咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 645 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,451 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 949 篇 工学
    • 520 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 80 篇 光学工程
    • 78 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 566 篇 理学
    • 285 篇 数学
    • 210 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 28 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 20 篇 security
  • 20 篇 heuristic algori...
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,250 篇 英文
  • 162 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1451 条 记 录,以下是871-880 订阅
排序:
Tigc-Net: Transformer-Improved Graph Convolution Network for Spatio-Temporal Prediction
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Kai Yang, Chunfeng Zhou, Zhengyuan Liu, Yao Ji, Tianjiao Sun, Weiya Chen, Yang School of Cyber Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China The College of Software Engineering Southeast University Nanjing210096 China Laboratory of Image Science and Technology The School of Computer Science and Engineering Southeast University Nanjing210096 China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of Radiology Zhongda Hospital Southeast University Nanjing210009 China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing210096 China NHC Key Laboratory of Medical Virology and Viral Diseases National Institute for Viral Disease Control and Prevention Chinese Center for Disease Control and Prevention Beijing China Beijing Institute of Tracking and Communication Technology Beijing100094 China
Modeling spatio-temporal sequences is an important topic yet challenging for existing neural networks. Most of the current spatio-temporal sequence prediction methods usually capture features separately in temporal an... 详细信息
来源: 评论
Robust Beamforming Based on Covariance Matrix Reconstruction and ADMM
Robust Beamforming Based on Covariance Matrix Reconstruction...
收藏 引用
IEEE International Conference on Radar
作者: Pengcheng Gong Zhaobin Wang Kaiyan Xu School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China Hubei Key Laboratory for High-efficiency Utilization of Solar Energy and Operation Control of Energy Storage System Hubei University of Technology Wuhan China
Considering at the issue that the performance of the traditional beamforming algorithm will decrease sharply when the disturbance occurs at the disturbed position and the steering vector mismatch occurs, a new robust ... 详细信息
来源: 评论
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes
Extending Registration and Authentication Processes of FIDO2...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and communications (TrustCom)
作者: Chengqian Guo Quanwei Cai Qiongxiao Wang Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering CAS Data Assurance and Communication Security Research Center CAS School of Cyber Security University of Chinese Academy of Sciences School of Cyber Security University of Science and Technology of China
FIDO2, the newest set of FIDO specifications, enables the user to leverage an external authenticator for the authentication in both mobile and desktop environments (referred to as user agent). For the secure registrat... 详细信息
来源: 评论
Research of Association Rules Mining based on Fuzzy Alarm Extraction
Research of Association Rules Mining based on Fuzzy Alarm Ex...
收藏 引用
作者: Li tongyan Lei dong Qin Zhiguang Chengdu University of Information Technology Dept.of Communication Engineering Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu University of Information Technology Dept.of Communication Engineering
In communication alarm correlation analysis, original alarm data often have problems about information redundancy, data incompleteness, time synchronization and "sharp boundary". This paper proposed a novel ... 详细信息
来源: 评论
GPDP: Game-Enhanced Personalized Differentially Private Smart Community
GPDP: Game-Enhanced Personalized Differentially Private Smar...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and communications (GreenCom)
作者: Yuping Zhang Youyang Qu Longxiang Gao Bruce Gu Lei Cui Xuemeng Zhai School of Network & Communication Chendu Technological University Chendu Sichuan China School of Information Technology Deakin University Geelong VIC Australia College of Engineering and Science Victoria University Footscary VIC Australia Key Laboratory of Advanced Control and Intelligent Information System Taiyuan University of Science and Technology Taiyuan Shanxi China College of Engineering and Science University of Electronic Science and Technology of China Chengdu Sichuan China
Smart community, as a key component of Internet of Things (IoT), is experiencing fast booming, which significantly enhances residents' quality of life. Using fog computing to establish a smart community is an effe... 详细信息
来源: 评论
Evaluation of Robustness Metrics for Defense of Machine Learning Systems
Evaluation of Robustness Metrics for Defense of Machine Lear...
收藏 引用
International Conference on Military communications and information Systems (ICMCIS)
作者: J. DeMarchi R. Rijken J. Melrose B. Madahar G. Fumera F. Roli E. Ledda M. Aktaş F. Kurth P. Baggenstoss B. Pelzer L. Kanestad Collaborative Engineering Systems & Aerospace Systems Information Supremacy Royal Netherlands Aerospace Centre NLR Amsterdam NLD Cyber & Information Systems Division Defence Science and Technology Laboratory Portondown GBR Department of Electrical and Electronic Engineering University of Cagliari Cagliari ITA Department of Informatics Bioengineering Robotics and Systems Engineering University of Genoa Genoa ITA Department of Computer Control and Management Engineering Sapienza University of Rome Rome ITA Defence Systems Technologies Division ASELSAN Ankara TUR Fraunhofer Institute for Communication Information Processing and Ergonomics Bonn DEU Swedish Defence Research Agency Cyber Defence and C2 Technology Division Stockholm SWE
In this paper we explore some of the potential applications of robustness criteria for machine learning (ML) systems by way of tangible “demonstrator” scenarios. In each demonstrator, ML robustness metrics are appli...
