咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1449 条 记 录,以下是981-990 订阅
排序:
Allocating limited resources to protect a massive number of targets using a game theoretic model
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Xu Di, Xiaoqiang Li, Jinqing Wang, Huan Zhao, Jianping Yang, Huamin Cong, Ligang Jiang, Yuming School of Computer Science and Technology Changchun University of Science and Technology Changchun China Jilin Province Key Laboratory of Network and Information Security Changchun China Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway
Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses th... 详细信息
来源: 评论
Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless communications
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Helin Xiong, Zehui Zhao, Jun Niyato, Dusit Xiao, Liang Wu, Qingqing School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore Department of Information and Communication Engineering Key Laboratory of Digital Fujian on IoT Communication Architecture and Security Technology Xiamen University Xiamen361005 China Department of Electrical and Computer Engineering National University of Singapore Singapore119260 Singapore
In this paper, we study an intelligent reflecting surface (IRS)-aided wireless secure communication system for physical layer security, where an IRS is deployed to adjust its reflecting elements to secure the communic... 详细信息
来源: 评论
Joint object contour points and semantics for instance segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Zhu, Mai Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science University of Auckland New Zealand
The attributes of object contours has great significance for instance segmentation task. However, most of the current popular deep neural networks do not pay much attention to the object edge information. Inspired by ...
来源: 评论
BotCapturer: Detecting botnets based on two-layered analysis with graph anomaly detection and network traffic clustering
收藏 引用
International Journal of Performability Engineering 2018年 第5期14卷 1050-1059页
作者: Wang, Wei Wang, Yang Tan, Xinlu Liu, Ya Yang, Shuangmao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China Science and Technology on Electronic Information Control Laboratory Chengdu610036 China
Botnets have become one of the most serious threats on the Internet. On the platform of botnets, attackers conduct series of malicious activities such as distributed denial-of-service (DDoS) or virtual currencies mini... 详细信息
来源: 评论
Measurement and analysis of motor-noise in underwater glider
收藏 引用
IOP Conference Series: Earth and Environmental science 2021年 第1期725卷
作者: Qing Zhou Yihao Zhao Maofa Wang Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China No.36 Research Institute of CETC Jiaxing 314033 China Ocean Engineering Research Center Hangzhou Dianzi University Hangzhou 310018 China
Self-noise is a very disadvantageous factor for underwater glider to observe ocean ambient noise, in which the noise caused by motor is very significant. In order to grasp the characteristics of the motor-noise and it...
来源: 评论
Asymmetric parametric generation of images with nonlinear dielectric metasurfaces
arXiv
收藏 引用
arXiv 2021年
作者: Kruk, Sergey S. Wang, Lei Sain, Basudeb Dong, Zhaogang Yang, Joel Zentgraf, Thomas Kivshar, Yuri Department of Physics Paderborn University Paderborn33098 Germany Nonlinear Physics Center Research School of Physics Australian National University CanberraACT2601 Australia National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Singapore138634 Singapore Singapore University of Technology and Design Singapore487372 Singapore
Subwavelength dielectric resonators assembled into metasurfaces have become a versatile tool for miniaturising optical components approaching the nanoscale1-3. An important class of metasurface functionalities is asso... 详细信息
来源: 评论
Research on performance analysis and optimization methods of bistatic collaborative detection  13
Research on performance analysis and optimization methods of...
收藏 引用
13th ACM International Conference on Underwater Networks and Systems, WUWNet 2018
作者: Guo, Longxiang Zhou, Qing Liu, Ting Zou, Jiayun Sheng, Xueli Science and Technology on Communication Information Security Control Laboratory JiaxingZhejiang China College of Underwater Acoustic Engineering Acoustic Science and Technology Laboratory Harbin Engineering University HarbinHeilongjiang China
Compared with the monostatic sonar system, the bistatic sonar system has numerous advantages, such as being quick and flexible to deploy, utilizing strong concealment, and having a large detection range. The detection... 详细信息
来源: 评论
Wireless communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm
Wireless Communication Signal Strength Prediction Method Bas...
收藏 引用
2019国际计算机前沿大会
作者: Zhao Chen Ning Xiong Yujue Wang Yong Ding Hengkui Xiang Chenjun Tang Lingang Liu Xiuqing Zou Decun Luo Key Lab on Cognitive Radio and Information Processing School of Information and CommunicationGuilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information SecurityGuilin University of Electronic Technology
Existing interference protection systems lack automatic evaluation methods to provide scientific,objective and accurate assessment *** address this issue,this paper develops a layout scheme by geometrically modeling t...
来源: 评论
Using Reduced Graphene Oxide to Generate Q-Switched Pulses in Er-Doped Fiber Laser
收藏 引用
Chinese Physics Letters 2018年 第11期35卷 32-34页
作者: Lu Li Rui-Dong Lv Si-Cong Liu Zhen-Dong Chen Jiang Wang Yong-Gang Wang Wei Ren School of Science Xi'an University of Posts and TelecommunicationsXi'an 710121 School of Physics and information Technology Shaanxi Normal UniversityXi'an 710119 Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and TelecommunicationsXi'an 710121
Using the reduced graphene oxide(rGO) as a saturable absorber(SA) in an Er-doped fiber(EDF) laser cavity,we obtain the Q-switching operation. The rGO SA is prepared by depositing the GO on fluorine mica(FM) us... 详细信息
来源: 评论
A Dynamic Time Warping Based Wake-Up Signal Detection Method for Underwater Acoustic communication Networks  2
A Dynamic Time Warping Based Wake-Up Signal Detection Method...
收藏 引用
2nd IEEE Advanced information Management, Communicates, Electronic and Automation control Conference, IMCEC 2018
作者: Ma, Lu Fan, Cheng Sun, Wei Qiao, Gang Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China College of Underwater Acoustic Engineering Harbin Engineering University Harbin China
T400 conventional underwater acoustic (UWA) wakeup signals detection methods for both underwater cooperative nodes and non-cooperative nodes are FFT based signal detection and matched-filtered based signal detection. ... 详细信息
来源: 评论