咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security/Control Laboratory"
1470 条 记 录,以下是491-500 订阅
排序:
OpenPose Based Posture Analysis of Basketball Players
OpenPose Based Posture Analysis of Basketball Players
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xiao Liang Zhou De Yong Wang Xin Li School of Information Science and Engineering Xinjiang University Urumqi Xinjiang China XinJiang Lianhai INA-INT Information Technology Co. Ltd Key Laboratory of Big Data of Xinjiang Social Security Risk Prevention and Control
Human pose estimation has a wide range of applications in the field of computer vision, especially in sports event analysis where its importance is increasingly prominent. This study aims to optimize the basketball pl...
来源: 评论
The applied principles of EEG analysis methods in neuroscience and clinical neurology
收藏 引用
Military Medical Research 2024年 第6期11卷 907-941页
作者: Hao Zhang Qing-Qi Zhou He Chen Xiao-Qing Hu Wei-Guang Li Yang Bai Jun-Xia Han Yao Wang Zhen-Hu Liang Dan Chen Feng-Yu Cong Jia-Qing Yan Xiao-Li Li School of Systems Science Beijing Normal UniversityBeijing 100875China College of Electrical and Control Engineering North China University of TechnologyBeijing 100041China School of Automation Science and Engineering South China University of TechnologyGuangzhou 510641China Department of Psychology the State Key Laboratory of Brain and Cognitive Sciencesthe University of Hong KongHong Kong SAR 999077China HKU-Shenzhen Institute of Research and Innovation Shenzhen 518057GuangdongChina Department of Health Technology and Informatics the Hong Kong Polytechnic UniversityHong Kong SAR 999077China Department of Rehabilitation Medicine the First Afliated Hospital of Nanchang UniversityNanchang 330006China Rehabilitation Medicine Clinical Research Center of Jiangxi Province Nanchang 330006China Beijing Key Laboratory of Learning and Cognition School of PsychologyCapital Normal UniversityBeijing 100048China School of Communication Science Beijing Language and Culture UniversityBeijing 100083China Institute of Electrical Engineering Yanshan UniversityQinhuangdao 066004HebeiChina School of Computer Science Wuhan UniversityWuhan 430072China School of Biomedical Engineering Faculty of Electronic Information and Electrical EngineeringDalian University of TechnologyDalian 116081LiaoningChina Guangdong Artifcial Intelligence and Digital Economy Laboratory(Guangzhou) Guangzhou 510335China.
Electroencephalography(EEG)is a non-invasive measurement method for brain *** to its safety,high resolution,and hypersensitivity to dynamic changes in brain neural signals,EEG has aroused much interest in scientific r... 详细信息
来源: 评论
STAR-RIS-UAV Aided Coordinated Multipoint Cellular System for Multi-user Networks
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Baihua Wang, Yang Li, Danqi Cai, Wenlong Lin, Jinyong Zhang, Shuo Shi, Weiping Yan, Shihao Shu, Feng The School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing210094 China The School of Information and Communication Engineering Hainan University Haikou570228 China The National Key Laboratory of Science and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute Beijing100854 China The School of Science Security Research Institute Edith Cowan University PerthWA6027 Australia
Different with conventional reconfigurable intelligent surface (RIS), simultaneous transmitting and reflecting RIS (STAR-RIS) can reflect and transmit the signals to the receiver. In this paper, to serve more ground u... 详细信息
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论
An Ultra-fast Quantum Random Number Generation Scheme Based on Laser Phase Noise
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Jie Wu, Mei Zhang, Yichen Liu, Jinlu Fan, Fan Li, Yang Huang, Wei Wang, Heng Pan, Yan Su, Qi Bian, Yiming Jiang, Haoyuan Dou, Jiayi Yu, Song Xu, Bingjie Luo, Bin Guo, Hong State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Cryptology Beijing100878 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Center for Quantum Information Technology Peking University Beijing100871 China
Based on the intrinsic random property of quantum mechanics, quantum random number generators allow for access of truly unpredictable random sequence and are now heading towards high performance and small miniaturizat... 详细信息
来源: 评论
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
An Anti-jamming Intelligent Decision-Making Method for Multi-user communication Based on Deep Reinforcement Learning
An Anti-jamming Intelligent Decision-Making Method for Multi...
收藏 引用
International Conference on communication technology (ICCT)
作者: Lan Zhang Liang Ma Feng Tian Tianyi Liang Science and Technology on Communication Information Security Control Laboratory Jiaxing China The 36th Research Institution of China Electronics Technology Group Corporation Jiaxing China Nanjing University of Posts and Telecommunications Nanjing China
In order to effectively cope with the external malicious jamming from jammers and avoid mutual interference caused by competitive channels among users, an intelligent antijamming decision-making method based on deep r... 详细信息
来源: 评论
Research on Secure communication Methods for High-Speed Cross-Network Data Exchange
Research on Secure Communication Methods for High-Speed Cros...
收藏 引用
Electronic information Engineering and Computer communication (EIECC), International Conference on
作者: Yao Zhang Yitao Chen Jiujiang Fei Guojun Peng Rong Su Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Wuhan Maritime Communication Research Institute Wuhan China Wuhan Railway Vocational College of Technology Wuhan China
This paper introduces the application requirements for high-speed secure communication across networks, the fundamental principles of cross-network data exchange, and its implementation. Based on high-speed switch tec... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
Joint Radar-communication Beamforming for CRB-Based Target Localization
Joint Radar-Communication Beamforming for CRB-Based Target L...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Tianhao Mao Jie Yang Le Liang Shi Jin National Mobile Communications Research Laboratory Southeast University Nanjing China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing China Purple Mountain Laboratories Nanjing China
This paper studies the beamformer design for an integrated sensing and communication system where simultaneous communication for multiple downlink users and bistatic sensing for a point target are realized. Firstly, t... 详细信息
来源: 评论