咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security/Control Laboratory"
1470 条 记 录,以下是441-450 订阅
排序:
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou310023 China ZJUT Binjiang Institute of Artificial Intelligence Hangzhou310056 China Fudan University Adaptive Networks and Control Lab Department of Electronic Engineering School of Information Science and Technology Shanghai200433 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Shenzhen518066 China National Key Laboratory of Electromagnetic Space Security Jiaxing314033 China
Due to the decentralized and public nature of the blockchain ecosystem, malicious activities on the Ethereum platform impose immeasurable losses on users. At the same time, the transparency of cryptocurrency transacti... 详细信息
来源: 评论
Dunhuang murals image inpainting method based on fusion classification pre-training model
Dunhuang murals image inpainting method based on fusion clas...
收藏 引用
Culture-Oriented science and technology (CoST), International Conference on
作者: Hui Ren Chengya Zhang Ke Sun Chenyu Ye School of Information and Communication Engineering Communication University of China Beijing China Key Laboratory of Audiovisual Technology and Intelligent Control System Ministry of Culture and Tourism Beijing China Beijing Key Laboratory of Modern Performing Arts Technology Beijing China School of Engineering and Applied Science University of Pennsylvania PA USA
Murals are an important part of China’s cultural heritage. Because of their age, Dunhuang murals have suffered from discoloration, fading and damage. With the development of computer image restoration technology, dig... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Adaptive Event-triggered LFC for Switching Model of Power Systems With Markov Jump Under Hybrid Attacks
收藏 引用
International Journal of control, Automation and Systems 2025年 第6期23卷 1695-1707页
作者: Liu, Chuan Shi, Kaibo Cai, Xiao Zhu, Ming Yan, Huaicheng Kwon, Ohmin School of Information Science and Engineering Chengdu University Chengdu Sichuan China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Guangdong Key Laboratory of Industrial Control System Security and Huangpu Research School of Guangzhou University Guangzhou China School of Electronic Information and Electrical Engineering Chengdu University Chengdu Sichuan China School of Information Science and Engineering East China University of Science and Technology Shanghai China School of Electrical Engineering Chungbuk National University Cheongju Korea
This paper investigates the H∞ load frequency control (LFC) of power systems with an adaptive event-triggered mechanism (AETM) under hybrid cyber attacks, which include denial-of-service (DoS) attacks and deception a... 详细信息
来源: 评论
A Note on Basis of Lattice and Successive Minimal Vectors
SSRN
收藏 引用
SSRN 2024年
作者: Zhu, Chaoxi Zhao, Wei Zhao, Jianrong Zhou, Zhengchun National Key Laboratory of Security Communication Chengdu610041 China School of Economic Mathematics Southwestern University of Finance and Economics Chengdu610074 China School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China
Let L ∈ 2 be a lattice of 2-dimension. The conclusion "the shortest vector s1 (under the supremum norm) in L\{0} and the second shortest vector s2 (the shortest vector in L\{ns1|n ∈ }) form a base of L" is... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Multi-view infrared small target recognition based on YOLOv5
Multi-view infrared small target recognition based on YOLOv5
收藏 引用
Chinese Automation Congress (CAC)
作者: Hua Gong Shasha Liu Song Guan Kuaikuai Yu Fang Liu College of Science Shengyang Ligong University Shenyang China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjing China
In order to improve the recognition accuracy of small infrared targets in complex environment, a SyluInfrared dataset is built by taking multi-view infrared images with the Frock TiX600 infrared thermal imager. Seven ... 详细信息
来源: 评论
Direction Modulation Design for UAV Assisted by IRS with Discrete Phase Shift
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green communications and Networking 2025年
作者: Li, Maolin Gao, Wei Wu, Qi Shu, Feng Pan, Cunhua Wu, Di Hainan University School of Information and Communication Engineering Haikou570228 China Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai200240 China Beijing Jiaotong University State Key Laboratory of Rail Traffic Control and Safety Beijing100044 China Hainan University School of Information and Communication Engineering Collaborative Innovation Center of Information Technology Haikou570228 China Nanjing University of Science and Technology School of Electronic and Optical Engineering Nanjing210094 China Southeast University National Mobile Communications Research Laboratory China
As a physical layer security technology, directional modulation (DM) can be combined with intelligent reflect-ing surface (IRS) to improve the security of drone communications. In this paper, a directional modulation ... 详细信息
来源: 评论
Joint Computation Offloading and Resource Allocation for LEO Satellite Networks Using Hierarchical Multi-Agent Reinforcement Learning
收藏 引用
IEEE Transactions on Cognitive communications and Networking 2024年
作者: Lai, Junyu Liu, Huashuo Xu, Guoyao Jiang, Weiwei Wang, Xiong Jiang, Dingde University of Electronic Science and Technology of China School of Aeronautics and Astronautics China Aircraft Swarm Intelligent Sensing and Cooperative Control Key Laboratory of Sichuan Province Chengdu611731 China University of Electronic Science and Technology of China School of Aeronautics and Astronautics Chengdu611731 China Ministry of Education Key Laboratory of Universal Wireless Communications China Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing100876 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China
The integration of edge computing with LEO satellite broadband networks (LSBNs) offers a transformative potential, yet remains underexplored in the optimization of joint computation offloading and resource allocation ... 详细信息
来源: 评论
Infrared Target Detection Based on the Fusion of Mask R-CNN and Image Enhancement Network
Infrared Target Detection Based on the Fusion of Mask R-CNN ...
收藏 引用
Chinese Automation Congress (CAC)
作者: Fang Liu Song Guan Kuaikuai Yu Hua Gong College of Science Shengyang Ligong University Shenyang China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjing China
In this paper, we focus on the problem of the infrared image detection. Aiming at the problem of the low contrast of the infrared images, an adaptive gamma transformation algorithm (AGT) is established to intelligentl... 详细信息
来源: 评论