来源: 评论
Experimental higher-order interference in a nonlinear triple slit
收藏 引用
Physical Review A 2023年 第3期107卷 032211-032211页
作者: Peter Namdar Philipp K. Jenke Irati Alonso Calafell Alessandro Trenti Milan Radonjić Borivoje Dakić Philip Walther Lee A. Rozema Faculty of Physics University of Vienna Vienna Center for Quantum Science and Technology (VCQ) and Research Platform for Testing the Quantum and Gravity Interface (TURIS) Boltzmanngasse 5 Vienna A-1090 Austria Security and Communication Technologies Center for Digital Safety and Security AIT Austrian Institute of Technology GmbH Giefinggasse 4 1210 Vienna Austria Institute of Theoretical Physics University of Hamburg Notkestrasse 9-11 22607 Hamburg Germany Department of Physics and Research Center OPTIMAS Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau Erwin-Schroedinger-Strasse 46 67663 Kaiserslautern Germany Institute of Physics Belgrade University of Belgrade Pregrevica 118 11080 Belgrade Serbia Institute for Quantum Optics and Quantum Information (IQOQI) Austrian Academy of Sciences Boltzmanngasse 3 A-1090 Vienna Austria Christian Doppler Laboratory for Photonic Quantum Computer Faculty of Physics University of Vienna Boltzmanngasse 5 Vienna A-1090 Austria
Interference between two waves is a well-known concept in physics, and its generalization to more than two waves is straightforward. The order of interference is defined as the number of paths that interfere in a mann... 详细信息
来源: 评论
Intelligent Upgrade of Waste-Activated Sludge Dewatering Process Based on Artificial Neural Network Model: Core Influential Factor Identification and Non-Experimental Prediction of Sludge Dewatering Performance
SSRN
收藏 引用
SSRN 2023年
作者: Li, Hewei Li, Chunjiang Zhou, Kun Ye, Wei Lu, Yufei Chaia, Xiaoli Daia, Xiaohu Wu, Boran State Key Laboratory of Pollution Control and Resource Reuse College of Environmental Science and Engineering Tongji University 1239 Siping Road Shanghai200092 China Shanghai Technology Innovation Center of Sludge Treatment and Resourcification Shanghai CEO Environmental Protection Technology Co. Ltd. 1668 Guoquan Road Shanghai200438 China Co. Ltd. 901 Zhongshan North 2nd Road Shanghai200092 China College of Electronic and Information Engineering Tongji University 4800 Cao'an Highway Shanghai201804 China Shanghai Institute of Pollution Control and Ecological Security Shanghai200092 China
Owing to the extremely complex compositions and origins of waste-activated sludge (WAS), the multiple physiochemical properties of WAS have impacts on its dewaterability, and there is a complex interaction relationshi... 详细信息
来源: 评论
Granger-Causality Mining in Atmospheric Visibility Based on Deep Learning  9th
Granger-Causality Mining in Atmospheric Visibility Based on ...
收藏 引用
9th International Conference on Frontier Computing, FC 2019
作者: Liu, Bo He, Xi Li, Jianqiang Qu, Guangzhi Lang, Jianlei Gu, Rentao Faculty of Information Technology School of Software Engineering Beijing University of Technology Beijing100124 China Computer Science and Engineering Department Oakland University RochesterMI48309 United States Key Laboratory of Beijing on Regional Air Pollution Control College of Environmental and Energy Engineering Beijing University of Technology Beijing100124 China Beijing Laboratory of Advanced Information Networks School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China
Causal relationship mining of multi-dimensional meteorological time series data can reveal the potential connection between visibility and other influencing factors, and it is meaningful in terms of environmental mana... 详细信息
来源: 评论
Research on 4G and 5G Authentication Signaling  2
Research on 4G and 5G Authentication Signaling
收藏 引用
2019 2nd International Conference on Advanced Algorithms and control Engineering, ICAACE 2019
作者: Song, Lei Xu, Zhan Tian, Zhigang Chen, Jinhui Zhi, Ruxin School of Information and Communication Engineering Beijing Information Science and Technology University Beijing China Key Laboratory of Modern Measurement and Control Technology Ministry of Education China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
In recent years, the development and standardization of 5G networks have received extensive attention. 3GPP officially confirmed that Service-Based Architecture (SBA) is the unified infrastructure of the 5G core netwo... 详细信息
来源: 评论