咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 194 篇 期刊文献

馆藏范围

  • 590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 199 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 147 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 56 篇 电气工程
    • 46 篇 仪器科学与技术
    • 43 篇 控制科学与工程
    • 37 篇 光学工程
    • 32 篇 生物工程
    • 30 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
  • 202 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 11 篇 training
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 optimization
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 551 篇 英文
  • 23 篇 中文
  • 16 篇 其他
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
590 条 记 录,以下是161-170 订阅
排序:
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms
收藏 引用
Computer Systems science & Engineering 2022年 第10期43卷 87-102页
作者: Safaa El-Gazar Walid El-Shafai Ghada El-Banby Hesham F.A.Hamed Gerges M.Salama Mohammed Abd-Elnaby Fathi E.Abd El-Samie Department of Electrical Engineering Faculty of EngineeringEgyptian-Russian UniversityCairoEgypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in it... 详细信息
来源: 评论
OpenPose Based Posture Analysis of Basketball Players
OpenPose Based Posture Analysis of Basketball Players
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xiao Liang Zhou De Yong Wang Xin Li School of Information Science and Engineering Xinjiang University Urumqi Xinjiang China XinJiang Lianhai INA-INT Information Technology Co. Ltd Key Laboratory of Big Data of Xinjiang Social Security Risk Prevention and Control
Human pose estimation has a wide range of applications in the field of computer vision, especially in sports event analysis where its importance is increasingly prominent. This study aims to optimize the basketball pl...
来源: 评论
A Robust and Scalable One-PUF-to-Many Authentication and Key Agreement Scheme for Mobile Communication Network
A Robust and Scalable One-PUF-to-Many Authentication and Key...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Yiteng Wang Zhe Ren Wei Wang Science and Technology on Communication Information Security Control Laboratory The 36th Research Institute of China Electronics Technology Group Corporation Jia'xing China School of Cyber Engineering Xidian University Xi'an China
Under the multi-cloud environment of mobile communication networks, unattended terminals would possibly be involved in different tasks. For the network security, terminals should be authenticated by cloud service prov...
来源: 评论
A Generic Layer Pruning Method for Signal Modulation Recognition Deep Learning Models
arXiv
收藏 引用
arXiv 2024年
作者: Lu, Yao Zhu, Yutao Li, Yuqi Xu, Dongwei Lin, Yun Xuan, Qi Yang, Xiaoniu The Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou China The Binjiang Institute of Artificial Intelligence Zhejiang University of Technology Hangzhou310056 China The Institute of Computing Technology Chinese Academy of Sciences Beijing China The College of Information and Communication Engineering Harbin Engineering University Harbin China The PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518000 China Utron Technology Company Ltd. Hangzhou310056 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing China
—With the successful application of deep learning in communications systems, deep neural networks are becoming the preferred method for signal classification. Although these models yield impressive results, they ofte... 详细信息
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论
Signals of Opportunity Navigation Using LTE Downlink Signals
Signals of Opportunity Navigation Using LTE Downlink Signals
收藏 引用
International Conference on Communication technology (ICCT)
作者: Yiteng Wang Huijie Zhu Tianyi Liang Jiachuan Qian Science and Technology on Communication Information Security Control Laboratory The 36th Research Institute of China Electronics Technology Group Corporation Jiaxing China
For the global navigation satellite system (GNSS) cannot meet the positioning requirements under occlusion or malicious interference, this paper proposes a receiver self-localization method using long-term evolution (... 详细信息
来源: 评论
High Altitude Platforms-Assisted Hierarchical Computing Offloading in Marine-IoT Networks: A Delay Minimization Approach
High Altitude Platforms-Assisted Hierarchical Computing Offl...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Mingqing Li Li Ping Qian Qianru Wang Yuan Wu Bin Lin Xiaoniu Yang College of Information Engineering Zhejiang University of Technology Hangzhou Zhejiang China Zhuhai UM Science and Technology Research Institute Zhuhai China Department of Computer and Information Science University of Macau Macao SAR China State Key Laboratory of Internet of Things for Smart City University of Macau Macao SAR China Department of Communication Engineering Dalian Maritime University Dalian China Science and Technology on Communication Information Security Control Laboratory Jiaxing China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou China
Mobile edge computing has been a promising technology that enables diverse applications of computation-intensive yet latency-sensitive in marine Internet of Things networks. In this paper, we propose a framework of hi...
来源: 评论
Leakages Estimation in RF-SIC System Based on Software Defined Radio
Leakages Estimation in RF-SIC System Based on Software Defin...
收藏 引用
International Conference on Microwave and Millimeter Wave technology Proceedings
作者: Yimeng Sun Qianyin Xiang Xiaoguo Huang Dinghong Jia Quanyuan Feng School of Information Science and Technology Southwest Jiaotong University Chengdu China Science and Technology on Communication Information Security /Control Laboratory Jiaxing China The 41st Institute of CETC Qingdao China
The paper realizes the estimation of the vector characteristics of the circulator leakage channel for in-band full-duplex self-interference cancellation system based on software defined radio technique. The magnitude ... 详细信息
来源: 评论
An Analysis of Routing Simulation technology of Unmanned Cluster Based on OPNET  1
收藏 引用
3rd EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2021
作者: Dai, Jiahao Wang, Yuhui Zhu, Huijie Ren, Yongji Science and Technology on Communication Information Security Control Laboratory Harbin China China Electronic Corporation NO. 36 Institute Zhejiang Jiaxing China Naval Aviation University Changzhi China
The military strategic guideline under the new situation points out that the base point of future war preparation is to win the informationized war mainly from the direction of unmanned cluster. Routing protocol is an... 详细信息
来源: 评论
Geometric Dilution of Precision for Far-Distance TDOA Location of Shortwave  2
Geometric Dilution of Precision for Far-Distance TDOA Locati...
收藏 引用
2nd information Communication Technologies Conference, ICTC 2021
作者: Yang, Xin Ye, Yun-Xia No.36 Research Institute of Cetc Jiaxing Zhejiang China No.36 Research Institute of Cetc Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China
A method of time difference of arrival (TDOA) location for shortwave signal source by four receiving stations is introduced. The precision of time difference and the Geometric Dilution of Precision (GDOP) of TDOA loca... 详细信息
来源: 评论