咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 194 篇 期刊文献

馆藏范围

  • 590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 199 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 147 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 56 篇 电气工程
    • 46 篇 仪器科学与技术
    • 43 篇 控制科学与工程
    • 37 篇 光学工程
    • 32 篇 生物工程
    • 30 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
  • 202 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 11 篇 training
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 optimization
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 551 篇 英文
  • 23 篇 中文
  • 16 篇 其他
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
590 条 记 录,以下是241-250 订阅
排序:
An Anti-jamming Intelligent Decision-Making Method for Multi-user Communication Based on Deep Reinforcement Learning
An Anti-jamming Intelligent Decision-Making Method for Multi...
收藏 引用
International Conference on Communication technology (ICCT)
作者: Lan Zhang Liang Ma Feng Tian Tianyi Liang Science and Technology on Communication Information Security Control Laboratory Jiaxing China The 36th Research Institution of China Electronics Technology Group Corporation Jiaxing China Nanjing University of Posts and Telecommunications Nanjing China
In order to effectively cope with the external malicious jamming from jammers and avoid mutual interference caused by competitive channels among users, an intelligent antijamming decision-making method based on deep r... 详细信息
来源: 评论
Passive Target Detection Based on GLRT Using Multi-satellite Illumination  3rd
Passive Target Detection Based on GLRT Using Multi-satellite...
收藏 引用
3rd EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2021
作者: Zhu, Huijie Liu, Mingqian Li, Ming Gao, Xiuhui Science and Technology on Communication Information Security Control Laboratory The 36th Research Institute of China Electronics Technology Group Corporation Jiaxing314033 China State Key Laboratory of Integrated Service Networks Xidian University Shaanxi Xi’an710071 China State 722 Factory Guangxi Guilin541001 China
This paper proposes a novel passive location parameter estimator using multiple satellites for moving aerial targets. Specifically, we consider target detection in the ground dual receiver system, which is divided int... 详细信息
来源: 评论
Passive Target Detection Based on Rao Using Multi-satellite Illumination  3rd
Passive Target Detection Based on Rao Using Multi-satellite ...
收藏 引用
3rd EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2021
作者: Zhu, Huijie Liu, Mingqian Li, Ming Gao, Xiuhui Science and Technology on Communication Information Security Control Laboratory The 36th Research Institute of China Electronics Technology Group Corporation Jiaxing314033 China State Key Laboratory of Integrated Service Networks Xidian University Shaanxi Xi’an710071 China State 722 Factory Guangxi Guilin541001 China
In this paper, hypotheses of target detection features is proposed when constructing the signal model. Under this condition, the Rao detection method is extended to weak echo signal detection using multi-satellite ill... 详细信息
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China The Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China The Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Jiwei Shen, Chao Wang, Buhong Xia, Xiaofang Zhang, Meng Lin, Chenhao Li, Qian Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China Air Traffic Control and Navigation College Air Force Engineering University Xi’an China Information and Navigation College Air Force Engineering University Xi’an China School of Computer Science and Technology Xidian University Xi’an China
—Deep learning methods can not only detect false data injection attacks (FDIA) but also locate attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep learning vulnerabilities have be... 详细信息
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
Driving Performance Analysis for Connected Vehicle Platoons: Velocity Perturbation and Fuel Consumption
Driving Performance Analysis for Connected Vehicle Platoons:...
收藏 引用
IEEE International Conference on Unmanned Systems (ICUS)
作者: Yihan Zhao Xuting Duan Jianshan Zhou Long Zhang State Key Lab of Intelligent Transportation System Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University Beijing China State Key Lab of Intelligent Transportation System Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control Zhongguancun Laboratory School of Transportation Science and Engineering Beihang University Beijing China National Key Laboratory of Science and Technology on Information System Security Institute of Systems Engineering Beijing China
Vehicle platoon is one of the concrete manifestations of multi-vehicle cooperative control and intelligent transportation. However, the velocity perturbation in the driving process will bring about stability and safet...
来源: 评论
Contrast enhancement of optical videoscope images
收藏 引用
Iran Journal of Computer science 2023年 第3期6卷 261-275页
作者: Ammar, Reda Aboshosha, Sahar El-Hag, Noha A. Saifeldeen, Reda El-Shafai, Walid El-Banby, Ghada M. Ashiba, Huda I. Khalaf, Ashraf A. M. Elazm, Atef Abou El-Rabaie, El-Sayed M. Abd El-Samie, Fathi E. El-Safrawey, Amir Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Department of Electronics and Electrical Comm. Faculty of Engineering Minia University Minya Egypt Department of Management of Information Systems Higher Institute of Commercial Science El-Mahala El-Kobra Egypt Department of Industrial Electronics and Control Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Department of Electronics and Electrical Communications Engineering Bilbis Higher Institute of Engineering Sharqia Bilbis Egypt Security Engineering Laboratory Computer Science Department Prince Sultan University Riyadh 11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh 11671 Saudi Arabia
The videoscope (VS) images have poor quality and low contrast. Hence, in this paper, three proposed frameworks to improve the quality of VS images are presented. The first framework depends on contrast-limited adaptiv... 详细信息
来源: 评论
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory
Analysis of Attack Effectiveness Evaluation of AD hoc Networ...
收藏 引用
International Conference on Computational Intelligence and security
作者: Jiahao Dai Yongqun Chen Science and Technology on Communication Information Security Control Laboratory China Electronic Corporation NO.36 Institute Jiaxing China
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a... 详细信息
来源: 评论
Adaptive ELM-Based Time-Constrained control of Uncertain Robotic Manipulators With Minimum Learning Computation
收藏 引用
IEEE Transactions on Emerging Topics in Computing 2025年
作者: Jin, Xiaozheng Hou, Yuhan Wu, Xiaoming Chi, Jing Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Jinan250013 China Qilu Institute of Technology School of Intelligent Manufacturing and Control Engineering Shandong Jinan250200 China Shandong University of Finance and Economics School of Computing and Artificial Intelligence Shandong Jinan250014 China
This paper studies the extreme learning machine (ELM)-based time-constrained trajectory tracking control of a class of robotic manipulator systems with model/input uncertainties, matched and mismatched disturbances. A... 详细信息
来源: 评论