咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security/Control Laboratory"
1470 条 记 录,以下是391-400 订阅
排序:
MGTN: Multi-scale Graph Transformer Network for 3D Point Cloud Semantic Segmentation
MGTN: Multi-scale Graph Transformer Network for 3D Point Clo...
收藏 引用
IEEE Visual communications and Image Processing (VCIP)
作者: Da Ai Siyu Qin Zihe Nie Hui Yuan Ying Liu Xi’an Key Laboratory of Image Processing Technology and Applications for Public Security Xi’an University of Posts and Telecommunications Xi’an China School of Communication and Information Engineering Xi’an University of Posts and Telecommunications Xi’an China School of Control Science and Engineering Shandong University Jinan China
The structural similarity of point clouds presents challenges in accurately recognizing and segmenting semantic information at the demarcation points of complex scenes or objects. In this study, we propose a multi-sca... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
A Lower Bound on the Third-Order Nonlinearity of the Simplest $Mathcal{Ps}_ap$ Bent Functions
SSRN
收藏 引用
SSRN 2023年
作者: Li, Zhaole Shen, Bing Tang, Deng School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China Science and Technology on Communication Security Laboratory Institute of Southwest Communication Research Sichuan Chengdu610041 China
Boolean functions used in symmetric-key encryption should have high higher-order nonlinearity to resist several known attacks, such as algebraic attack and low-degree approximation. The higher-order nonlinearity also ... 详细信息
来源: 评论
controllable Asymmetric Attack Against Practical Round-Trip Fiber Time Synchronization System
Controllable Asymmetric Attack Against Practical Round-Trip ...
收藏 引用
IEEE International Frequency control Symposium
作者: Xuesong Xu Yiming Bian Jinlong Hu Jiayi Dou Yang Li Bingjie Xu Yichen Zhang Song Yu Hong Guo School of Electronic Engineering Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu China School of Electronics and Center for Quantum Information Technology State Key Laboratory of Advanced Optical Communication Systems and Networks Peking University Beijing China
Using optical fiber links to transmit time information is widely regarded as an accurate and secure time synchronization scheme. However, the accuracy of the round-trip time synchronization system can be manipulated a...
来源: 评论
Identifying driver genes in cancer based on Pareto optimality consensus
Identifying driver genes in cancer based on Pareto optimalit...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Deng, Zheng Wu, Jingli Chen, Xiaorong Li, Gaoshi Guangxi Normal University College of Computer Science Information Technology Guilin China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Wuzhou University Guangxi Key Laboratory of Machine Vision Intelligent Control Wuzhou China
An important issue in cancer genomics is the identification of driver genes. It is significant for the discovery of key biomarkers and the development of effective personalized therapies. In this paper, a computated m... 详细信息
来源: 评论
A Practical Quantum Network Coding Protocol Based on Non-Maximally Entangled State
收藏 引用
Computers, Materials & Continua 2021年 第8期68卷 2651-2663页
作者: Zhen-Zhen Li Zi-Chen Li Xiu-Bo Chen Zhiguo Qu Xiaojun Wang Haizhu Pan School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and TechnologyNanjing210044China School of Electronic Engineering Dublin City UniversityDublin9Ireland College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China
In many earlier works,perfect quantum state transmission over the butterfly network can be achieved via quantum network coding protocols with the assist of maximally entangled ***,in actual quantum networks,a maximall... 详细信息
来源: 评论
Multi-Antenna Covert communications with a BPP Field of Wardens
Multi-Antenna Covert Communications with a BPP Field of Ward...
收藏 引用
Ubiquitous communication (Ucom), International Conference on
作者: Hangmei Rao Shihao Yan Jianquan Wang Xi Peng Sa Xiao Wanbin Tang School of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China School of Science and Security Research Institute Edith Cowan University Perth WA Australia The National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China Chengdu China
This paper considers a multi-antenna jamming to facilitate covert communications with multiple wardens. Specif-ically, the jammer generates artificial noise (AN) with random power to deliberately create interference t... 详细信息
来源: 评论
Phase Retrieval by Tensor Total Least Squares
Phase Retrieval by Tensor Total Least Squares
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiani Liu Ce Zhu Yang Chen Xiaolin Huang Yipeng Liu School of Information and Communication Engineering University of Electronic Science and Technology of China (UESTC) Chengdu China Department of Automation The MOE Key Laboratory of System Control and Information Processing Shanghai Jiao Tong University Shanghai China
Phase retrieval seeks to reconstruct a series of image sequences from measurements that only capture their magnitudes. Current approaches either flatten and stack the image sequences, disregarding their multidimension...
来源: 评论
Mitigating Receiver Impact on Radio Frequency Fingerprint Identification via Domain Adaptation
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Liu Li, Qiang Ren, Xiaoyang Fang, Yi Wang, Shafei School of Information and Communication Engineering University of Electronic Science and Technology of China P. Chengdu611731 China Laboratory of Electromagnetic Space Cognition and Intelligent Control Beijing100083 China
Radio Frequency Fingerprint Identification (RFFI), which exploits non-ideal hardware-induced unique distortion resident in the transmit signals to identify an emitter, is emerging as a means to enhance the security of... 详细信息
来源: 评论
Stretchable and self-healable spoof plasmonic meta-waveguide for wearable wireless communication system
收藏 引用
Light(science & Applications) 2022年 第11期11卷 2725-2737页
作者: Bu-Yun Yu De-Wei Yue Ke-Xin Hou Lu JU Hao Chen Cong Ding Zhen-Guo Liu Yun-Qian Dai Hari Krishna Bisoyi Ying-Shi Guan Wei-Bing Lu Cheng-Hui Li Quan Li State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast UniversityNanjing 210096China Center for Flexible RF Technology Frontiers Science Center for Mobile Information Communication and SecuritySoutheast UniversityNanjing 210096China Purple Mountain Laboratories Nanjing 21111China State Key Laboratory of Coordination Chemistry School of Chemistry and Chemical EngineeringNanjing UniversityNanjing 210023China Institute of Advanced Materials and School of Chemistry and Chemical Engineering Southeast UniversityNanjing 211189China Advanced Materials and Liquid Crystal Institute and Chemical Physics Interdisciplinary Program Kent State UniversityKentOH 44242USA
Microwave transmission lines in wearable systems are easily damaged after frequent mechanical deformation,posing a severe threat to wireless ***,we report a new strategy to achieve stretchable microwave transmission l... 详细信息
来源: 评论