咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security/Control Laboratory"
1449 条 记 录,以下是101-110 订阅
排序:
Cross-border Magnetic Induction Relay Cooperative communication Scheme Based on Distributed Space-time Coding
Cross-border Magnetic Induction Relay Cooperative Communicat...
收藏 引用
2022 IEEE International Conference on Signal Processing, communications and Computing, ICSPCC 2022
作者: Song, Weixin Zhang, Xin Ge, Yizhou Northwestern Polytechnical University School of Marine Science and Technology Xi'an China NO.36 Research Institute of Cetc Science and Technology On Communication Information Security Control Laboratory Jiaxing China
The application prospect of air-sea cross-border communication is broad. Magnetic induction (MI) communication can realize two-way cross-border transmission, adapt to complex marine environment and be easy to carry. T... 详细信息
来源: 评论
Non-stationary Interference Mitigation for GNSS Using Sparse Representation
Non-stationary Interference Mitigation for GNSS Using Spars...
收藏 引用
International Conference on Guidance, Navigation and control, ICGNC 2022
作者: Ren, Yuetao Zhi, Yongfeng Gao, Huan Zhang, Jun School of Automation Northwestern Polytechnical University Xi’an710072 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
Electromagnetic interference poses a threat to global navigation satellite systems (GNSS) used in various civilian applications. Sparse representation has been extensively studied for interference cancellation. Howeve... 详细信息
来源: 评论
A Quantum Temporal Difference Learning Method Based on Quantum World Model
A Quantum Temporal Difference Learning Method Based on Quant...
收藏 引用
2024 IEEE Global communications Conference, GLOBECOM 2024
作者: Zeng, Peigen He, Ying Yu, F. Richard Du, Jianbo Shenzhen University College of Computer Science and Software Engineering Shenzhen China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Carleton University School of Information Technology Ottawa Canada
Based on quantum parallelism theory and quantum phenomena such as superposition and entanglement, quantum reinforcement learning (QRL) has the potential to surpass classical reinforcement learning (RL). Although some ... 详细信息
来源: 评论
Simulation research on holographic modal wavefront sensing of atmospheric propagating laser  8
Simulation research on holographic modal wavefront sensing o...
收藏 引用
8th Symposium on Novel Photoelectronic Detection technology and Applications
作者: Li, Yuqing Cheng, Jingxin Yang, Haibo Ma, Wenchao Gu, Jianda Liu, Tongyu Science and Technology on Electro-Optical Information Security Control National Key Laboratory Tianjin300308 China
The disturbance of atmospheric turbulence during laser transmission is a major problem in the field of high-energy laser transmission and communication. Fast and real time wavefront sensing is one of the key technolog... 详细信息
来源: 评论
Blockchain-Assisted Electronic Medical Data-Sharing:Developments,Approaches and Perspectives
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 3421-3450页
作者: Chenquan Gan Xinghai Xiao Qingyi Zhu Deepak Kumar Jain Akanksha Saini School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Intelligent Control and Optimization for Industrial Equipment of Ministry of Education School of Artificial IntelligenceDalian University of TechnologyDalian116024China Symbiosis Institute of Technology Symbiosis International UniversityPune412115India College of Business and Law RMIT UniversityMelbourneVIC 3000Australia
Medical blockchain data-sharing is a technique that employs blockchain technology to facilitate the sharing of electronic medical *** blockchain is a decentralized digital ledger that ensures data-sharing security,tra... 详细信息
来源: 评论
First demonstration of an 8-node Mbps quantum access network based on passive optical distribution network facilities
First demonstration of an 8-node Mbps quantum access network...
收藏 引用
Frontiers in Optics + Laser science 2023, FiO, LS 203: Part of Frontiers in Optics + Laser science 2023
作者: Bian, Yiming Pan, Yan Ma, Li Wang, Heng Dou, Jiayi Pi, Yaodi Yang, Jie Li, Yang Huang, Wei Yu, Song Zhang, Yichen Xu, Bingjie State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
Quantum access network with 8 nodes and a secret key rate of over 6 Mbps per user is firstly demonstrated using passive optical distribution network facilities, paving the way of high-performance and scalable quantum-... 详细信息
来源: 评论
Experimental demonstration of 4-user quantum access network based on passive optical network  49
Experimental demonstration of 4-user quantum access network ...
收藏 引用
49th European Conference on Optical communications, ECOC 2023
作者: Pan, Yan Bian, Yiming Wang, Heng Dou, Jiayi Shao, Yun Pi, Yaodi Ye, Ting Yang, Jie, 2 Li, Yang Huang, Wei Yu, Song Zhang, Yichen Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China
A 4-user high-compatibility quantum access network using coherent states is experimentally demonstrated based on passive optical network. The achieved average secret key rate is around 4.1 Mbps between the transmitter... 详细信息
来源: 评论
Quantum Remote State Preparation Based on Quantum Network Coding
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 119-132页
作者: Zhen-Zhen Li Zi-Chen Li Yi-Ru Sun Haseeb Ahmad Gang Xu Xiu-Bo Chen School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Information Security Center State key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network *** this paper,a quantum remote state preparation scheme based on quantum network coding is *** with the... 详细信息
来源: 评论
Fair Incentive Allocation for Secure Data Sharing in Blockchain Systems: A Shapley Value Based Mechanism  3rd
Fair Incentive Allocation for Secure Data Sharing in Block...
收藏 引用
3rd International Conference on Autonomous Unmanned Systems, ICAUS 2023
作者: Yang, Ming Feng, Honglin Wang, Xin Jiao, Xuguo Wu, Xiaoming Qin, Shuwei Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Department of Public Security of Shandong Province Shandong Intelligent Public Security Joint Innovation Center Jinan China
In the contemporary era of information technology, the exponential surge in data has rendered colossal potential value, which would be fully unlocked through data circulation and sharing. However, when the data contai... 详细信息
来源: 评论
Unified and Complete Point Addition Formula for Elliptic Curves
收藏 引用
Chinese Journal of Electronics 2023年 第2期21卷 345-349页
作者: Lijun Zhang Kunpeng Wang Hong Wang Science and Technology on Communication Security Laboratory Chengdu China State Key Laboratory of Information Security GUCAS Beijing China
As is well known, the unified point addition formula is useful for resisting side channel attacks in elliptic curve cryptography. Furthermore, if the unified formula is complete, which means it is valid for any two po... 详细信息
来源: 评论