咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,452 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 951 篇 工学
    • 520 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 82 篇 光学工程
    • 78 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 566 篇 理学
    • 285 篇 数学
    • 210 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 28 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 20 篇 security
  • 20 篇 heuristic algori...
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,251 篇 英文
  • 162 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security/Control Laboratory"
1452 条 记 录,以下是161-170 订阅
排序:
Interval Type-2 Fuzzy Hierarchical Adaptive Cruise Following-control for Intelligent Vehicles
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第9期9卷 1658-1672页
作者: Hong Mo Yinghui Meng Fei-Yue Wang Dongrui Wu the College of Electric and Information Engineering Changsha University of Science and TechnologyChangsha 410114China the State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190 Qingdao Academy of Intelligent Industries Qingda 266109 the Center of China Economic and Social Security University of Chinese Academy of SciencesBeijing 100190China the Ministry of Education Key Laboratory on Image Information Processing and Intelligent Control the School of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China
Intelligent vehicles can effectively improve traffic congestion and road traffic *** cruise followingcontrol(ACFC)is a vital part of intelligent *** this paper,a new hierarchical vehicle-following control strategy is ... 详细信息
来源: 评论
Infrared Target Detection Based on the Fusion of Mask R-CNN and Image Enhancement Network
Infrared Target Detection Based on the Fusion of Mask R-CNN ...
收藏 引用
2022 Chinese Automation Congress, CAC 2022
作者: Liu, Fang Guan, Song Yu, Kuaikuai Gong, Hua Shengyang Ligong University College of Science Shenyang110159 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjing300308 China
In this paper, we focus on the problem of the infrared image detection. Aiming at the problem of the low contrast of the infrared images, an adaptive gamma transformation algorithm (AGT) is established to intelligentl... 详细信息
来源: 评论
A Passive Navigation Algorithm Based on Derivative Dynamic Time Regularization Geomagnetic Matching  2
A Passive Navigation Algorithm Based on Derivative Dynamic T...
收藏 引用
2021 2nd International Conference on Modeling, Big Data Analytics and Simulation, MBDAS 2021
作者: Wang, Yiteng Bao, Jinhong Li, Zehua Science and Technology on Communication Information Security Control Laboratory China No.36 Research Institute of China Electronics Technology Group Corporation China College of Telecommunication Engineering Hangzhou Dianzi University Hangzhou310018 China
As satellite positioning has shortcomings such as susceptibility to multipath interference, we look forward to using a new algorithm to solve these problems. The method of derivative dynamic time regularization is use... 详细信息
来源: 评论
Prompt and Contrastive Learning for Few-shot Sentiment Classification  5
Prompt and Contrastive Learning for Few-shot Sentiment Class...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Wang, Fei Chen, Long Huang, Xiaohua Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ... 详细信息
来源: 评论
News-driven financial warning based on label information attention  5
News-driven financial warning based on label information att...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Zhilin, Ren Long, Chen Xiaohua, Huang Wenjing, Wang Cai, Xu Wei, Zhao Ziyu, Guan Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Most existing news-driven stock market prediction methods ignore the potential relationship between financial news and stocks. The complex relationship can help us to improve the accuracy of algorithmic trading system... 详细信息
来源: 评论
Rotational random extraction of Toeplitz matrix for ghost imaging  4
Rotational random extraction of Toeplitz matrix for ghost im...
收藏 引用
4th International Conference on Optoelectronic science and Materials, ICOSM 2022
作者: Cheng, Zhengdong Sun, Maosheng Chen, Yi Chang, Haikuan Liu, Yanyan State Key Laboratory of Pulsed Power Laser Technology National University of Defense Technology Huangshan Road No.460 HeFei230037 China Science and Technology on Electro-Optical Information Security Control Laboratory Weiwu Road No.9 Tianjin300450 China
If Toeplitz matrix is used for compression-aware ghost imaging, the imaging quality will be very low. In order to solve the problem, a new experimental scheme for ghost imaging is proposed in this paper. The scheme fi... 详细信息
来源: 评论
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory  17
Analysis of Attack Effectiveness Evaluation of AD hoc Networ...
收藏 引用
17th International Conference on Computational Intelligence and security, CIS 2021
作者: Dai, Jiahao Chen, Yongqun China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a... 详细信息
来源: 评论
Direct Position Determination in the Presence of Direction-Dependent Mutual Coupling Using a Moving Array  34
Direct Position Determination in the Presence of Direction-D...
收藏 引用
34th General Assembly and Scientific Symposium of the International Union of Radio science, URSI GASS 2021
作者: Ma, Fei Wang, Yuexian Wang, Ling Gong, Yanyun School of Electronics and Information Northwestern Polytechnical University Xi'an China The Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In this paper, a new approach without iteration is proposed for direct position determination (DPD) with Doppler shifts in the presence of unknown direction-dependent mutual coupling (DDMC). The special banded symmetr... 详细信息
来源: 评论
The differential fault analysis on block cipher FeW
收藏 引用
Cybersecurity 2023年 第2期6卷 62-74页
作者: Haiyan Xiao Lifang Wang Jinyong Chang School of Computer Science Northwestern Polytechnical UniversityXiAn 710055People's Republic of China Engineering University of PAP XiAn 710055People's Republic of China School of Information and Control Engineering XiAn University of Architecture and TechnologyXi'An 710055People's Republic of China State Key Laboratory of Information Security(SKLOIS) Institute of Information EngineeringChinese Academy of SciencesBeijing 100089People's Republic of China
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achi... 详细信息
来源: 评论
An analysis of network traffic identification based on decision tree  2
An analysis of network traffic identification based on decis...
收藏 引用
2nd International Conference on Artificial Intelligence and Electromechanical Automation, AIEA 2021
作者: Dai, Jiahao Chen, Yongqun Chen, Yucheng Meng, Aodong China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio... 详细信息
来源: 评论