咨询与建议

限定检索结果

文献类型

  • 399 篇 会议
  • 197 篇 期刊文献

馆藏范围

  • 596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 396 篇 工学
    • 202 篇 计算机科学与技术...
    • 161 篇 软件工程
    • 146 篇 信息与通信工程
    • 112 篇 电子科学与技术(可...
    • 56 篇 电气工程
    • 46 篇 仪器科学与技术
    • 45 篇 控制科学与工程
    • 36 篇 光学工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 动力工程及工程热...
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
  • 203 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 19 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 12 篇 training
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 10 篇 optimization
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 546 篇 英文
  • 25 篇 其他
  • 25 篇 中文
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
596 条 记 录,以下是591-600 订阅
排序:
A model checking approach for solving epistemic riddles
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2010年 第3期33卷 406-413页
作者: Luo, Xiang-Yu Su, Kai-Le Gu, Ming Key Laboratory of Security for Information System of Ministry of Education School of Software Tsinghua University Beijing 100084 China School of Computer and Control Guilin University of Electronic Technology Guilin Guangxi 541004 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
This paper aims to model and solve the Sum and Product Riddle in public announcement logic. A dynamic epistemic model is proposed, that is the linear temporal combination of the epistemic model of environment and the ... 详细信息
来源: 评论
Threshold Quantum Secret Sharing of Secure Direct Communication
收藏 引用
Chinese Physics Letters 2009年 第1期26卷 21-24页
作者: 李宝奎 杨宇光 温巧燕 Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 College of Computer Science and Technology Beijing University of Technology Beijing 100124 State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71... 详细信息
来源: 评论
A new wireless mesh network authentication scheme based on threshold method
A new wireless mesh network authentication scheme based on t...
收藏 引用
9th International Conference for Young Computer Scientists, ICYCS 2008
作者: YataoYang Gu, Yonghao Tan, Xi Lina, Ma. Beijing Electronic Science and Technology Institute Beijing 100070 China Information Security Center Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Beijing 100876 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
Access authentication is one of the secure issues which are eager to be resolved in wireless mesh networking. This paper proposes new wireless mesh network authentication architecture based on threshold signature tech... 详细信息
来源: 评论
Research on Restraining Low Frequency Oscillation with Flywheel Energy Storage System
Research on Restraining Low Frequency Oscillation with Flywh...
收藏 引用
International Conference on Power System technology (POWERCON)
作者: Yun Zhong Jiancheng Zhang Gengyin Li Zhiyuan Chen School of Information Engineering University of Nanchang Baoding Jiangxi China Department of Electrical power Engineering North China Electric Power University Baoding Hebei China Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control under Ministry of Education North China Electric Power University Baoding Hebei China Baoding Zhongli Power Science and Technology Development Company Limited Baoding Hebei China
Low frequency oscillations in the interconnected power systems are observed all around the world. Besides conventional PSS to suppress Low frequency oscillation, there are other modern FACTS devices to damp oscillatio... 详细信息
来源: 评论
Weight hierarchies of extremal non-chain ternary codes of dimension 4
Weight hierarchies of extremal non-chain ternary codes of di...
收藏 引用
IEEE International Symposium on information Theory
作者: Wende Chen T. Klove Laboratory of Systems and Control Institute of Systems Science Academy of Mathematics and Systems Science Chinese Academy of Sciences China Key State Laboratory of Information Security Graduate School of Academia Sinica Chinese Academy and Sciences Beijing China Department of Informatics Bergen High Technology Center University of Bergen Bergen Norway
The weight hierarchy of a linear [n,k;q] code C over GF(q) is the sequence (d/sub 1/,d/sub 2/,...,d/sub k/) where d/sub r/ is the smallest support of an r-dimensional subcode of C. An [n,k;q] code is extremal non-chai... 详细信息
来源: 评论
IBAQ: Frequency-Domain Backdoor Attack Threatening Autonomous Driving via Quadratic Phase
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Jinghan Qiu Honglong Chen Junjian Li Yudong Gao Junwei Li Xingang Wang College of Control Science and Engineering China University of Petroleum China the Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a... 详细信息
来源: 评论