咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security/Control Laboratory"
1470 条 记 录,以下是451-460 订阅
排序:
Semi-LDPC Convolutional Codes:Construction and Low-Latency Windowed List Decoding
收藏 引用
Journal of communications and information Networks 2021年 第4期6卷 411-419页
作者: Qianfan Wang Suihua Cai Li Chen Xiao Ma School of Electronics and Communication Engineering Sun Yat-sen UniversityGuangzhou 510006China School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 510006China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen UniversityGuangzhou 510006China School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China
This paper presents a new coding scheme called semi-low-density parity-check convolutional code(semi-LDPC-CC),whose parity-check matrix consists of both sparse and dense sub-matrices,a feature distinguished from the c... 详细信息
来源: 评论
IoT ETEI: End-to-End IoT Device Identification Method
IoT ETEI: End-to-End IoT Device Identification Method
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Feihong Yin Li Yang Yuchen Wang Jiahao Dai Xidian University Xi'an China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
The past decades have seen the rapid development of Internet of Things (IoT) in various domains. Identifying the IoT devices connected to the network is a crucial aspect of network security. However, existing work on ... 详细信息
来源: 评论
Joint Optimization Task Offloading Strategy for Mobile Edge Computing  2
Joint Optimization Task Offloading Strategy for Mobile Edge ...
收藏 引用
2nd IEEE International Conference on information technology, Big Data and Artificial Intelligence, ICIBA 2021
作者: Tang, Xue Wen, Zhan Chen, Jiali Li, Yiquan Li, Wenzao College of Communication Engineer Chengdu University of Information Technology Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu611730 China
With increase of Internet of Things (IoT) devices, the burden of cloud computing servers is gradually increasing. Mobile Edge Computing (MEC), as an emerging solution, can relieve the pressure of computing and improve... 详细信息
来源: 评论
Outlier Detection Method based on Improved K-means Clustering Algorithm  21
Outlier Detection Method based on Improved K-means Clusterin...
收藏 引用
5th International Conference on Electronic information technology and Computer Engineering, EITCE 2021
作者: Liu, Wenfen Wang, Nan Huang, Yuehua Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin Guangxi China School of Computer and Information Security Guilin University of Electronic Technology Guilin Guangxi China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin Guangxi China College of Computer Science and Engineering Guilin University of Aerospace Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Outlier detection is one of the important methods of data mining and analysis. The previous K-means outlier detection methods are easy to be misled by outliers in the clustering process and cannot detect outliers well... 详细信息
来源: 评论
Advancing cancer diagnosis and prognostication through deep learning mastery in breast, colon, and lung histopathology with ResoMergeNet
收藏 引用
Computers in Biology and Medicine 2025年 185卷 109494-109494页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Yi, Ding Atwereboannah, Abena A. Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Bakanina Kissanga, Grace-Mercure Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering & Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Sichuan Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Life Science University of Electronic Science and Technology of China Chengdu China
Cancer, a global health threat, demands effective diagnostic solutions to combat its impact on public health, particularly for breast, colon, and lung cancers. Early and accurate diagnosis is essential for successful ... 详细信息
来源: 评论
Unicast Beamforming in the Presence of a Smart Reactive Jammer: A Stackelberg Game Approach
Unicast Beamforming in the Presence of a Smart Reactive Jamm...
收藏 引用
IEEE Workshop on Signal Processing Advances in Wireless communications (SPAWC)
作者: Bai Shi Huaizhong Shao Jingran Lin Zhikai Zhai School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Laboratory of Electromagnetic Space Cognition and Intelligent Control Beijing China Peng Cheng Laboratory Shenzhen China
The malicious jamming attacks will disrupt legitimate public wireless communication systems, which has become a critical issue that must be considered in modern communication system design. This paper considers an ant...
来源: 评论
MODULATION SIGNAL RECOGNITION BASED ON SELECTIVE KNOWLEDGE TRANSFER
MODULATION SIGNAL RECOGNITION BASED ON SELECTIVE KNOWLEDGE T...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global communications Conference
作者: Huaji Zhou Xu Wang Jing Bai Zhu Xiao Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Artificial Intelligence Xidian University Xi'an China College of Computer Science and Electronic Engineering Hunan University Changsha China
Deep learning-based recognition of radio signal modulation has emerged as a current research hotspot with significant practical potential. However, in practical applications, radio modulation signal data acquisition i... 详细信息
来源: 评论
Multimodal Knowledge Graph Completion Method Based on Integrated Modality Adversarial Training and Relation-Enhanced Attention Mechanism
Multimodal Knowledge Graph Completion Method Based on Integr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Ruijia Zhang Zheng Dong Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Negative sampling (NS) is widely used in knowledge graph completion (KGC) to generate negative triples for contrastive learning during training. However, existing NS methods are not suitable when multimodal informatio... 详细信息
来源: 评论
Data-Driven Active Power Dispatch for Wind Farms
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
Data Driven control and Learning Systems (DDCLS)
作者: Xuguo Jiao Daoyuan Zhang Xin Wang Zhaoxing Ma Zhenyong Zhang Wenfeng Liu School of Information and Control Engineering Qingdao University of Technology Qingdao China State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Civil Engineering Qingdao University of Technology Qingdao China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论
Context-Aware Enhancement and Transformer Network for Image-Text Retrieval
Context-Aware Enhancement and Transformer Network for Image-...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Zheng Dong Ruijia Zhang Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Shandong Engineering Research Center of Big Data Applied Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important and challenging task in the field of multimedia analysis, aimed at bridging the semantic gap between visual content and language descriptions. Although this field has significant im... 详细信息
来源: 评论