咨询与建议

限定检索结果

文献类型

  • 398 篇 会议
  • 197 篇 期刊文献

馆藏范围

  • 595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 200 篇 计算机科学与技术...
    • 161 篇 软件工程
    • 145 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 55 篇 电气工程
    • 45 篇 仪器科学与技术
    • 42 篇 控制科学与工程
    • 35 篇 光学工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 15 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 12 篇 建筑学
    • 11 篇 生物医学工程(可授...
  • 205 篇 理学
    • 106 篇 数学
    • 69 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 12 篇 training
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 10 篇 optimization
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...
  • 6 篇 school of comput...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 524 篇 英文
  • 44 篇 其他
  • 27 篇 中文
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
595 条 记 录,以下是71-80 订阅
Cross-border Magnetic Induction Relay Cooperative Communication Scheme Based on Distributed Space-time Coding
Cross-border Magnetic Induction Relay Cooperative Communicat...
收藏 引用
2022 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2022
作者: Song, Weixin Zhang, Xin Ge, Yizhou Northwestern Polytechnical University School of Marine Science and Technology Xi'an China NO.36 Research Institute of Cetc Science and Technology On Communication Information Security Control Laboratory Jiaxing China
The application prospect of air-sea cross-border communication is broad. Magnetic induction (MI) communication can realize two-way cross-border transmission, adapt to complex marine environment and be easy to carry. T... 详细信息
来源: 评论
An Optimal Beamforming Model for Aperture-Level Phased Array Full-Duplex  13
An Optimal Beamforming Model for Aperture-Level Phased Array...
收藏 引用
13th International Conference on Microwave and Millimeter Wave technology, ICMMT 2021
作者: Chen, Jiarui Chen, Shunyang Huang, Xiaoguo Zhang, Qi Zhu, Menglei Science And Technology On Communication Information Security Control Laboratory Jiaxing314033 China
Full-duplex, which aims to simultaneously transmitting and receiving over the same band, together with phased array antennas play fundamental roles in next-generation wireless communication systems. The combination of... 详细信息
来源: 评论
Cross-receiver specific emitter identification based on deep adversarial neural network with separated batch normalization  3
Cross-receiver specific emitter identification based on deep...
收藏 引用
3rd International Conference on Computer science and Communication technology, ICCSCT 2022
作者: Huang, Keju Jiang, Bin Yang, Junan Wang, Jian Hu, Pengjiang Li, Yiming Shao, Kun Zhao, Dongxing College of Electronic Engineering National University of Defense Technology Hunan Changsha China Science and Technology on Communication Information Security Control Laboratory Zhejiang Jiaxing314000 China
Specific emitter identification (SEI) is the approach to identify emitter individuals using received wireless signals. Despite the fact that deep learning has been successfully applied in SEI, the performance is still... 详细信息
来源: 评论
Mitigation of Non-stationary Jammings with Missing Samples for GNSS Using Sparse Representation
Mitigation of Non-stationary Jammings with Missing Samples f...
收藏 引用
2022 International Conference on Computer Engineering and Artificial Intelligence, ICCEAI 2022
作者: Ren, Yuetao Zhi, Yongfeng Zhang, Jun School of Automation Northwestern Polytechnical University Xi'an710072 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
Global navigation satellite systems (GNSS) are widely used in most civil and military applications. However, GNSS receivers suffer from severe performance degradation when jammed by electromagnetic interference. This ... 详细信息
来源: 评论
A Mixed Intrusion Detection System utilizing K-means and Extreme Gradient Boosting  2
A Mixed Intrusion Detection System utilizing K-means and Ext...
收藏 引用
2022 2nd International Conference on Communication technology and information technology, ICCTIT 2022
作者: Lv, Haifeng Ji, Xiaoyu Ding, Yong Guangxi Key Laboratory of Machine Vision and Intelligent Control WuZhou University Wuzhou China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Industry Software Technology Wuzhou University Wuzhou China
The intrusion detection system (IDS) plays an important part because it offers an efficient way to prevent and mitigate cyber attacks. Numerous deep learning methods for intrusion anomaly detection have been developed... 详细信息
来源: 评论
Enhancing privacy protection in intelligent and connected vehicles: a styleGAN3-based image desensitization dataset and framework  4
Enhancing privacy protection in intelligent and connected ve...
收藏 引用
4th International Conference on Advanced Algorithms and Neural Networks, AANN 2024
作者: Wang, Jingyan Wang, Liyong Ji, Haojie Fang, Junzhe Guo, Teng Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science & Technology University No.12 Xiaoying East Road Haidian District Beijing100192 China Zaozhuang Network Security Center No. 2621 Guangming Avenue Xuecheng District Shandong Province 277020 China
Intelligent and connected vehicles (ICVs) collect vast video footage, inadvertently capturing privacy-sensitive data. To address this, we introduce the IDD-ICV dataset, featuring diverse in-vehicle camera footage. To ... 详细信息
来源: 评论
Helmet wearing detection method based on lightweight YOLOv5  2
Helmet wearing detection method based on lightweight YOLOv5
收藏 引用
2nd International Conference on Electronic information technology, EIT 2023
作者: Wu, Chao Wang, De-Yong Shi, Wen-Xi Fang, Jian Zhao, Xueyi Fu, Yan-Yun School of Information Science and Engineering Xinjiang University Urumqi830000 China XinJiang Lianhai INA-INT Information Technology Co. Ltd Urumqi830000 China Key Laboratory of Big Data of Xinjiang Social Security Risk Prevention and Control Urumqi830000 China Beijing Academy of Science and Technology Beijing100035 China
A lightweight detection algorithm based on YOLOv5 is proposed to solve the problems that the target detection algorithm has many network parameters and the large size of the model is not conducive to the actual deploy... 详细信息
来源: 评论
Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method
收藏 引用
China Communications 2021年 第12期18卷 94-107页
作者: Shilian Zheng Linhui Ye Xuanye Wang Jinyin Chen Huaji Zhou Caiyi Lou Zhijin Zhao Xiaoniu Yang Science and Technology on Communication Information Security Control Laboratory Jiaxing314000China College of Information Engineering Zhejiang University of TechnologyHangzhou310012China Institute of Cyberspace Security Zhejiang University of TechnologyHangzhou310012China School of Communication Engineering Hangzhou Dianzi UniversityHangzhou310018China
The spectrum sensing model based on deep learning has achieved satisfying detection per-formence,but its robustness has not been *** this paper,we propose primary user adversarial attack(PUAA)to verify the robustness ... 详细信息
来源: 评论
New ultrashort pulsewidth measurement technology based on interference jitter and FPGA platform
收藏 引用
Chinese Optics Letters 2022年 第3期20卷 46-51页
作者: Jin Li Yanbo Dou Lixin Wang Jinhai Zou Yu Ding Hang Wang Qiujun Ruan Zhipeng Dong Zhengqian Luo Department of Electronic Engineering Xiamen UniversityXiamen 361005China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308China
Conventional ultrashort pulsewidth measurement technology is autocorrelation based on second-harmonic generation;however,nonlinear crystals and bulky components are required,which usually leads to the limited waveleng... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an710049 China Air Force Engineering University Air Traffic Control and Navigation College Xi’an710051 China Air Force Engineering University Information and Navigation College Xi’an710043 China Nanyang Technological University School of Electrical and Electronic Engineering 639798 Singapore Xidian University School of Computer Science and Technology Xi’an710126 China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论