咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1449 条 记 录,以下是931-940 订阅
排序:
A Novel Localization Method Based on FDA Beam Intersection
A Novel Localization Method Based on FDA Beam Intersection
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Yezi Ma Ping Wei Huaguo Zhang School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Communication Information Security Control Laboratory School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In the past localization methods, both mechanical and phased array radars require angle scanning because their beampatterns are only angle-dependent, resulting in the echo time difference only contains the range infor... 详细信息
来源: 评论
Twin-field quantum key distribution with passive-decoy state
arXiv
收藏 引用
arXiv 2020年
作者: Teng, Jun Lu, Feng-Yu Yin, Zhen-Qiang Fan-Yuan, Guan-Jie Wang, Rong Wang, Shuang Chen, Wei Huang, Wei Xu, Bing-Jie Guo, Guang-Can Han, Zheng-Fu CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China Synergetic Innovation Center of Quantum Information & Quantum Physics University of Science and Technology of China HefeiAnhui230026 China State Key Laboratory of Cryptography P. O. Box 5159 Beijing100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication ChengduSichuan610041 China
Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance l... 详细信息
来源: 评论
Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Rui-Qiang Yin, Zhen-Qiang Lu, Feng-Yu Wang, Rong Wang, Shuang Chen, Wei Huang, Wei Xu, Bing-Jie Guo, Guang-Can Han, Zheng-Fu CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China Synergetic Innovation Center of Quantum Information & Quantum Physics University of Science and Technology of China HefeiAnhui230026 China State Key Laboratory of Cryptography P. O. Box 5159 Beijing100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication ChengduSichuan610041 China
Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics. In practice, the secret key rate of a QKD protocol is always lowered with the inc... 详细信息
来源: 评论
Topologically Enhanced Circular Dichroism from Metasurfaces
收藏 引用
Physical Review Applied 2021年 第3期16卷 L031001-L031001页
作者: Jiaxin Chen Lishuan Wang Wei Wu Wei Cai Huasong Liu Mengxin Ren Jingjun Xu Key Laboratory of Weak-Light Nonlinear Photonics Ministry of Education School of Physics and TEDA Applied Physics Institute Nankai University Tianjin 300071 People’s Republic of China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308 People’s Republic of China Tianjin Key Laboratory of Optical Thin Film Tianjin Jinhang Technical Physics Institute Tianjin 300080 People’s Republic of China Collaborative Innovation Center of Extreme Optics Shanxi University Taiyuan Shanxi 030006 People’s Republic of China
Circular dichroism (CD) is one of the most distinctive properties of chiral materials. In recent decades, chiral metasurfaces have been regarded as a promising framework to realize chiral optical devices with ultrathi... 详细信息
来源: 评论
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
收藏 引用
China communications 2018年 第2期15卷 190-208页
作者: Jin Li Jinfu Chen Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang National key laboratory of science and technology on information system security Beijing institute of system engineering School of Computer Science and Communication Engineering Jiangsu University
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... 详细信息
来源: 评论
MILP-aided bit-based division property for ARX ciphers
收藏 引用
science China(information sciences) 2018年 第11期61卷 229-231页
作者: Ling SUN Wei WANG Ru LIU Meiqin WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Science and Technology on Communication Security Laboratory No.30 Research Institute of China Electronics Technology Group Corporation State Key Laboratory of Cryptology
Division property, which was proposed by Todo [1]at EUROCRYPT 2015, is a new technique to detect integral property. It could explicitly depict the hidden properties between the traditional ALL and BALANCE properties i... 详细信息
来源: 评论
Disease transmission in dynamic social networks constructed by reinforcement learning-driven preventive game
收藏 引用
Chaos, Solitons & Fractals 2025年 199卷
作者: Yinuo Qian Dawei Zhao Chengyi Xia School of Control Science and Engineering Tiangong University Tianjin 300387 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan 250014 China School of Artificial Intelligence Tiangong University Tianjin 300387 China
Reinforcement learning delves into the intrinsic behaviors of multi-agents, while complex networks reveal their interactive relationships. In real life, an individual can be considered as a sophisticated multi-agent, ...
来源: 评论
Delay-Optimal Edge Cache Replacement with Non-Markovian Content Fetching
Delay-Optimal Edge Cache Replacement with Non-Markovian Cont...
收藏 引用
GLOBECOM 2020 - 2020 IEEE Global communications Conference
作者: Nannan Zhang Wei Wang Pan Zhou Aiping Huang College of Information Science and Electronic Engineering Zhejiang Provincial Key Laboratory of Information Processing Communication and Networking Zhejiang University Hangzhou China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Leveraging the content caching technology, popular contents can be in close proximity to the users, which reduces the delay effectively. In this paper, we dedicate to minimizing the long-term average delay for the cac... 详细信息
来源: 评论
Velocity-Driven Particle Swarm Optimization  19
Velocity-Driven Particle Swarm Optimization
收藏 引用
Proceedings of the 2019 8th International Conference on Computing and Pattern Recognition
作者: Wei Li Yaochi Fan Qiaoyong Jiang Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
communication-efficient coordinated RSS-based distributed passive localization via drone cluster
arXiv
收藏 引用
arXiv 2021年
作者: Cheng, Xin Shi, Weiping Cai, Wenlong Zhu, Weiqiang Shen, Tong Shu, Feng Wang, Jiangzhou School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing210094 China The 8511 Research Institute China Aerospace Science and Industry Corporation Nanjing210007 China The National Key Laboratory of Science and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute Beijing100854 China The School of Information and Communication Engineering Hainan University Haikou570228 China The School of Engineering and Digital Arts University of Kent CanterburyCT2 7NT United Kingdom
Recently, passive unmanned aerial vehicle (UAV) localization has become popular due to mobility and convenience. In this paper, we consider a scenario of using distributed drone cluster to estimate the position of a p... 详细信息
来源: 评论