咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1449 条 记 录,以下是971-980 订阅
排序:
A Spectrum Status Duration Prediction Method Based on Homotopy Theory for UAV communication
A Spectrum Status Duration Prediction Method Based on Homoto...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Tao Zhou Shan Luo Peixiang Zheng Rongping Lin School of Aeronautics and Astronautics University of Electronic Science and Technology of China Chengdu China Aircraft Swarm Intelligent Sensing and Cooperative Control Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
With the development of wireless communication technology, a large number of spectrum resources are occupied and become increasingly scarce. If drones want to communicate, they need to share spectrum with others. The ... 详细信息
来源: 评论
A Novel Threat Sensing Architecture for Heterogeneous Cognitive Sensor Networks
A Novel Threat Sensing Architecture for Heterogeneous Cognit...
收藏 引用
Signal, information and Data Processing (ICSIDP), IEEE International Conference on
作者: Yongji Ren Yun Zhang Zheng Zhou Xiaofeng Xu Xiaolei Liu Naval Aviation University Yantai China Science and Technology on Communication Information Security Control Laboratory Jiaxing China Yantai Vocational College Yantai China
With the rapid development and application of novel network information technologies, the various radar and/or communication transmitters have become more intelligent and networked in modern electromagnetic operationa...
来源: 评论
Resource Mobility Aware Hybrid Task Planning in Space information Networks
收藏 引用
Journal of communications and information Networks 2019年 第4期4卷 107-116页
作者: Runzi Liu Yiting Zhu Yan Zhang Weihua Wu Di Zhou Kai Chi School of Information and Control Engineering Xi’an University of Architecture and TechnologyXi’anShaanxi 710055China The State Key Lab of ISN Xidian UniversityXi’anShaanxi 710071China Science and Technology on Communication Networks Laboratory CETC the 54th research instituteShijiazhuangHebei 050081China Electric Information Network Laboratory CETC the 20th research instituteXi’anShaanxi 710068China
In this paper,a resource mobility aware two-stage hybrid task planning algorithm is proposed to reduce the resource conflict between emergency tasks and the common tasks,so as to improve the overall performance of spa... 详细信息
来源: 评论
Several classes of linear codes with few weights derived from Weil sums
收藏 引用
Finite Fields and Their Applications 2025年 108卷
作者: Zhao Hu Mingxiu Qiu Nian Li Xiaohu Tang Liwei Wu Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education the Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Hubei University Wuhan 430062 China State Key Laboratory of Integrated Service Networks Xi'an 710071 China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan 430062 China Information Coding & Transmission Key Lab of Sichuan Province CSNMT Int. Coop. Res. Centre (MoST) Southwest Jiaotong University Chengdu 610031 China Wuhan Maritime Communication Research Institute China
Linear codes with few weights have applications in secret sharing, authentication codes, association schemes and strongly regular graphs. In this paper, several classes of t -weight linear codes over F q are presented...
来源: 评论
Traffic Analysis of a Networks based on Stochastic Geometry to Exclude Malice Flow  2
Traffic Analysis of a Networks based on Stochastic Geometry ...
收藏 引用
2018 2nd Annual International Conference on Cloud technology and communication Engineering, CTCE 2018
作者: Dai, Jiahao Xu, Xiaofeng Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No.36 Institute Zhejiang Jiaxing China
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ... 详细信息
来源: 评论
Sensing Matrix Design for MMV Compressive Sensing: An MVDR Approach
Sensing Matrix Design for MMV Compressive Sensing: An MVDR A...
收藏 引用
作者: Zhang, Liang Huang, Lei Li, Bo Yin, Jingwei Bao, Weimin School of Information and Control Engineering China University of Mining and Technology Xuzhou221116 China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen518060 China Nuance Communication Inc. MontrealQCH3A 3S7 Canada Key Laboratory of Marine Information Acquisition and Security Ministry of Industry and Information Technology Harbin150001 China Science and Technology Council China Aerospace Science and Technology Cooperation Beijing100048 China College of Electronics and Information Engineering Shenzhen University Shenzhen518060 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin150001 China
Compressive sensing (CS) has been widely used in vehicular technology including compressive spectrum sensing, sparse channel estimation, and vehicular communications. The complete procedure of CS consists of sparse re... 详细信息
来源: 评论
Local spin-state manipulation of iron single-atom sites induced by sulfur modification to boost Fenton-like reaction
收藏 引用
Chinese Chemical Letters 2025年
作者: Lina Zou Dengke Wang Shiqin Lai Xunheng Jiang Siqi Chen Lanqing Deng Dong Fan Hengshuai Li Zhigang Zhou Denglong Chen Xiangyang Yao Jianping Zou National-Local Joint Engineering Research Center of Heavy Metals Pollutants Control and Resource Utilization Nanchang Hangkong University Nanchang 330063 China College of Environmental and Resource Sciences Zhejiang University Hangzhou 310058 China School of Physics Science and Information Technology & Shandong Key Laboratory of Optical Communication Science and Technology Liaocheng University Liaocheng 252000 China Quangang Research Institute of Petrochemical Technology Fujian Normal University Fuzhou 350007 China Fujian Longking New Land Tech Co. Ltd. Fuzhou 350015 China
A strategy based on local spin-state manipulation was achieved through S-modification on single-Fe-atom catalysts (Fe 1 -NSC). Spectral analyses and theoretical calculations elucidated that a medium-spin reconfigurati...
来源: 评论
Improving the performance of twin-field quantum key distribution
收藏 引用
Physical Review A 2019年 第2期100卷 022306-022306页
作者: Feng-Yu Lu Zhen-Qiang Yin Chao-Han Cui Guan-Jie Fan-Yuan Rong Wang Shuang Wang Wei Chen De-Yong He Wei Huang Bing-Jie Xu Guang-Can Guo Zheng-Fu Han Key Laboratory of Quantum Information CAS Center For Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Hefei 230026 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing 100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu Sichuan 610041 China
Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M. Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, th... 详细信息
来源: 评论
A Survey on Adaptive Random Testing
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Rubing Sun, Weifeng Xu, Yinyin Chen, Haibo Towey, Dave Xia, Xin School of Computer Science and Communication Engineering Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University ZhenjiangJiangsu212013 China School of Computer Science and Communication Engineering Jiangsu University ZhenjiangJiangsu212013 China School of Computer Science University of Nottingham Ningbo China NingboZhejiang315100 China Faculty of Information Technology Monash University MelbourneVIC3168 Australia
—Random testing (RT) is a well-studied testing method that has been widely applied to the testing of many applications, including embedded software systems, SQL database systems, and Android applications. Adaptive ra... 详细信息
来源: 评论
The Method to Recognize Linear Block Code Based on the Distribution of Code Weight  10
The Method to Recognize Linear Block Code Based on the Distr...
收藏 引用
10th International Conference on communication Software and Networks, ICCSN 2018
作者: Lei, Wang Yizhou, Ge Fucai, Zhao Yong, Wang Science and Technology on Communication Information Security Control Laboratory Jiaxing China Key Laboratory of Electronic Restriction Anhui Province National University of Defense Technology Hefei China
The definition and matrix description of linear cyclic code is introduced in this paper first. Then the distribution of code weight is analyzed. The distance of code weight distribution is defined according to distanc... 详细信息
来源: 评论