications. The abili... 详细信息
来源: 评论
Byzantine-Robust Federated Learning Framework via a Server-Client Defense Mechanisms
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Song, Anxiao Zhang, Tao Cheng, Ke Cao, Yang Zhu, Xinghui Shen, Yulong Xidian University School of Computer Science and Technology Xi’an China Shaanxi Key Laboratory of Network and System Security Shaanxi Xi’an710071 China Xidian University School of Computer Science and Technology Shaanxi Xi’an710071 China Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi’an710121 China Institute of Science Tokyo Department of Computer Science Tokyo Japan
Federated Learning (FL), a distributed machine learning (ML) framework, is susceptible to Byzantine attacks since the attacker can manipulate clients' local data or models to compromise the performance of the glob... 详细信息
来源: 评论
Classification and Recognition of Underwater Target Based on MFCC Feature Extraction
Classification and Recognition of Underwater Target Based on...
收藏 引用
IEEE International Conference on Signal Processing, communications and Computing (ICSPCC)
作者: Yuze Tong Xin Zhang Yizhou Ge School of Marine Science and Technology Northwestern Polytechnical University Xi’an China Science and Technology on Communication Information Security Control Laboratory NO.36 Research Institute of CETC Jiaxing China
The key to underwater target recognition is to extract the effective features of underwater target radiation noise. This paper presents an effective method for underwater target recognition and classification by extra... 详细信息
来源: 评论
Unified Authentication Scheme for IoT Blockchain Based on PUF
Unified Authentication Scheme for IoT Blockchain Based on PU...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Dawei Li Yingxian Song Lixin Zhang Di Liu Baoquan Ma Zhenyu Guan School of Cyber Science and Technology Beihang University Beijing China National Engineering Laboratory for Industry Control System Information Security Technology Beijing China National Computer System Enginering Research Institute of China Beijing China
The number of global Internet of Things devices has increased rapidly and has a wide range of application markets. Access authentication methods for massive heterogeneous IoT devices are complicated, and central serve... 详细信息
来源: 评论