咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 193 篇 期刊文献

馆藏范围

  • 589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 392 篇 工学
    • 199 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 146 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 55 篇 电气工程
    • 45 篇 仪器科学与技术
    • 42 篇 控制科学与工程
    • 36 篇 光学工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
  • 202 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 12 篇 training
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 optimization
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 550 篇 英文
  • 23 篇 中文
  • 16 篇 其他
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
589 条 记 录,以下是251-260 订阅
排序:
Sparse Prior Is Not All You Need: When Differential Directionality Meets Saliency Coherence for Infrared Small Target Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Fei Fu, Maixia Qian, Yulei Yang, Jian Dai, Yimian Ministry of Education Henan Key Laboratory of Grain Photoelectric Detection and Control Henan University of Technology Zhengzhou China Nanjing Marine Radar Institute Nanjing China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Infrared small target detection is crucial for the efficacy of infrared search and tracking systems. Current tensor decomposition methods emphasize representing small targets with sparsity but struggle to separate tar... 详细信息
来源: 评论
Improved GNSS-IR height measurement method based on locally weighted regression
Improved GNSS-IR height measurement method based on locally ...
收藏 引用
9th International Symposium on Test Automation & Instrumentation (ISTAI 2022)
作者: Z. Luo J. Shang F. Li R. Pang Y. Wang College of Telecommunication Engineering Hangzhou Dianzi University Hangzhou 310018 People's Republic of China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 People's Republic of China
Global Navigation Satellite System Interferometric reflectance measurement (GNSS-IR) is a new remote sensing technology which uses satellite reflectance signals for monitoring. Aiming at the problems that the current ... 详细信息
来源: 评论
Cognitive Method Discussion on Communication Jamming Intelligent Decision  2020
Cognitive Method Discussion on Communication Jamming Intelli...
收藏 引用
2020 International Conference on Aviation Safety and information technology, ICASIT 2020
作者: Jin, Hu Shen, Weiguo Zhao, Fan Science and Technology on Communication Information Security Control Laboratory Research Institute Jiaxing China Electronic Countermeasure Institute National University of Defense Technology Hefei China
The application of reconfigurable, programmable and cognitive radio technologies in communication systems has put forward new requirements for communication jamming decision. In this paper, the overall scheme of cogni... 详细信息
来源: 评论
SAR Image Processing and Target Detection Based on 2D Singularity Power Spectrum in Time-frequency Domain  5
SAR Image Processing and Target Detection Based on 2D Singul...
收藏 引用
5th IEEE International Conference on Signal and Image Processing, ICSIP 2020
作者: Li, Junye Xiong, Gang Huang, Baigang Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
A method for SAR image processing and target detection based on two-dimensional singularity power spectrum (2D-SPS) in time-frequency domain is proposed in this paper. Firstly, the two-dimensional pseudo Wigner-Ville ... 详细信息
来源: 评论
Reconfigurable Metagrating Enabled by Shape Memory Polymers
Reconfigurable Metagrating Enabled by Shape Memory Polymers
收藏 引用
IEEE MTT-S International Microwave Workshop Series on Advanced Materials and Processes for RF and THz Applications (IMWS-AMP)
作者: Sidi Wang Kai Feng Jianjia Yi Key Laboratory of Integrated Services Network Xidian University Xi’an China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China School of Information and Communications Engineering Xi’an Jiaotong University Xi’an China State Key Laboratory of Millimeter Waves Southeast University Nanjing China
We propose and demonstrate a shape-controlled metagrating with adjustable energy distribution based on shape memory Polymers (SMPs). The design consists of a capacitance printed on the top of the FR4 substrate, SMPs s... 详细信息
来源: 评论
A Long Synthetic Aperture Passive Localization Method Using Two Planes
A Long Synthetic Aperture Passive Localization Method Using ...
收藏 引用
IEEE International Conference on Radar
作者: Bowei Chen Yuqi Wang Guang-Cai Sun Mengdao Xing Zijing Zhang Xiaoniu Yang National Laboratory of Radar Signal Processing Xidian University Xi'an China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
A long synthetic aperture passive localization algorithm is proposed in this paper. First of all, the Doppler change rate of signal can be measured by the image contrast and then, grid points are divided within the ma... 详细信息
来源: 评论
A code clone detection algorithm based on graph convolution network with AST tree edge
A code clone detection algorithm based on graph convolution ...
收藏 引用
IEEE International Conference on Software Quality, Reliability and security Companion (QRS-C)
作者: Zhicheng Lu Ruochen Li Huamiao Hu Wen-an Zhou Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China
Detecting code cloning will prevent it from bringing risks such as vulnerabilities and intellectual property disputes in complex software systems such as large-scale defense software systems and commercial software sy... 详细信息
来源: 评论
RSAFormer: A method of polyp segmentation with region self-attention transformer
收藏 引用
Computers in Biology and Medicine 2024年 172卷 108268-108268页
作者: Yin, Xuehui Zeng, Jun Hou, Tianxiao Tang, Chao Gan, Chenquan Jain, Deepak Kumar García, Salvador School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Intelligent Control and Optimization for Industrial Equipment of Ministry of Education Dalian University of Technology Dalian116024 China Symbiosis Institute of Technology Symbiosis International University Pune412115 India Department of Computer Science and Artificial Intelligence Andalusian Research Institute in Data Science and Computational Intelligence University of Granada Granada18071 Spain
Colonoscopy has attached great importance to early screening and clinical diagnosis of colon cancer. It remains a challenging task to achieve fine segmentation of polyps. However, existing State-of-the-art models stil... 详细信息
来源: 评论
Feasibility Analysis of Tactical Radio Station Communication Behaviors Cognition
Feasibility Analysis of Tactical Radio Station Communication...
收藏 引用
Communications technology and Computer science (ACCTCS), Asia-Pacific Conference on
作者: Huaji Zhou Lifeng Yang Zilong Wu Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Electronic Countermeasures National University of Defense Technology Hefei China
In the field of electronic countermeasures, it is extremely difficult to effectively identify communication behaviors of tactical radio station by analyzing communication protocols of the non-cooperative organization.... 详细信息
来源: 评论
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China Shenzhen518066 China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518000 China Utron Technology Company Ltd. Hangzhou310056 China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Due to the decentralized and public nature of the Blockchain ecosystem, the malicious activities on the Ethereum platform impose immeasurable losses for the users. Existing phishing scam detection methods mostly rely ... 详细信息
来源: 评论